{"id":7396,"date":"2014-11-17T21:01:56","date_gmt":"2014-11-18T05:01:56","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7396"},"modified":"2020-04-21T14:20:10","modified_gmt":"2020-04-21T21:20:10","slug":"cybersecurity-canon-rick-howard-reviews-brian-krebs-spam-nation","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/11\/cybersecurity-canon-rick-howard-reviews-brian-krebs-spam-nation\/","title":{"rendered":"The Cybersecurity Canon: Read Rick Howard's First-Look Review of SPAM Nation by Brian Krebs"},"content":{"rendered":"<p><em>The Cybersecurity Canon is official, and you can now see our website <a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. We modeled it after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have 20 books on the initial candidate list but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so!<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-9648 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png\" alt=\"cybersec canon red\" width=\"500\" height=\"218\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-230x100.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-510x223.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red-91x40.png 91w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/07\/cybersec-canon-red.png 786w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><strong>Book Review<\/strong>: <em>Spam Nation: The Inside Story of Organized Cybercrime from Global Epidemic to Your Front Door<\/em> (2014) by Brian Krebs<\/p>\n<p><!--more--><\/p>\n<h3>Executive Summary<\/h3>\n<p>In <em>Spam Nation<\/em>, Brian Krebs covers a key portion of our cybersecurity and cyber crime history: 2007\u20132013, that period when we started to learn about the Russian Business Network, bulletproof-hosting providers, fast-flux obfuscation, criminal best business practices, underground cyber crime forums, and strange-sounding botnet names like Conficker, Rustock, Storm, and Waledac.<\/p>\n<p>This period just happens to coincide with Krebs\u2019s rise in popularity as one of the leading cybersecurity journalists in the industry. His relationship with two competitive pharmaceutical spammers\u2014Pavel Vrublevsky and Dimitry Nechvolod\u2014is a big bag of crazy and is the key storyline throughout the book. The competition between Vrublevsky and Nechvolod escalated into something that Krebs calls the Pharma Wars and Krebs gives us a bird\u2019s-eye view into the details of that escalation that eventually destroyed both men and the industry they helped to create. Krebs\u2019s weird symbiotic relationship with Vrublevsky is worth the read by itself. <em>Spam Nation<\/em> is definitely a Cybersecurity Canon candidate. It\u2019s just out today, so I won\u2019t say you should have read this by now \u2013 but get on it as soon as you can.<\/p>\n<h3>Introduction<\/h3>\n<p>I have been a fan of Brian Krebs for many years. His blog, <a href=\"http:\/\/krebsonsecurity.com\" target=\"_blank\" rel=\"noopener noreferrer\">Krebs on Security<\/a>, has been a mainstay of my reading list since he started it in 2010, and even before when he was writing for <em>The Washington Post<\/em>. Since he struck out on his own, he has carved out a new kind of journalism that many reporters are watching to see how they might duplicate it themselves as journalism transitions from dead-tree printing to new media, and the idea that the author is the brand. Krebs\u2019s beat is cybersecurity, and he is the leading journalistic authority on the underbelly of cyber crime. <em>Spam Nation<\/em> is a retelling \u2014 with more detail and more color \u2014 of some of the stories he covered from 2007 until about 2013 on a very specific sub-element of the cyber crime industry called pharmaceutical spam.<\/p>\n<p>Many security practitioners will hear the phrase \u201cpharmaceutical spam\u201d and immediately start to nod off. Of all the problems they encounter on a daily basis, pharmaceutical spam is pretty low on the priority list. While that may be true, this subset of cyber crime is responsible for starting and maturing many of the trappings that we associate with cyber crime in general: botnet engines, fast-flux obfuscation, spamming, underground forums, cyber crime markets, good service as a distinguisher of criminal support services, and bulletproof-hosting providers.<\/p>\n<h3>The Story<\/h3>\n<p>The story really begins with Krebs\u2019s weird symbiotic relationship with Vrublevsky (a.k.a. RedEye and Despduck). Vrublevsky was a Russian businessman, and cofounder and former CEO of ChronoPay, the infamous credit card processing company that initially got started in the rogue anti-virus industry. I think it is safe to say that in his heyday, Vrublevsky was a bit of an extrovert. He followed Krebs\u2019s blog religiously and would instigate long conversations with Krebs on stories that were fantastical, true, and everything in between. Vrublevsky would feed Krebs half-truths about what was going on in the industry and left it to Krebs to sort it out. Vrublevsky\u2019s downfall was his deteriorating relationship with his former partner, Dimitry Nechvolod (a.k.a. Gugle).<\/p>\n<p>Vrublevsky and Nechvolod founded ChronoPay together in 2003, but by 2006, Nechvolod had left the company to pursue his own interests. He started two pharmacy spam operations called GlavMed and SpamIT. Because of the competition between these two men, the situation escalated out of control, to something that Krebs calls the Pharma Wars, which ultimately scuttled the entire pharmaceutical spam industry, not just Vrublevsky and Nechvolod\u2019s operations, but everybody else\u2019s, too.<\/p>\n<p>Krebs\u2019s main sources of information for this book came from leaked customer and operational databases from these two men. Although Vrublevsky and Nechvolod never admitted it, they both stole the other\u2019s data and leaked it to Krebs. Krebs had many conversations with both Vrublevsky and Nechvolod about their side of the story, and Krebs even traveled to Moscow to interview Vrublevsky personally. From these conversations and other research done by Krebs, we get an inside view of how cyber crime operates in the real world.<\/p>\n<p>Krebs set himself seven research questions:<\/p>\n<ul>\n<li>Who is buying the stuff advertised in spam and why?<\/li>\n<li>Are the drugs real or fake?<\/li>\n<li>Who profits?<\/li>\n<li>Why does the legitimate pharmaceutical industry seem powerless to stop it?<\/li>\n<li>Why is it easy to pay for the drugs with credit cards?<\/li>\n<li>Do customers have their credit card accounts hacked after buying?<\/li>\n<li>What can consumers, policy makers, and law enforcement do [about this cybercrime]?<\/li>\n<\/ul>\n<p>For the most part, he answers all these questions in the book. I will not spill the answers here, but I will tell you that I was surprised by every single one. I thought I knew this stuff, but Krebs provides the insight and research to make you re-evaluate what you think you know about illegal pharmaceutical spam operations.<\/p>\n<p><em>Spam Nation<\/em> is about the Brian Krebs story, too. Traditional journalists reading this book are going to hate the fact the he plays a key role in most everything that he talks about in this book, but it seems inevitable given that Krebs is himself a journalistic brand now. His original reporting on bulletproof-hosting providers operating in the US and elsewhere \u2014 the Russian Business Network (RBN), Atrivo, and McColo \u2014 became that catalyst that eventually got them shut down. This got him noticed by Vrublevsky and started that weird relationship that ultimately led to Krebs receiving the databases from Vrublevsky and Nechvolod. It also led him to leave <em>The Washington Post<\/em> and to start Krebs on Security.<\/p>\n<p>In the background, Krebs introduces us to the key players involved in the development and operations of some of the most infamous botnets that have hit the Internet community in recent history:<\/p>\n<ul>\n<li>Conficker worm (author: Severa; infected 9-15 million computers)<\/li>\n<li>Cutwail botnet (authors: Dimitry Nechvolod (Gugle) and Igor Vishnevsky; 125,000 infected computers; spewed 16 billion spam messages a day)<\/li>\n<li>Grum botnet (author: GeRA; spewed 18 billion e-mails a day)<\/li>\n<li>Festi botnet (operators: Artimovich brothers; delivered one-third of the total amount of worldwide spam)<\/li>\n<li>Rustock botnet (author: COSMA; infected 150,000 PCs; spewed 30 billion spam messages a day)<\/li>\n<li>Storm botnet (author: Severa).<\/li>\n<li>Waledac botnet (author: Severa; spewed 1.5 billion junk e-mails a day)<\/li>\n<\/ul>\n<p>From my reading, Krebs\u2019s unintentional hero of his story is Microsoft. While Vrublevsky and Nechvolod were tearing each other apart and Krebs was trying to sift through what was true and what was not, Microsoft and other commercial, academic, and government organizations were quietly dismantling the infrastructure that these and other illicit operations depended on:<\/p>\n<ul>\n<li>June 2009: 15,000 illicit websites go dark at 3FN after the Federal Trade Commission convinced a northern California judge that 3FN was a black-hat service provider. NASA did the forensics work.<\/li>\n<li>November 2009: FireEye takes down the Mega-D botnet.