Vulnerabilities / Threats
5/30/2013
01:34 AM
Connect Directly
RSS
E-Mail
50%
50%

Halting Cybercrime Requires Cutting Off Easy Money

The crackdown on Liberty Reserve underscores the danger posed by anonymous money transfers using virtual or digital currencies -- a facet of cybercrime increasingly under scrutiny by law enforcement

The successful compromise of an employee's or consumer's computer is only the start of an online crime. Without the ability to move money from the victim's account to the attacker's accounts through intermediaries, most cybercriminals would be stymied.

The shutdown of the Liberty Reserve money transfer service and the arrest last week of its two founders and three other employees on charges of money laundering highlight the role that digital currencies have in the cybercrime food chain. Incorporated in Costa Rica, Liberty Reserve had more than 1 million customers worldwide and processed more than $6 billion in transfers, much of which came from the proceeds of credit-card fraud, computer hacking, identity theft, and other cybercrimes, according to a statement published this week by the U.S. Attorney's Office for the Southern District of New York.

While that seems enormous, it's hardly surprising: Almost every criminal transaction in the black market uses virtual currencies, Dmitry Bestuzhev, head of the global research and analysis team for Kaspersky Lab's Latin American operations, stated in an e-mail interview. Focusing on that aspect of cybercrime should be a priority for law enforcement agencies, he says.

"Maybe in the future we are going to see other interesting scenarios where, instead of only fighting malware, law enforcement will just cut out online payment systems and cybercriminals will be left without their main motivation -- money," Bestuzhev says.

The focus on money is as old as law enforcement's investigation of financial crimes. However, with new technologies and the increasing movement of money through virtual worlds and online exchange systems, law enforcement has only scratched the surface with its crackdown on Liberty Reserve.

Already, online users of exchange services have begun moving their money to other services. Exchange system PerfectMoney.com, for example, stated on May 27 that it was adding new servers to help manage the load caused by an influx of customers. In addition, bitcoins have become popular, and while less convenient than many other currencies, they allow anonymity -- a key attribute sought by criminals. Virtual currencies also pose a money laundering threat. In 2007, anti-fraud experts began recommending that law enforcement authorities take a hard look at virtual currencies -- those used in virtual worlds, such as Linden Labs' Second Life and Blizzard's World of Warcraft.

Just as Liberty Reserve became popular following the 2007 shutdown of a similar service, E-Gold, another service will likely crop up to replace Liberty Reserve.

[An international cybercrime ring hacked an unnamed credit card processor, stole prepaid debit cards, and quickly cashed them out in a highly orchestrated operation that spanned the globe. See 8 New Yorkers Indicted As Part of $45 Million Cyberheist Of Prepaid Debit Cards.]

"There has been an awakening to the threat of these digital currencies -- at least in the United States, and I think in other countries," says Alan Brill, senior managing director for cybercrime at global security firm Kroll. "It is really going to be a matter of how well the government is able to work with operators that are trying to do the right thing, and how those operators fare in the marketplace relative to the people who are not taking those steps."

The Financial Crimes Enforcement Network (FinCEN), part of the U.S. Department of the Treasury, issued guidance in March that classified money exchangers -- defined as persons or groups trading virtual currency for real currency -- as a money service business, or MSB, and thus open to regulation by FinCEN under the Bank Secrecy Act. Earlier this month, the U.S. Department of Homeland Security used the rule to seize U.S.-based funds of Mt.Gox, the largest bitcoin exchange, as part of its investigation into the site for unregulated money transfers.

In addition, virtual worlds -- from Second Life to the World of Warcraft -- have become potential digital pipelines for money laundering. In early May, in response to the FinCEN ruling, Linden Labs -- the creator of Second Life -- changed its terms of service to cut off third-party exchangers.

Yet the digital currency is not to blame for the problems, says Clare Chambers-Jones, an associate professor of banking and finance law at the University of the West of England (UWE) Bristol Law School.

"Because the currencies are there, you are going to have the criminals trying to use them as means to get money out of the country," she says. "It is not the digital currency that is creating a cybercrime -- it is the people. It is really that simple in my mind."

While digital currencies have not had much success in the U.S., they are starting to take off in other countries to work around their less developed or reliable banking systems. While U.S. citizens are likely to have at least one credit card to pay for online goods, for example, citizens of other countries are more likely to use some form of stored value on their mobile phones, Chambers-Jones says.

That means that digital and virtual currencies are here to stay. And while law enforcement and some federal agencies have used novel tactics to interdict the flow of criminal gains, legislators are still behind, so new regulations will be delayed, she says.

"The digital currencies are decentralized, unregulated, and these are the aspects that confuse legislators," she says. "It takes so long for any form of law to come into being, that they can't really keep up with the pace of technologies."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Robert Lemos is a veteran technology journalist of more than 16 years and a former research engineer, writing articles that have appeared in Business Week, CIO Magazine, CNET News.com, Computing Japan, CSO Magazine, Dark Reading, eWEEK, InfoWorld, MIT's Technology Review, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

CVE-2012-5702
Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

CVE-2013-7406
Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-4514
Published: 2014-10-21
Cross-site scripting (XSS) vulnerability in includes/api_tenpay/inc.tenpay_notify.php in the Alipay plugin 3.6.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via vectors related to the getDebugInfo function.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.