Researcher - Security Affairs

advertisement
Cybercriminals Leveraging
Facebook
Eric Feinberg, Ian Malloy and Frank Angiolelli
7/8/2013
Page | 2
Table of Contents:
Executive Summary & Diagram..................................................................................................................... 4
Fake User Profiles ......................................................................................................................................... 7
The Posts for Counterfeit Merchandise ........................................................................................................ 8
Using the Russian Business Network as an Intermediary ........................................................................... 10
Evidence of Replication ............................................................................................................................... 10
Examples of Mass Redirection Using .tk Websites ..................................................................................... 11
Patterns ....................................................................................................................................................... 11
Scope of Fraud ............................................................................................................................................ 12
Paid Advertisements on Facebook to Counterfeit Merchandise: ............................................................... 12
The Need For a Detection Mechanism ....................................................................................................... 13
Threat Detection as a Continuous Process ................................................................................................. 14
Conclusion ................................................................................................................................................... 16
Appendix A: Evidence Of .TK Redirection ................................................................................................... 16
Appendix B: Evidence of POST Method in Unencrypted HTTP ................................................................... 18
Appendix C: Matrix of Some Counterfeit Merchandise Websites ............................................................. 19
Appendix D: Multiple Types of Suspicious Activity ..................................................................................... 20
Appendix E: Paid Advertisements for Counterfeit Merchandise ................................................................ 22
Steps Forward……………………………………………………………………………………………………………………………………….31
Page | 3
Executive Summary & Diagram
Malicious actors and cybercriminals are now leveraging social media as a mass distribution system for
advertising counterfeit consumer goods through Facebook and infecting computers to become part of a
botnet, or ring of malicious acting computers operating through a remote mechanism. This activity is
trafficking in goods using counterfeit trademarks, leveraging insecure transport for Personally
Identifiable Information and utilizing dubious payment processors. The activity is growing to include
money mule recruitment and “loan origination” as well as operating under a Chinese and Russian
Business Network banner.
This document will lay out evidence that this “system” appears highly organized including creation,
masking and distribution system utilizing a definable pattern of replication. These actors are exploiting
Facebook’s inability to detect and react as well as weaknesses in its API to expose mass numbers of
unsuspecting citizens to counterfeit merchandise advertisements per fake profiles. The mechanism by
which the malicious actors are intruding and avoiding detection is through the use of facebook’s graph
API.
In addition,
these actors
“The clear onus is on the social media site to protect users from exposure, not just
are creating
to inappropriate or offensive material, but from material that can steal their
advertisement
identity or money.” – Frank Angiolelli
s which are
using
Facebook’s ad
distribution to
present their sites across thousands of groups, more specifically fan pages related to professional sports.
In this document, we will present evidence showing the organized and distributed network these actors
are using, the clearly identifiable patterns and the need for a detection mechanism.
Page | 4
Page | 5
Figure 1: Ecosystem of Facebook Cybercrime
Page | 6
Fake User Profiles
These malicious actors are creating Facebook profiles using fictitious names and a methodology which
follows a distinctive pattern. The actors are creating profiles using the most basic settings and mass
joining public groups. The number of groups joined ranges from approximately 100 to 400+ per profile
and in virtually all cases, the user has never posted anything on their timeline. Using these groups, the
“advertisement” posts reach upwards of 300,000 people per fake profile.
Using the profile of Zoe Lim (See Figure 2: Fake Profile of Zoe Lim) as a case study, this “user” joined 194
groups reaching 377,8521 people without placing a single post or liking a single page. Some of the
accounts have up to 5 liked movies or music pages; however none of them have any content posts
outside of public groups.
Figure 2: Fake Profile of Zoe Lim
A full accounting of all the Facebook profiles is outside the scope of this paper, however, further
examples of fake Facebook profiles engaged in this activity include:
1
A review of fake profile Zoe Lim revealed 194 groups with 377,852 members, not accounting for duplicate membership.
