Western Express Indictments

Monday’s New York County District Attorney’s Office news release says an indictment from 2007 has been updated and now has 173-counts against seventeen men. They are charged with operating a multi-national criminal enterprise from November 2001 to August 2007.

The Western Express Cybercrime Group is responsible for over $4 million worth of identified credit card fraud, and trafficked in well over 95,000 stolen credit card numbers. These figures reflect the levels of fraud and stolen credit numbers which have been identified thus far.

The news release is related to the arrest of two of the men in Prague on July 30, 2008 (Viatcheslav Vasilyev and Vladimir Kramarenko) who were just extradited last week to the US and arraigned in NY Supreme Court on Monday. Only two of the seventeen have yet to be arrested; Oleg Kovelin and Dzimitry Burak.

Quick math on those numbers (4 million / 17 men / 5 years) suggests they were making about $50K a year each from their complex operation, described in the news release:

The Western Express Cybercrime Group carried out its criminal operations through a structure consisting of vendors, buyers, cybercrime services providers, and money movers. The vendors were individuals who sold large volumes of stolen credit card numbers and other personal identifying information through the Internet. The buyers used the Internet to purchase that information from the vendors, for the purpose of committing additional crimes such as larceny and identity theft. The cybercrime services providers promoted, facilitated, and aided in the purchase, sale and fraudulent use of stolen credit card numbers and other personal identifying information through various computer services that they provided to the vendors and the buyers. Finally, other defendants operated as money movers. Those defendants provided financial services and conducted financial transactions for other participants in the criminal enterprise in order to move funds and launder the proceeds of criminal activity. The money movers relied on anonymous digital currencies, such as Egold and Webmoney, to buy, sell, and launder the proceeds of criminal transactions, and conducted their business online, using Web sites, instant messaging, and email. Some of the defendants charged in the indictment played more than one role.

In other words a business was setup to convert stolen payment card information into cash. Someone sold the card information and someone bought it using someone who provided an online market. Someone then laundered the money paid for the stolen card information.

This reinforces my argument that Gonzales was hardly a hacker mastermind but more like a manager or officer of an organization that brought together various people with specialized skills. The Secret Service supposedly let him continue to operate so they could monitor him and apprehend additional suspects. Some might say Gonzales exploited this relationship and expanded his damage but obviously he was caught and this indictment confirms that his operation is now defunct.

The question is now whether criminals are going to step up into the vacuum left by Western Express to take over the market, or if they will shift to other forms of crime or even legitimate operations.

The answer might be found in the history of fighting organized crime. Along with drugs, arms, gambling, loans/extortion, cornering contracting etc. criminal gangs obviously now could operate in stolen card information. A typical explanation of the process goes something like this:

The relative ease with which large sums of money could be obtained by drug trafficking provided a solid financial underpinning for gangs, increased the solidarity of existing gangs, and offered strong incentives for the development of new ones.

With this in mind, the US Justice Department’s National Gang Intelligence Center report says that gangs are the “primary retail-level distributors of most illicit drugs…with 1 million members responsible for up to 80 percent of crimes in communities across the nation”. Drugs obviously present different market forces than cardholder information (e.g. addiction) but there are still many important security lessons that can be learned by studying the broader fight against long-term underground economies.

Blueberry Key Lime Pie

Kudos to The Pie Truck for an excellent treat

Smooth and creamy key lime custard topped with organic blueberry sauce in our sweet shortbread crust

I actually wanted to mention this because of the name dispute that was resolved amicably with another pie truck operation. That’s good news since both pie trucks now can focus on delivering amazing pies instead of throwing them at each other over a domain name.

I guess a boom in pie is a logical next step given the sudden rise of gourmet ice cream as the big new dessert of 2009.

PCI DSS Scoping

The Security Standards Council (SSC) of PCI reminded us today that a scope statement still requires validation. A scope should be reduced only after a thorough assessment of controls.

Secure treatment of data (e.g. hashing) could reduce the number of systems that are kept within scope but this needs to be assessed and verified. Another example is an entity that claims it has no wireless. This claim must be tested and they must have a regular process and control capability (wireless scanner) to manage risk going forward. Assessors will look for supporting documentation before they can allow scope to change. When scope is done properly it generates confidence on exactly where to look based on tests and evidence.

This is not to say that it is easy. A major retail executive once told me his company had no need for antivirus on their point of sale devices. Why? He believed his systems had no viruses, therefore he saw no need for antivirus. I had to convince him that he should be taking the opposite approach. Use of antivirus would confirm the lack of viruses. An absence of empirical data, let alone awareness of helpdesk and incident reports, did not register with this executive. This is a fine case of why risk is something that can not always be left to intuition alone or to market forces. Many actors operate with trust or hope rather than a complete or reasonable data set. A month after installing antivirus the executive was extremely thankful — he soon found a clear path to reduce point of sale outages and thus his operating costs were significantly reduced.

The steps to take after hearing “no” and “out of scope” are illustrated nicely in the SSC Wireless Guidelines decision tree:

Skimming Prevention

The PCI SSC just released a document on how to detect and prevent skimming.

Skimming, as the word implies, is capturing data as it passes through a device. That means devices are usually modified so they will copy and record data to unauthorized storage or they will send it out over an unauthorized network connection.

The guide includes many images of skimming devices as well as an easy risk assessment form to help outline potential areas of vulnerability such as physical location, hours of operation, personnel and technology. In a nutshell the advice is the usual “watch for anything suspicious”. This means anything that accepts cards should have a known safe appearance (wires, stickers) as well as a clean/safe space around it. Staff should be trained such that any changes to the appearance or items introduced into the safe space should raise suspicion and be reported.

If you see Tetris running on Chip and PIN terminal, for example, you should not assume all is well with security.

Criminals will try anything to get access to the card data. Have you seen those charity boxes that often sit on a counter near a register? These have been known to be used to place hidden cameras next to a device to record PIN information. Here is another example from the guide: