Computer Fraud and Abuse Techniques
Computer Fraud and Abuse Techniques
• Russian hackers broke into Citibank’s system and stole $10 million
from customer accounts.
• Acxiom manages customer information for credit card issuers,
banks, automotive manufacturers, and retailers. A systems
administrator for a company doing business with Acxiom
exceeded his authorized access, downloaded an encrypted
password file, and used a password-cracking program to access
confidential Ids. The intrusion cost Axciom over $5.8 million.
• A 17-year old hacker broke into Bell Laboratories network,
destroyed files, copied 52 proprietary software programs, and
published confidential information on underground bulletin
boards. Many hackers are young, some as young as 12.
• A hacker penetrated a software supplier’s computer and used
its “open pipe” to a bank customer to install a powerful Trojan
horse in the bank’s computer.
• In the worst security breach in gaming history, 101 million Sony
PlayStation accounts were hacked, crashing the network for
over a month. More than 12 million credit card numbers, e-mail
addresses, passwords, home addresses, and other data were
stolen.
Hijacking is gaining control of a computer to carry out illicit
activities without the user’s knowledge.
• A DoS attack shut down 3000 websites for 40 hours on one of the
busiest shopping weekends of the year.
• CloudNine, an Internet service provider, went out of business
after DoS attacks prevented its subscribers and their customers
from communicating.
• An estimated 1 in 12 e-mails carried the MyDoom virus at its
peak. The virus turned its host into a zombie that attacked
Microsoft, Amazon, Yahoo, CNN, and eBay.
Spamming is simultaneously sending the same unsolicited
message to many people at the same time, often in an attempt to
sell something. Spammers stage dictionary attacks, where they
use special software to guess company e-mail addresses and
send them blank e-mail messages. Unreturned messages are
usually valid e-mail addresses that can be added to spammer e-
mail lists.
Hacker
Masquerading or impersonation is pretending to be an authorized
user to access a system. This is possible when the perpetrator
knows the user’s ID number and password or uses the computer
after the user logs in.
Piggybacking
• The clandestine use of a neighbor’s WiFi network; this can be
prevented by enabling the security features in the wireless
network.
• Tapping into a communication line and electronically latching
onto a legitimate user before the user enters a secure system;
the legitimate user unknowingly carries the perpetrator into the
system.
• An unauthorized person following an authorized person through
a secure door, bypassing physical security controls such as
keypads, ID cards, or biometric identification scanners.
Evil twin is a wireless network with the same name (called Service
Set Identifier or SSID) as a legitimate wireless access point.
Evil twin is a wireless network with the same name (called Service
Set Identifier or SSID) as a legitimate wireless access point. The
hacker either uses a wireless signal that is stronger than the
legitimate signal or disrupts or disables the legitimate access point
by disconnecting it, directing a DoS against it, or creating radio
frequency interference around it. Users are unaware that they
connect to the evil twin. The perpetrator monitors the traffic
looking for confidential information. Hackers also use evil twin to
unleash a wide variety of malware and to install the software to
attack other computers.
Time bombs and logic bombs are trojan horses that lie idle until
triggered by a specified date or time, by a change in the system,
by a message sent to the system, or by an event that does not
occur. Once triggered, the bomb goes off, destroying programs,
data, or both.