West African cybercrime underground economy emerging, finds joint INTERPOL-Trend Micro paper
LYON, France – A joint INTERPOL and Trend Micro research paper on cybercrime activity across West Africa has revealed a significant growth in cyber frauds on individuals and businesses.
Combining survey results from INTERPOL member countries across the region with research findings by Trend Micro, the ‘Cybercrime in West Africa: Poised for an Underground Market’ paper shows West African cybercriminals are increasingly using social engineering tactics.
The survey showed an increase of 132 per cent of reported cybercrime between 2013 and 2015, with an average of USD2.7 million from business and USD422,000 from individuals stolen each year. However an average of 30 per cent of cybercrimes reported to law enforcement in the region over the same period resulted in arrests.
The paper shows two major types of threat actors are active throughout the region – so-called ‘Yahoo boys’ and ‘Next-Level Cybercriminals’.
Named for their reliance on Yahoo apps to communicate, the Yahoo boys came to prominence in the early 2000s, focusing on less technically advanced schemes such as advanced-fee, stranded traveller and romance frauds.
‘Next-Level Cybercriminals’ carry out more sophisticated attacks, such as Business Email Compromise (BEC) and tax frauds, often using keylogging software, Remote Access Trojans (RATs) and other crime-enabling software.
“This joint paper shows that criminals across the region are becoming more technically savvy, and this emerging underground market will require an even stronger law enforcement response in the future, both in terms of training for investigators and ensuring the appropriate legislation is in place,” said Noboru Nakatani, Executive Director of INTERPOL’s Global Complex for Innovation (IGCI).
“In addition to building awareness of cybercrime-related issues across West Africa and beyond, the research also highlights the importance of public-private partnerships in identifying and arresting criminals, as well as educating businesses and governments about cyber threats.
“The joint paper with Trend Micro, and other activities coordinated by the IGCI, demonstrate the Organization’s ongoing commitment to collaborative partnerships to mitigate the damage caused by cybercriminals on the world economy and society,” concluded Mr Nakatani.
In 2016, INTERPOL and the Nigerian Economic and Financial Crime Commission, supported by private sector partners including Trend Micro, carried out a joint operation which led to the arrest of 'Mike' in Nigeria, the alleged head of an international criminal network behind thousands of online frauds worth more than USD 60 million and involving victims worldwide.
“Public-private partnerships are an integral part of Trend Micro’s ongoing pursuit to make the digital world safer for everyone,” said Raimund Genes, chief technology officer for Trend Micro.
“We are always happy to collaborate with INTERPOL in joint efforts to expose and takedown cybercrime around the world. Through this research on West Africa, we hope to improve the security of this region and educate local governments, as well as global businesses, on the risks emanating from this region,” added Mr Genes.
Also included in the joint INTERPOL-Trend Micro report is an overview of the activities of an alleged cybercriminal, who had mistakenly installed a keylogger on his own machine, enabling researchers to access his logs and follow the various stages of his different frauds.
Of the 16 INTERPOL member countries in West Africa, the following 11 responded to the survey; Benin, Cape Verde, Côte d’Ivoire, Gambia, Ghana, Liberia, Mauritania, Niger, Nigeria, Senegal and Sierra Leone.
VB2014 paper: An in-depth analysis of abuse on Twitter
Copyright © 2014 Virus Bulletin
JonathanOliverTrend Micro, Australia
PaulPajaresTrend Micro, Philippines
ChristopherKeDeakin University, Australia
ChaoChenDeakin University, Australia
YangXiangDeakin University, AustraliaEditor: MartijnGrooten
In their VB2014 paper, Jonathan Oliver and his colleagues look at abuse on Twitter.
In this paper, we examine Twitter in depth, including a study of 500,000,000 Tweets collected over a two-week period in order to analyse how the micro-blogging site is abused.
Most Twitter abuse takes the form of Tweets containing links to malicious websites. These websites take many forms, including spam sites, scam sites that are involved in compromising more Twitter accounts, phishing sites, and sites hosting malware or offering cracked versions of software. Many of the malicious Tweets are sent from legitimate accounts that have been compromised, causing a range of problems for their owners.
The scale of the threat is significant. Previous research, notably , has indicated that the use of URL blacklists is ineffective in detecting Twitter threats. However, our research shows otherwise – approximately 5% of all Tweets with links had malicious and/or spammy content.