Page | 7
Betty Roan, Member of 121 groups2
Diana Tellez, Member of 301 groups3
Ward Kelsie, Member of 323 groups4
The Posts for Counterfeit Merchandise
Once the account is created, it joins hundreds of groups and posts ads. The pattern for the posts these
fake profiles are proliferating consist primarily of
a sales pitch, a website link containing various
domains primarily made up from .tk websites
without canonical references followed by a
picture of the supposed merchandise to be sold.
There are patterns to the post, primarily at this
time a mixture of Ray-Ban and Oakley
Sunglasses, Louis Vuitton and discount shoes (i.e.
www.hotshoessale25.tk, www.niceshoeso.tk,
www.outletshoes.tk, www.discountshoes10.tk)
as well as other counterfeit merchandise
including NFL jerseys. For the purposes of
brevity, this document will focus mostly on the
counterfeit Sunglasses as evidence of the
pattern, with some brief documentation of the
other merchandise.
The .tk websites are used as redirectors [See Appendix A]
Example Advertisement Post 1
to the counterfeit merchandise “retail” websites as
evidenced in the traffic below, delivering the victim to 2bestmall.com.
This replicated website [See “Evidence of Replication”] is
Example Advertisement Post 2
2
https://www.facebook.com/betty.roan.71?hc_location=stream
https://www.facebook.com/diana.tellez.7545?hc_location=stream
4
https://www.facebook.com/ward.kelsie?hc_location=stream
3
Page | 8
leveraging cnzz.com (See Figure 5), which is a Chinese Content Delivery Network (CDN)[See Figure 5 &
Figure 6] that has an extremely poor reputation for hosting exploit code5. The payment systems
employed by these websites have a very poor reputation6 .
Realpay-checkout.com is registered at Godaddy and billingcheckout.com is registered at todaynic.com.
Figure 3: Leveraging bilingcheckout.com & Chinese CDN
Figure 6: Using realpay-checkout.com & Chinese CDN
5
http://www.mywot.com/en/scorecard/cnzz.com
6
http://www.webutation.net/go/review/realypay-checkout.com,
http://www.webutation.net/go/review/billingcheckout.com,
http://www.sitejabber.com/reviews/www.realypay-checkout.com
Page | 9
Using the Russian Business Network as an Intermediary
These actors are using Russian Business Network IP addresses as intermediaries to host the .tk
redirectors. This technique is being used as an evasion tactic to prevent easy discovery and blocking of
the offending counterfeit merchandise website. The #1 IP address of these .tk redirectors observed in
this study were hosted at 93.170.52.217(See Figure 7).
Figure 7: Russian Business Network Hosting .tk Redirectors
Evidence of Replication
The method being used here is replicated over multiple domains, with multiple redirectors. The domain,
nice-sunglasses.com is registered to a “Zerubbabel Kahance”. This name is associated with other
domains. Refer to Appendix C for a full accounting of these, and an example is listed here.






here-store.com8 - Selling “cheap oakley sunglasses”
here-best.com9 – Selling “cheap oakley sunglasses”
come-sale.com10 – Selling “cheap oakley sunglasses”
Here-emall.com11 – Selling “cheap bikinis”
here-new.com – Selling “cheap oakley sunglasses”
here-yes.com – Selling “cheap oakley sunglasses”
The Title being “Top Ray-Ban® And Oakley® Sunglasses Online Store-Up To 80% Off !” is shown on
statscrop.com to match 37 results in total12.
These sites have the same setup as nice-sunglasses.com13 using Zen cart14 and the exact same title HTML
tag15. The site itself is, for all intensive purposes, a copy of the site at nice-sunglasses.com. The
distribution network is the same as well, leveraging .tk redirectors16.
