News

Discovery of Crimeware Server Exposes Breadth of Data Theft

Last month researchers at online security company Finjan uncovered a 1.4 gigabyte cache of stolen data from North America, Europe, the Middle East and India on a Malaysian server that provided command and control functions for malware attacks in addition to being a drop site for data harvested from compromised computers.

"This is a unique example of what we have been talking about for the last year," said Yuval Ben-Itzhak, chief technical officer at Finjan. Online thieves are using sophisticated tools to plant malicious code on legitimate Web pages, compromising visiting PCs and stealing data.

The data included 5,388 unique log files collected in just a three-week period. The files included personal and business e-mails, medical records, and financial log-in and transaction information with not only credit card and account numbers but also passwords and security codes. Although the trend of using Web exploits to steal and market personal data has been identified for some time, the discovery of the cache still was an eye-opener, Ben-Itzhak said.

"When you see a server with the data there, it's the difference between theory and reality," he said. "When you see people's medical records and e-mail in this volume, we were kind of shocked."

Since the discovery in early April, the company's Malicious Code Research Center has discovered two similar servers in different parts world with similar data. They appeared to have been in operation for shorter periods of time.

Finjan reported the discovery today in the latest issue of the "Malicious Page of the Month" bulletin.

The crimeserver was discovered by analysts monitoring outgoing traffic from a Finjan customer's network. Following the traffic to its destination led them to the unprotected server holding the data. The server contained several Trojans and the payload injected into compromised Web sites in addition to command and control software for the attacks and the stolen data.

"It was just waiting for someone to collect it," Ben-Itzhak said. Most of the data was in raw log files, although "in some parts of the server, we found data that had already been processed."

Finjan analysts needed a week to process the 1.4 gigabytes and determine what was there. The log files were traced to 5,878 distinct IP addresses. The number of compromised PCs the data was lifted from has not been determined, but Ben-Itzhak said it could be as high as double the number of IP addresses. Files on the server included 571 log files from the United States, 621 from Germany, 322 from France, 308 from India, 232 from Great Britain, 150 from Spain, 86 from Canada, 58 from Italy, 46 from the Netherlands and 1,037 from Turkey.

The server was registered to a man from Moscow and was hosted in Singapore at the time it was discovered. It has since been shut down.

"About every week he was moving the server," from Russia to China, Hong Kong and finally Singapore, Ben-Itzhak said.

In the online black market for stolen information, raw data can be sold in bulk for $1,000 for about 100 megabytes, but individual credit card numbers with accompanying information can sell for $20 to $50 each. Other files can bring hundreds of dollars, depending on their contents.

Ben-Itzhak said the discovery illustrates the breadth of the data theft threat. It is not just personal financial data at risk but corporate data also. The files included information from what Finjan described as 40 top-tier global businesses and included sensitive corporate e-mails.

"We entered a new era in which criminals just need to log into their 'data supplier' and download any information suitable for them to conduct their crime, be it financial fraud, industrial espionage or identity theft," Ben-Itzhak said.

The company notified more than 40 major international financial institutions in the United States, Europe and India whose customers were compromised in addition to international law enforcement agencies including the FBI.

Ben-Itzhak said the largest financial institutions were not surprised, but smaller banks were. Cooperation was good from law enforcement agencies, with which the company maintains close relationships, he said.

About the Author

William Jackson is the senior writer for Government Computer News (GCN.com).

Featured

  • Broadcom Revamps VMware Partner Program Again

    Broadcom recently announced a significant update regarding its VMware Cloud Service Provider (VCSP) program, coinciding with the release of VMware Cloud Foundation (VCF) 9.0, a key component in Broadcom’s private cloud strategy.

  • Closeup of the new Copilot keyboard key

    Microsoft Updates Copilot To Add Context-Sensitive Agents to Teams, SharePoint

    Microsoft has rolled out a new public preview for collaborative "always on" agents in Microsoft 365 Copilot, bringing enhanced, context-aware tools into Teams channels, meetings, SharePoint sites, Planner workstreams and Viva Engage communities.

  • Windows 365 Cloud Apps Now Available for Public Preview

    Microsoft announced this week that Windows 365 Cloud Apps are now available for public preview. This aims to allow IT administrators to stream individual Windows applications from the cloud, removing the need to assign Cloud PCs to every user.

  • Report: Security Initiatives Can't Keep Pace with Cloud, AI Boom

    The increasingly fast adoption of hybrid, multicloud, and AI systems is easily outgrowing existing security measures, according to a recent global survey by the Cloud Security Alliance (CSA) and exposure management firm Tenable.