<\/li>\n<li>January 2010: Neustar takes control of the Lethic spam botnet.<\/li>\n<li>March 2010: <strong>Microsoft<\/strong> takes down the Waledac botnet.<\/li>\n<li>October 2010: Armenian authorities take down the Bredolab botnet.<\/li>\n<li>March 2011: <strong>Microsoft<\/strong> takes down the Rustock botnet.<\/li>\n<li>July 2011: <strong>Microsoft<\/strong> offers a $250,000 reward for information leading to the arrest and conviction of the Rustock botmaster.<\/li>\n<li>July 2012: FireEye and Spamhaus take down the Grum botnet.<\/li>\n<li>July 2013: <strong>Microsoft<\/strong> and the FBI take down 1,400 botnets using the Citadel malware to control infected PCs.<\/li>\n<li>December 2013: <strong>Microsoft<\/strong> and the FBI take down the ZeroAccess botnet.<\/li>\n<li>June 2014: The FBI takes down of the Gameover Zeus botnet.<\/li>\n<\/ul>\n<p>One takedown masterstroke came out of academia. George Mason University, the International Computer Science Institute, the University of California, San Diego, and <strong>Microsoft<\/strong> determined that 95 percent of all spam credit card processing was handled by three financial firms: one in Azerbaijan, one in Denmark, and one in Nevis (West Indies). They also pointed out that these financial firms were in violation of Visa\u2019s own Global Brand Protection Program contract that required fines of $25,000 for transactions supporting the sale of Viagra, Cialis, and Levitra. Once Visa started levying fines, the financial firms stopped processing the transactions. The beauty of this takedown was that this was not a legal maneuver through the courts and law enforcement. It merely encouraged Visa to follow its own policy.<\/p>\n<h3>Cyber Crime Business Operations<\/h3>\n<p>For me, one of the most enjoyable parts of <em>Spam Nation<\/em> is the insight on how these criminal organizations operate. For example, Krebs highlights why pharmaceutical operations have great customer support: they want to avoid the penalty fees associated with a transaction when a buyer of illicit pills charges them with fraud. These are called chargebacks, and pharmaceutical customer support operations avoid them like the plague. These support operations require teams of software developers and technical support staff to be available 24\/7.<\/p>\n<p>Pharmaceutical operations have mature anti-fraud measures \u2014 equivalent to any legitimate bank\u2019s anti-fraud measures \u2014 because they need to keep law enforcement and security researchers out of their business.<\/p>\n<p>Most spammers do not make a lot of money. The top five do, but not everybody else. Krebs points out that it takes a multibillion-dollar security industry to defend against a collection of criminals who do this to make a living wage.<\/p>\n<p>In terms of botnet management, operators rent out top-earning botnets to other operators who do not have the skill to build a botnet themselves. Renters purchase installs and seed a prearranged number of bots with an additional malicious program that sends spam for the affiliate. They pay the rent by diverting a portion of their commissions on each pill sale from spam. Sometimes, that commission is as high as 50 percent. That is why the small-timers do not make any money.<\/p>\n<p>Operators launder their money in a process called factoring. They map their client transactions into accounts on behalf of previously established shell companies. They tell the banks that the shell companies are the true customers. Then the operators pay the clients out of their own pockets.<\/p>\n<p>Russian law allows FSB agents (Federal Security Service, the successor to the Soviet Union\u2019s KGB), while remaining in the service, to be assigned to work at enterprises and organizations at the consent of their directors. Twenty percent of FSB officers are engaged in this protection business called \u201cKrusha\" in Russian, which means \u201croof\u201d and pharmaceutical spam operations use them as much as possible.<\/p>\n<p>Partnerships, called partnerkas, between spammers and dodgy advertisers that act as an intermediary for potential sponsors are essential. In this way, sponsors keep their distance from the illicit aspects of the spam business and can unplug from one partnerka in favor of another whenever they want. Some refer to this as organized crime (think <em>The<\/em> <em>Godfather<\/em>), but it is more like a loosely affiliated network of independent operators.<\/p>\n<p>With all of these best business practices, you can see why the operators do not see themselves as criminals. They are just businesspeople trying to run a business.