7
http://urlquery.net/report.php?id=3280151
http://whois.domaintools.com/here-store.com
9
http://www.statscrop.com/www/here-best.com
10
http://whois.domaintools.com/come-sale.com
11
http://www.statscrop.com/Here-emall.com
8
12
http://www.google.com/#safe=off&site=&source=hp&q=site:statscrop.com+Top+RayBan%C2%AE+And+Oakley%C2%AE+Sunglasses+Online+Store-Up+To+80%25+Off+!&oq=site:statscrop.com+Top+RayBan%C2%AE+And+Oakley%C2%AE+Sunglasses+Online+StoreUp+To+80%25+Off+!&gs_l=hp.3...740.4231.0.5355.23.22.1.0.0.0.169.1915.15j7.22.0...0.0.0..1c.1.17.hp.vPdrevVGD4&bav=on.2,or.&bvm=bv.48572450,d.dmg&fp=f53ef48681d7c10d&biw=1214&bih=920
13 http://urlquery.net/report.php?id=3403164
14
<meta·name="generator"·content="shopping·cart·program·by·Zen·Cart™,·http://www.zencart.com·eCommerce"
Page | 10
Examples of Mass Redirection Using .tk Websites
The actors create multiple redirectors hosted on the same IP address over time. The IP address
176.9.241.1 is associated with 39 .tk redirectors between 05/01/2013 and 06/23/201317. Some
examples are listed here:







hxxp://yatl-chaffer.tk/  here-store.com18
hxxp://vrymall-oks.tk  here-store.com
hxxp://bueall-loves.tk  here-store.com
hxxp://supermall-malls.tk  here-yes.com
hxxp://chain-shoping.tk  here—ok.com
hxxp://service-promote.tk  here-best.com
hxxp://four-transactions.tk  here-new.com19
The majority of these .tk sites observed and discovered20 were hosted on the IP addresses 93.170.52.21,
176.9.241.1 and 93.170.52.31.
Patterns
The counterfeit merchandise websites rotate domain, hosting, registrar and geo-location, however
distinct patterns exist
across all the websites
being distributed
centered primarily
against the actual
content. Commonalities exist in the Title and Keywords inside the HTML code which affords a possible
detection. This would seem to support the deficiencies of detecting bad actors based on registrar, host,
IP address or domain name and the need for a tiered based anomaly and known bad detection
mechanism by social
networking providers,
particularly Facebook.
For example Google “Top·RayBan & And Oakley Sunglasses
Online Store-Up To 80% Off!”
results in 135,000 results at
15
<title>Top·Ray-Ban&reg·And·Oakley&reg·Sunglasses·Online·Store-Up·To·80%·Off·!</title>
http://urlquery.net/report.php?id=3280040
17
http://urlquery.net/search.php?q=176.9.241.1&type=string&start=2013-05-01&end=2013-06-29&max=50
18
http://urlquery.net/report.php?id=3242754
19
http://urlquery.net/report.php?id=2324346
16
20
http://urlquery.net/search.php?q=%28mall%7Cshoes%7Cshop%7Clove%7Ctransac%7Coakley%7Crayban%7C%5Clike%7Clike%5C-%29.*%5C.tk&type=regexp&start=2013-05-01&end=2013-06-30&max=400
Page | 11
this time. Not all of these are counterfeit merchandise sites; however it reveals a problem so prolific
that individual legal agency seizure of domains may be ineffective. The actors will copy their code to
another domain and stand up hosting setting up .tk redirectors.
The speed at which this process can occur without detection is fast enough to cause harm to the
economy on what is likely a very large scale. When these techniques are tied with social networking
sites like Facebook and those networks are not equipped to detect and prevent such distribution, the
reach vs. cost of this operation makes it very attractive to the criminal element.
Scope of Fraud
The scope of the fraud involved here is not limited to counterfeit merchandise. Throughout the
investigation and information gathering activity on Facebook, our group discovered examples of





Payday Loans (See Appendix E)
Facebook sites with redirectors21,22
Suspected Money Mule Recruitment (See Appendix E)
Counterfeit NFL Jerseys (See Appendix E)
The installation of remote control capabilities, i.e. a zombie computer or ‘bot’
Paid Advertisements on Facebook to Counterfeit Merchandise:
In Appendix E, a sample of evidence of paid advertisements for counterfeit merchandise is presented.
