Cloud

10/29/2014
05:30 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Keep Calm & Verify: How To Spot A Fake Online Data Dump

Determining whether a data dump on Pastebin or elsewhere online is legit can be time-consuming and resource-intensive. Deloitte & Touche offers tips for how to weed out the fake hacks.

You've seen the online claims and headlines: hackers boasting on Twitter or another online forum that they've hacked a major company's database or website and have leaked the stolen user credentials or credit-card numbers for all to see on Pastebin or another site.

But just because a data dump is posted online doesn't mean it's legitimate. The victimized organization and threat intelligence experts have to investigate the leaks, a process that can be time-consuming, resource-intensive, and even hurt other security projects or monitoring. Worst-case, investigating a phony data dump could detract from an enterprise's efforts to detect or mitigate a real data breach.

Allison Nixon, a threat researcher with Deloitte & Touche LLP, has seen the phony data breach dump scenario many times as a researcher with experience investigating them. "It's pretty common that data dumps that come to me were actually fake," says Nixon, who has authored a new report with recommended techniques for vetting the authenticity of a data dump. "I would say it's a waste of everyone's time" to have to investigate phony ones, which can take days to verify. Not only that, but a company's reputation can easily be damaged by a phony data dump that wasn't tied to a real breach, she says.

Online data dumps traditionally are the handiwork of hacktivists or others looking for notoriety, but they also can be a tool for duping other bad guys or even just to taint the purported victim organization's reputation. So who's behind the fake data dumps? "I wouldn't consider these really dangerous people," Nixon says, because if they had the skills to perpetrate a real breach, they'd have done so instead.

There are several possible motivations for posting phony stolen data such as fake usernames, passwords, or credit-card numbers. One MO is using phony data as a marketing tool for the cyber underground. "The notion of dumping fake data is nothing new. Those kind of dumps are usually used as a 'proof' to sell a bigger dump in underground forums," so they defraud fellow bad guys, says Aviv Raff, CTO at Seculert.

"There is no honor amongst criminals," Raff notes. "So, the same way they cheat the good guys, they also try to cheat the other bad guys. Needless to say, most of the criminals are not that stupid, and this is why we don't see those fake dumps so often."

While the notion of fake data being posted online may seem benign to the purported victim, even these made-up data dumps can be dangerous to a company's reputation. And in today's lucrative cybercrime world, the most worrisome scenario would be a phony data dump used as a distraction or smokescreen for waging a real attack on the victim, akin to how some distributed denial-of-service (DDoS) attacks are used to detract from an actual attack on the victim's internal network.

"It actually goes deeper" in some situations, as state actors or competitors can use bad news or rumors to influence capital markets, says Robert Capps, senior director of customer success at RedSeal Networks and the former head of security and anti-fraud at StubHub.

"What if it's a cover? What if it's an attempt to draw attention to a fake breach and then someone is actually breaching" the victim in the background, he says. "You may miss some sort of hit on a workstation that suddenly has malware on it. A lot of these teams are massively understaffed, so they are not in a position to even respond" without some outside help, he says.

Even the insinuation that a firm was hacked, as in the recent case of StubHub users whose stolen credentials were used for ticket fraud, can stick. "Some called it a breach at StubHub even though it wasn't," Capps says.

Deloitte's Nixon has come up with a streamlined way to vet data dumps to save time and resources. Among her suggestions:

Check for recycled booty: This is a way to determine if the data is just older stolen information being presented as new booty. "Seek out unique-looking artifacts such as passwords, different names, text snippets from the rant in the preamble, etc., and simply perform a search for them," Nixon writes.

Check email redundancy: Two user accounts can't typically use the same email address, so check for what Nixon calls "email uniqueness." That entails checking to see if an email exists on the "victim" website's database. "If the company does enforce email uniqueness, the veracity of the leak can be tested by changing an account’s email to randomly selected emails in the leak. Almost all emails should be traceable to the company’s site; untraceable emails indicate that the leak is very likely fake."

Confirm that the username exists: "If account creation is allowed on the site, attempting to create accounts with usernames from the dump should result in error messages if duplicates are not allowed. This technique works using the same fundamental concept as the 'email uniqueness' section above: If unique identifiers are shown in the leaked dump, attempt to duplicate them on the live site." If the website allows you to view another user's profile, you can verify its validity as well, she says.

Check for adherence to password policy: Match the quality of the passwords by the site's password policy. "It would be suspicious if the policy is generally enforced but a large number of leaked credentials are not in adherence to the site’s password policy. Conversely, if no password policy exists, and no users have absurdly simple passwords like '123456,' the leak should be treated with suspicion."

Analyze the password origin: Stolen, complex passwords that the attacker says came out of a cracked hash list "are suspect," the report says.

Check credit card formats: Check the format of the credit card accounts that were dumped, the report says. You can also spot phony accounts by checking the issuing banks: "For example, a breach in America yielding credit cards mostly issued by banks in the Netherlands would raise some questions."

Contact the victim: You can also try to track down the people listed in the dump to determine whether they exist and their information is compromised, according to the report.

Take the "smell test": Then there's the smell test. "For example, a claim by a hacking group that it plans to release a vast credit card dump should be met with suspicion. Credit card dumps retain high dollar values on fraud markets and releasing a list for free would not be rational."

An "FBI breach" dump on Pastebin, for example, that includes "passwords123" as an FBI user password would obviously raise suspicion, according to the report.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
11/1/2014 | 7:41:36 PM
Re: Most likely Scenario
Yes--definitely some even more nefarious scenarios here.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
10/31/2014 | 5:14:09 PM
Most likely Scenario
"It actually goes deeper, in some situations, as state actors or competitors can use bad news or rumors to influence capital markets"

When I read this headline, this was my exact thoughts on what a fake dump could be used for.  Imagine a situation where someone has a large number of stocks invested in company A.  Company B is a direct competitor of company A.  By releasing a massive fake dump of Company B's records you could hope to artificially increase the stock price of company A.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
10/31/2014 | 9:37:58 AM
Re: Seems like this is reprinted on several sites
We all must have been briefed on it by Deloitte and wrote pieces on it. :-)

I misunderstood your initial comment--I thought you meant our actual article had been posted on other sites. 

 
SgS125
50%
50%
SgS125,
User Rank: Ninja
10/31/2014 | 9:35:37 AM
Re: Seems like this is reprinted on several sites
Sure I read this on Krebs and saw a reference there to a similar article on CSOonline.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
10/30/2014 | 5:51:33 PM
Re: Seems like this is reprinted on several sites
I hope not. Can you tell me where else you're seeing this article? thanks!
SgS125
50%
50%
SgS125,
User Rank: Ninja
10/30/2014 | 4:04:28 PM
Seems like this is reprinted on several sites
Must be a slow news day, this same article, almost repeated in some paragraphs in on several sites.
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Be a unicorn, not a donkey...
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.