<\/p>\n<h3>The Tech<\/h3>\n<p>Cyber crime runs on technology. In the pharmaceutical spam business, some tech is unique, and other tech is shared with other kinds of cyber crime operations. Unique to pharmaceutical spam is a technique called black search engine optimization (Black SEO). Pharmaceutical spammers hack legitimate websites and insert hidden pages (IFrames) with loads of pharmaceutical websites links. The more links that the common search engines like Google and Bing index, the higher the pharmaceutical sites get in the priority list when normal users search for pills online.<\/p>\n<p>Also unique to the pharmaceutical spam business is a good spam ecosystem. It must have the ability to keep track of how many e-mails the system delivered and how many recipients clicked the link. It must scrub e-mail addresses that are no longer active or are obvious decoys and harvest new e-mail addresses for future operations.<\/p>\n<p>Not unique to pharmaceutical spam are the forums. Forums are the glue that allows the loosely affiliated network of independent operators to communicate with each other. Forums are a place that allows newbies an opportunity to establish a reputation and lowers the barriers to entry for a life of cyber crime. There are forums for every language, but most are in English. Members enforce a strict code of ethics so that members who are caught cheating other members are quickly banned. Social networking rankings give members a way to evaluate potential partners. A single negative post may cost an individual thousands of dollars. Because of that, most amicably resolve issues. Sometimes newbies get labeled as a \u201cdeer,\u201d or members who unintentionally break one of the forum\u2019s rules. More serious infractions might find a member in the blacklist subforum defending himself or herself from fraud allegations.<\/p>\n<p>New forums start all the time, but some have been in existence for more than a decade, indicating process maturity for self-policing, networking, and rapid information sharing. New forums allow open registration, but mature forums set up various hurdles for membership that are designed to screen out law enforcement and hangers-on. Most have sub-rooms for specialization such as the following:<\/p>\n<ul>\n<li>Spam<\/li>\n<li>Cyber banking fraud<\/li>\n<li>Bank account cash-out schemes<\/li>\n<li>Malicious software development<\/li>\n<li>ID theft<\/li>\n<li>Credit card fraud<\/li>\n<li>Confidence scams<\/li>\n<li>Black SEO<\/li>\n<\/ul>\n<p>Forums have many members (tens of thousands in some), but they exist to make money for the administrators. Admins offer additional services to improve the user experience. They offer escrow services \u2014 a small percentage of the transaction cost held until both sides agree that the other held up its end of the bargain \u2014 and stickies \u2014 ads that stay at the top of their sub-forums that range in price from $100 to $1,000 per month.<\/p>\n<h3>Conclusion<\/h3>\n<p>In <em>Spam Nation<\/em>, Brian Krebs covers a key portion of our cyber security and cyber crime history: 2007\u2013 2013, that period when we started to learn about the Russian Business Network, bulletproof-hosting providers, fast-flux obfuscation, criminal best business practices, underground cyber crime forums, and strange-sounding botnet names like Conficker, Cutwail, Grum, Festi, Rustock, Storm, and Waledac. This period just happens to coincide with Krebs\u2019s rise in popularity as one of the leading cybersecurity journalists in the industry. His story, and the story of two competitive pharmaceutical spammers who eventually destroyed the lucrative moneymaking scheme for all players, is a fascinating read. It is definitely a Cybersecurity Canon candidate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity Canon is official, and you can now see our website here. We modeled it after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have 20 books &hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89,155,4521],"tags":[245,251,899,901,902,898,900],"coauthors":[791],"class_list":["post-7396","post","type-post","status-publish","format-standard","hentry","category-ciociso","category-cybersecurity-2","category-canon","tag-brian-krebs","tag-cybersecurity-canon","tag-krebs-on-security","tag-nechvolod","tag-pharmaceutical-spam","tag-spam-nation","tag-vrublevsky"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7396"}],"version-history":[{"count":11,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7396\/revisions"}],"predecessor-version":[{"id":109891,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7396\/revisions\/109891"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}