These ads are tied to what users “Like” on Facebook. The same methodology that Facebook uses to
target ads to users is being leveraged to present counterfeit merchandise… to users most likely to buy it.
While a network forensic professional can review and identify suspicious behavior in these sites, the
average user cannot. The onus must be on the service provider to minimize criminal operations on their
sites. This appears to be a new “type” of malvertisement, not necessarily deploying exploit kits, but
deploying financial fraud and risk of identity theft.
The advertisement pattern does differ from the current .tk post pattern, tending to use 51.la as their
CDN, however the sites observed in this review used the same dubious billing processors. The site
“luisvuittonoutletcheaps.net” has an unencrypted registration mechanism [see Appendix E] and only
after you register and place an order is it revealed that the payment processor is billingcheckout.com.
21
22
hxxps://www.facebook.com/Isellshoe/app_208195102528120
hxxp://www.ucool.co/?pagejd
Page | 12
The difference of patterns from the Facebook Fake Profile “Posts” and the Counterfeit Ads leads to a
question of MO, or modus operandi, a concept familiar to law enforcement. Predictable patterns must
be leveraged against the bad actors, which aren’t appearing to happen at this time.
The Need for a Detection Mechanism
There is a clear use case here which appears to have a void at
this time.
“The clear onus is on the
social media site to
protect its users …from
material that can steal
their identity or money.”
This document demonstrates clear patterns of activity by
actors that is detectable using forensic techniques
investigating nothing more than the public information
available on Facebook. Our group has clear take-away from
this investigation showing that a detection mechanism is not
only possible but would protect the public in general and
enhance the reputation of social media sites like Facebook.
Additionally, the economy as a whole would benefit from lowering losses due to such fraud. The
detection mechanism incorporates aspects of applied artificial intelligence called a ‘Best-First Search’ to
detect anomalies in the system and then a Proactive Automated Defense Unit (PAD Unit) will be utilized
to complete the solution.
Our group believes that the patterns observed here can be expanded upon considerably by performing
data analytics using the full data collected by those sites. This data should be used to extrapolate
predictive behavioral models which can be used in a mature process to prevent this activity
programmatically and take down bad actors. The clear onus is on the social media site to protect its
users from exposure, not just inappropriate or offensive material, but from material that can steal their
identity or money.
The activity in question must be detected through a system that checks the user making the post, the
post text itself, the URLs being posted and then taking action based on acceptable or unacceptable
behavior models programmatically.
Page | 13
For example, canonical checks, content grabbing, IP reputation and a host of other checks can be
performed against the URLs being posted in a staggered approach to allow for high speed, high volume
vetting in a programmatic fashion. Scoring
mechanisms can be designed to allow for a tiered
processing of links in real time thereby allowing
Facebook to pull posts that are suspect based on
defined parameters.
The accounts themselves can be vetted along multiple
key points to limit the distribution of these events.
Account Creation Process
The account creation process should contain vetting
mechanisms where by the account is checked for
established patterns in a methodical way. The process
itself should adhere to the Continuous Improvement
Lifecycle and would require human as well as machine intelligence. Initial accounts can be tagged for
validity and passed onto a processor to monitor for suspicious patterns. As part of the quality control
process, any accounts tagged as suspicious should include an automated challenge response capability
closing in termination of the account.
The Posting Patterns
The posts themselves must run through a series of checks in a tiered manor that will allow for scoring
and action. Predictive analytics and human generated patterns must be input into a vetting engine that
can then be passed on to deeper inspections. The
process itself must contain automatic challenge
responses and post removal processes to protect the
public from fraud, maliciousness and identify theft
without the need for user interaction.
