Attacks/Breaches
12/15/2014
03:35 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Price Tag Rises For Stolen Identities Sold In The Underground

What cybercriminals now charge for stolen identities, counterfeit identities, hacking tutorials, DDoS, and other services.

One year after the cybercrime underground slashed the price of a stolen identity by as much as 37% due to a glut in the black market, the price tag for a pilfered ID has inched upward again.

Researchers at Dell SecureWorks published their latest report on the underground hacker market today. Counterfeit identities are the new hot product to support fraud -- new fake identity kits, passports, Social Security numbers, utility bills, and driver's licenses. A new identity, including a working SSN, name, and address, goes for $250, and for an additional $100, you can get a utility bill for ID verification purposes when perpetrating fraud, the researchers found.

Stolen IDs are cheaper than phony ones, but a bit pricier than last year. A "fullz" -- as a stolen personal identity is known in the underground -- now goes for $30 in the US, up from $25 last year. A fullz in the UK, Australia, Canada, Asia, and the European Union is priced from $35 to $45, up from $30-$40 in 2013.

Meanwhile, the massive volume of stolen payment cards up for sale in the wake of an epic year in retailer data breaches has led to more nefarious vendors of stolen and counterfeit identity information trying to make a buck than ever, according to Dell SecureWorks. As a result, more of these vendors emphasizing customer service, with 100% guarantees on stolen information they're selling, for example. One seller promises to replace all "dead" stolen credit cards.

"The market almost mimics a real [and legitimate] one," says David Shear, network security analyst with Dell SecureWorks. "When you buy, they guarantee it will work up to a certain amount, [for example]. They are going out of their way" to differentiate based on customer service. Among some of their offerings are frequent buyer discounts and a more professional-looking presence.

The bad guys also are offering more services to their customers, such as tutorial services on how to hack and commit fraud. Among the services: basic carding, cashing out fullz, ATM hacking, and successful online banking fraud. The tutorial manuals are priced anywhere from $1 to $30.

Premium credit cards -- platinum and gold cards, for example -- can be purchased in bulk. One vendor offers a package of 10 cards at $13 apiece and up to 2,000 cards at $9 apiece. A single premium payment card can go for as much as $35. That same site says it has 14 million US credit cards for sale, plus hundreds of thousands more from other countries.

"I was surprised they said that. Most don't tell you how many cards they have," Shear says.

The price of a remote access Trojan (RAT) has dropped dramatically this year, from $50-$250 in 2013 to $20-$50 this year -- mostly Darkcomet, Blackshades, Cybergate, Predator Pain, and Dark DDoSer. Why the major price cut? The researchers believe it's due to the number of free RATs available in the wake of RAT source code leaks, which has driven the price point down.

[New report unearths what cybercriminals are charging for stolen identities and hacking services, such as DDoS and doxing. Read Glut In Stolen Identities Forces Price Cut In Cyberunderground.]

Bad guys buying bots can purchase a package of 5,000 compromised machines in the US for between $600 and $1,000. That's pricier than a UK bot package, which goes for $400-$500; the difference is likely due to the higher volume of financial site access of US machines.

The credentials to a "high-value" bank account with a balance of $70,000 to $150,000 can be purchased for about 6% of the balance amount in the underground. So that's $4,200 for access to a $70,000 bank account, the researchers found.

Interestingly, the report says there weren't many doxing services this year like there were last year. The ones that were offering services do so for $25-$100.

Here is a look at the underground pricing SecureWorks found:

Source: Dell SecureWorks
Source: Dell SecureWorks

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/17/2014 | 8:17:23 AM
Re: Hacking: Supply Exceeds Demand ?
@Technorati, I am with you on how fascinating it is to see the pricing structure. It really does illustrate just how bad things are and how cyber crime is now a business sector of its own.
aws0513
50%
50%
aws0513,
User Rank: Ninja
12/16/2014 | 3:11:54 PM
Re: Regional pricing
My guess on Asia system prices would be the reliability and/or value of the identity.

Much of Asia still has very limited (slower) connectivity.  Another factor is lack of reliable power in many large portions of the region.
Apply the factor that many Asian system owners still run older system platforms that are prone to failures or simply way too slow to be useful and you have a situation where running any cyber-ops can be too frustrating to pay for.  Don't get me wrong, there are still powerful systems in that region, but not the numbers that western regions may have.
A key indicator  in that region would be that there is no mention of a 10,000 system package in Asia.  It may be too much to even ask to try to get that there.
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
12/16/2014 | 10:06:36 AM
Regional pricing
Considering the pricing chart showing such cheaper infections for systems in Asia, I wonder if a focus on improving security over there would have a knock on with the rest of the world? Clearly it's the lowest common denominator when it comes to secure systems. 
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
12/15/2014 | 6:41:44 PM
Hacking: Supply Exceeds Demand ?

The price chart of Hacking Cost is really fascinating.   I have never seen it itemized like this.  And I must say I thought the prices would be higher, but I guess there is a glut in the market now.

Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.