Threat Detection as a Continuous
Process
This kind of exploitation is not static and requires a
combination of human intelligence and analysis along
with algorithmic detection of anomalous patterns. As
shown in the diagram below, this process can be best
represented by a sine wave, which allows for variable
frequency and amplitude. The frequency and amplitude represent the speed of the threat lifecycle and
the attack surface, or exposure, respectively.
Page | 14
Page | 15
Conclusion
When mass distribution of counterfeit merchandise is coupled with mass distribution of difficult to
detect redirecting links through the premier social networking site, Facebook.com, there is a clear
mechanism to engage in criminal enterprise. It would appear that criminals have the opportunity, means
and motive and Facebook currently lacks a capable preventive and response mechanism. Unless a
proper threat response to the lifecycle exists, this activity will be proliferated across as many social
engineering sites as possible.
Our solution, a PAD Unit is both within the scope of solving this issue and also addressing the need for a
software program capable of protecting both the users of social media like Facebook© and also the
private industries being taken advantage of. This solution is in the interest of all parties involved except
the criminal element.
Appendix A: Evidence Of .TK Redirection
Parameters:
URL = http://discount-oppud.tk/
UAG = Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.116
Safari/537.36
REF = http://www.facebook.com
AEN =
REQ = GET ; VER = 1.1 ; FMT = AUTO
Sending request:
GET / HTTP/1.1
Host: discount-oppud.tk
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/27.0.1453.116 Safari/537.36
Referer: http://www.facebook.com
Connection: close
• Finding host IP address...
• Host IP address = 128.204.201.9
• Finding TCP protocol...
• Binding to local socket...
• Connecting to host...
• Sending request...
• Waiting for response...
Receiving Header:
HTTP/1.1·301·Moved·Permanently(CR)(LF)
Date:·Thu,·27·Jun·2013·22:34:16·GMT(CR)(LF)
Server:·Apache/2.2.24·(Unix)·mod_ssl/2.2.24·OpenSSL/1.0.0fips·mod_auth_passthrough/2.1·mod_bwlimited/1.4·FrontPage/5.0.2.2635·mod_perl/2.0.6·Pe
rl/v5.10.1(CR)(LF)
Location:·http://2bestmall.com(CR)(LF) 
Content-Length:·228(CR)(LF)
Page | 16
Redirection to counterfeit merchandise website
Connection:·close(CR)(LF)
Content-Type:·text/html;·charset=iso-8859-1(CR)(LF)
(CR)(LF)
Sending request:
GET / HTTP/1.1
Host: 2bestmall.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/27.0.1453.116 Safari/537.36
Referer: http://www.facebook.com
Connection: close
• Finding host IP address...
• Host IP address = 185.3.133.182
• Finding TCP protocol...
• Binding to local socket...
• Connecting to host...
• Sending request...
• Waiting for response...
Receiving Header:
HTTP/1.1·200·OK(CR)(LF)
Server:·nginx/1.2.4(CR)(LF)
Date:·Thu,·27·Jun·2013·22:18:47·GMT(CR)(LF)
Content-Type:·text/html;·charset=iso-8859-1(CR)(LF)
Transfer-Encoding:·chunked(CR)(LF)
Connection:·close(CR)(LF)
Vary:·Accept-Encoding(CR)(LF)
X-Powered-By:·PHP/5.2.17(CR)(LF)
SetCookie:·zenid=6d71bea6330b900388ca93b3af9c72f0;·path=/;·domain=.2bestmall.com;·HttpOnl
y(CR)(LF)
Expires:·Thu,·19·Nov·1981·08:52:00·GMT(CR)(LF)
Cache-Control:·no-store,·no-cache,·must-revalidate,·post-check=0,·pre-check=0(CR)(LF)
Pragma:·no-cache(CR)(LF)
(CR)(LF)
Content (Length = 46893):
b720(CR)(LF)
(LF)
<!DOCTYPE·html·PUBLIC·"//W3C//DTD·XHTML·1.0·Transitional//EN"·"http://www.w3.org/TR/xhtml1/DTD/xhtml1transitional.dtd">(LF)
(LF)
<html·xmlns="http://www.w3.org/1999/xhtml"·dir="ltr"·lang="en">(LF)
(LF)
<head>(LF)
(LF)
<title>Top·Ray-Ban&reg·And·Oakley&reg·Sunglasses·Online·StoreUp·To·80%·Off·!</title>(LF) 
Counterfeit Sunglass Sales Website
-----------------------------END TRAFFIC PATTERN ---------------------------------Page | 17
Appendix B: Evidence of POST Method in Unencrypted HTTP
HTTP/1.1
Host: 2bestmall.com
Connection: keep-alive
Content-Length: 169
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Origin: http://2bestmall.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/27.0.1453.116 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://2bestmall.com/index.php?main_page=checkout_shipping_address
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Cookie: zenid=e482158d1a4fc0bb3e2b8218f4cd83b6; CNZZDATA5264794=cnzz_eid%3D14994999751372379098http%253A%252F%252F2bestmall.com%26ntime%3D1372379098%26cnzz_a%3D10%26retime%3D1372
380023470%26sin%3Dnone%26ltime%3D1372380023470%26rtime%3D0;
RpCookie=6k8hup5ph6pl60eqvn3v3agjs4
DNT: 1
gender=m&firstname=Bob&lastname=Jones&street_address=15+Main+Street&suburb=&city=Beverly+
Hills&zone_id=12&postcode=90210&zone_country_id=223&action=submit&x=39&y=7
Page | 18
Appendix C: Matrix of Some Counterfeit Merchandise Websites
Site
here-s tore.com
here-bes t.com
Daily Bandwidth Age
24.23 MB (726.87
MB/month)
Ta ken Down by
Greer Burns &
Cra i n
4 months
4 months
come-s a l e.com
42.84 MB (1.25
GB/month)
4 months
here-ema l l .com
Unknown
4 months
here-new.com
here-yes .com
Page | 19
1.30 GB (39.10
GB/month)
Ta ken Down by
Greer Burns &
Cra i n
4 months
Title
Name Server Primary
IP Address
Keywords
ns 1.cl ouda ng.com
(50.115.129.33)
172.245.213.118
home ba s e ca s h
a dva nce debt
http://www.s ta ts cr
cons ol i da ti on hereop.com/www/heres tore.com
2/19/2013 s tore.com
Ta ken Down
Top Ra y-Ba n®
And Oa kl ey®
Sungl a s s es
Onl i ne Store-Up
To 80% Off ! Free
Shi ppi ng On
Orders Over 5
Items .
Chea p·Bi ki ni s ,C
hea p·Bra nd·Prod
uct
Ra y-Ba n® And
Oa kl ey®
Sungl a s s es
Onl i ne Store-Up
To 80% Off !
Ta ken Down
Ta ken Down
Ta ken Down
ns1.oraco.net
192.227.139.187
Chea p Oa kl ey
Sungl a s s es , Chea p
Ra y-Ba n
Sungl a s s es On
Sa l e
Chea p Bi ki ni s ,
Chea p Bra nd
Product
Chea p Oa kl ey
Sungl a s s es , Chea p
Ra y-Ba n
Sungl a s s es On
Sa l e
Ta ken Down
Ta ken Down
Ta ken Down
Ta ken Down
Chea p Oa kl ey
Sungl a s s es ,
Chea p Ra y-Ba n
Sungl a s s es On
Sa l e
mns 01.doma i ncont
rol .com
(216.69.185.34)
204.74.216.23
mns 01.doma i ncont
rol .com
(216.69.185.34)
204.74.215.59
Date
Reference
Ta ken
Down
http://www.s ta ts cr
op.com/www/come2/21/2013 s a l e.com
http://www.s ta ts cr
op.com/www/here2/19/2013 ema l l .com
http://www.s ta ts cr
op.com/www/here2/19/2013 new.com
Ta ken
Down
Ta ken Down
Appendix D: Multiple Types of Suspicious Activity
Payday loans
Counterfeit NFL Merchandise
Page | 20
Suspected Money Mule Recruitment
Suspect “Loan”
Providers
Suspected Money Mule Recruitment with Unencrypted Data Transport
This tiny.cc URL redirects you to wobmr1r66.blogspot.tw, which requests your personal information.
Page | 21
Appendix E: Paid Advertisements for Counterfeit Merchandise
The advertisements listed on the right hand side of this screenshot are for counterfeit merchandise
hosted in China.
Page | 22
While not pictured here, this site uses billingcheckout.com
Page | 23
When creating an account, the data is transmitted unencrypted:
POST /create_account.html HTTP/1.1
Host: www.louisvuittonoutletcheaps.net
Connection: keep-alive
Content-Length: 386
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Origin: http://www.louisvuittonoutletcheaps.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/27.0.1453.116 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://www.louisvuittonoutletcheaps.net/create_account.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Cookie: zenid=76307818ab1ac31f6e65fe6b1b0005be; AJSTAT_ok_pages=2;
AJSTAT_ok_times=1
securityToken=9dc4a61d1389c0332b58a2ce8ec0a767&action=process&email_pref_html=emai
l_format&firstname=Magilla&lastname=Gorilla&street_address=1+Main+Street&should_be_e
mpty=&city=Beverly+Hills&zone_id=12&state=CA&postcode=90210&zone_country_id=223&tel
ephone=874-4789874&email_address=ilovetoscam%40gmail.com&password=password1&confirmation=pa
ssword1&email_format=TEXT&x=45&y=19
Page | 24
Registrant Contact Details:
PrivacyProtect.org
Domain Admin
(contact@privacyprotect.org)
ID#10760, PO Box 16
Note - Visit PrivacyProtect.org to contact the domain owner/operator
Nobby Beach
Queensland,QLD 4218
AU
Tel. +45.36946676
Once you create an account, you can place your order which is processed by Billingcheckout.com
Page | 25
Page | 26
As evidenced in the transaction listed below, this website is leveraging Chinese CDNs and the
disreputable payment website “billingcheckout.com”
The ownership information traces back to China
Domain ID:CNIC-DO473296
Domain Name:51.LA
Created On:2005-01-17T01:00:00.0Z
Last Updated On:2012-03-14T16:59:32.0Z
Expiration Date:2017-01-17T23:59:59.0Z
Status:TRANSFER PROHIBITED
Status:RENEW PERIOD
Registrant ID:P-23189298
Registrant Name:Yang Fucheng
Registrant Street1:5-32, 55 Jingsan Road
Registrant City:Zhengzhou
Registrant Postal Code:450008
Registrant Country:CN
Registrant Phone:+86.37168712665
Registrant Email:nuduseng@hotmail.com
Admin ID:P-23189298
Admin Name:Yang Fucheng
Admin Street1:5-32, 55 Jingsan Road
Admin City:Zhengzhou
Page | 27
Admin Postal Code:450008
Admin Country:CN
JerseysCheapWholeSaler.us
The below information shows a single advertisement for jerseyscheapwholesaler.us. This website is a
Chinese counterfeit merchandise operation for NFL Jerseys.
http://urlquery.net/report.php?id=3405561
Page | 28
Domain Name:
Page | 29
JERSEYSCHEAPWHOLESALER.US
Domain ID:
Sponsoring Registrar:
Sponsoring Registrar IANA ID:
Registrar URL (registration services):
Domain Status:
Registrant ID:
Registrant Name:
Registrant Address1:
Registrant City:
Registrant State/Province:
Registrant Postal Code:
Registrant Country:
Registrant Country Code:
Registrant Phone Number:
Registrant Email:
Registrant Application Purpose:
Registrant Nexus Category:
Administrative Contact ID:
Administrative Contact Name:
Administrative Contact Address1:
Administrative Contact City:
Administrative Contact State/Province:
Administrative Contact Postal Code:
Administrative Contact Country:
Administrative Contact Country Code:
Administrative Contact Phone Number:
Administrative Contact Email:
Billing Contact ID:
Billing Contact Name:
Billing Contact Address1:
Billing Contact City:
Billing Contact State/Province:
Billing Contact Postal Code:
Billing Contact Country:
Billing Contact Country Code:
Billing Contact Phone Number:
Billing Contact Email:
Billing Application Purpose:
Billing Nexus Category:
Technical Contact ID:
Technical Contact Name:
Technical Contact Address1:
Technical Contact City:
Technical Contact State/Province:
Technical Contact Postal Code:
Technical Contact Country:
Technical Contact Country Code:
Technical Contact Phone Number:
Technical Contact Email:
CustName:
Anxin
Address:
Chengdu
City:
Chengdu
StateProv:
SICHUAN
PostalCode:
55001
Country:
CN
RegDate:
2012-06-30
Updated:
2012-06-30
Page | 30
D35251725-US
ENOM, INC.
48
whois.enom.com
clientTransferProhibited
DD78B8C58242F7FF
shi manyang
taijiang qu
fuzhou
fujian
350004
China
CN
+86.13358216111
smy21@126.com
P1
C12
324AF205097DFF8C
shi manyang
taijiang qu
fuzhou
fujian
350004
China
CN
+86.13358216111
smy21@126.com
DD78B8C58242F7FF
shi manyang
taijiang qu
fuzhou
fujian
350004
China
CN
+86.13358216111
smy21@126.com
P1
C12
B23D2804097DFF8C
shi manyang
taijiang qu
fuzhou
fujian
350004
China
CN
+86.13358216111
smy21@126.com
Steps Forward
A solution has been suggested in this write-up, namely the Proactive
Automated Defense Unit. The PAD Unit will be detailed now to a degree,
though a complete description will be withheld at this time to protect Malloy
Labs’ proprietary intellectual property. The complete PAD Unit relies on
proprietary algorithms to actively search through anomalies using methods
from artificial intelligence that are quantitatively shown to be superior to
using decision trees.
The use of AI in cyber defense is a burgeoning but young field, but
Mr. Malloy is confident in his ability to combine the two given his funding
from the United States of America National Aeronautics and Space
Administration South Dakota Space Grant Consortium to design multi-sensory
AI. Mr. Malloy has taken from this several aspects of AI that can be applied
safely to cyber security, a field in which he has received awards from
competing in the South Dakota Governor’s Giant Vision and also the South
Dakota Technology Business Center’s accelerator program for start-ups.
This unique knowledge gives a key advantage to the authors to produce
a solution. Mr. Angiolelli is extremely gifted in big data analysis as well
as reverse engineering of malware and offers key insight into how to produce
an automated solution to solving problems such as the one Facebook now faces
and has faced for over a year. Mr. Feinberg excels in Human Intelligence and
Social Engineering offering a much needed “EyeOn” the threats. Combined with
Mr. Malloy’s gifts the team can easily implement both a short term and long
term solution to the problem, should companies need such a solution.
Mr. Malloy outlined a three PAD unit approach to solving governmental
defense and attack needs as outlined in his write-up to the NATO CyCon 2013.
Only the defensive PAD Unit will be deployed to fix the problems social
networks such as Facebook have, limiting the response Unit to block as
opposed to shutting down the servers associated, despite the fact that all
servers associated with the problems outlined in this white-paper only
involve those known for acting maliciously. The team is fully capable of
mitigating loss and preventing fraud should companies need such action to be
taken.
Ian Malloy – CEO Malloy Labs Llc. 605-251-4662
Eric Feinberg – CEO EyeOn Intellectual Property Protection 917-566-0661
Frank Angiolelli – Independent Security Researcher 914-589-4474
Page | 31
Download