We also applied graph algorithms to the Twitter data and were able to find various clusters of interrelated websites and accounts. We were able to identify specific Tweet spam campaigns as well as the groups carrying out these campaigns.
The data from this analysis leads us to conclude that blacklisting, in conjunction with other analytical tools, is an effective tool for identifying malicious Tweets.
Researchers from Trend Micro and Deakin University worked together to investigate the Twitter threat landscape. This paper features a comprehensive study that lasted for two weeks from 25 September to 9 October 2013, including further analysis of some of the threats we discovered over the given period. The study revealed a significant level of abuse of Twitter, including spamming, phishing, and sharing of links that led to malicious and potentially illegal websites. The majority of the malicious messages we observed were sent from compromised accounts, many of which have subsequently been suspended by Twitter.
A 2010 study  examined 400 million public Tweets and 25 million URLs. The authors identified two million URLs (8%) that pointed to spamming, malware-download, scamming and phishing websites, leading them to conclude (a) that blacklists were ineffective, as these only protected a minority of users, and (b) that the use of URL shorteners made the task of identifying malicious links very difficult.
This research paper begins by giving a brief overview of the types of Twitter abuse we discovered within our study period. It then provides a summary of the data we collected to learn more about the abuse. Given the data, we examined a range of issues, including: (a) the use of blacklists to detect Twitter spam, (b) the coordinated nature of certain Twitter spam outbreaks, (c) the timing of spam outbreaks, and (d) details related to particular Twitter scams. In Section 4, we propose an approach for analysing Twitter spam outbreaks which is very useful in augmenting blacklists for the detection of Twitter spam.
This Section provides a brief overview of the Twitter threats we found. It also provides examples of the most active threat types, including: traditional spam similar to email spam, searchable spam (which differed from email spam), phishing messages, and suspended and compromised accounts.
The following are some of the features of traditional Twitter spam:
The Tweets typically promoted weight-loss drugs, designer sunglasses and bags, etc., very much like email spam.
Unrelated, but often-trending hash tags were used to increase Tweet distribution and to encourage more people to click the links.
The Tweets included misspelled words, sometimes substituting numbers for letters, which was typical of email spam 10 years ago.
In some cases, URL shorteners were used to make it more difficult for security analysts to identify which Tweets point to spam websites.
Figure 1 shows examples of searchable Twitter spam.
Figure 1. Examples of searchable spam (translations on the right).
The following are some of the features of searchable spam:
The messages typically promote free access to copyrighted and licensed materials or offer gadget knock offs. For example: solutions to homework and exam cheat sheets, free movie downloads, cracked versions of software, and computer, printer and mobile device knock offs.
Hash tags are not used, or are only used sparingly.
Many such Tweets are written in Russian.
Several domains are used, many of which are hosted in Russia and in the Ukraine.
Our analysis of searchable spam revealed that the probability of Twitter suspending an account involved with a searchable spam incident was significantly lower than if it was involved in sending out traditional Twitter spam or other malicious messages. In addition, we found that 50% of those who clicked the links in searchable spam written in Russian were from non Russian-speaking countries such as the United States and Japan (see Section 7). This type of spam typically remains on Twitter after transmission and can easily be searched for. For example, Group A, described in Section 5, consists of over 7.8 million searchable spam messages. Approximately 90% of these remain accessible on Twitter at the time of writing this paper.
We conclude that searchable spam attempts to avoid irritating users so that it will not be reported via the ‘Abuse’ button that Twitter has made available. Searchable spam covers a wide range of content, which some users might be motivated to look for using Twitter’s Search function. They might even be willing to use automated translation tools to understand the content of such spam.
We examined a long-running phishing scam  that exploits certain Twitter features. The scam starts with a compromised user sending messages to friends (using the @ syntax on Twitter). The messages ask them to click a shortened URL –clicking the link starts a redirection chain that ends at a phishing page that tells the user their session has timed out and that they need to log in again. In the course of our research, we attempted to estimate the scale of this problem, which we discuss in Section 8.
While carrying out our research, we followed some of the accounts that had been involved in spamming. We attempted to access them in December 2013 (two months after the period of data collection). We found that Twitter had suspended tens of thousands of accounts involved in spamming and in other malicious activities. Many of these accounts appeared to have been created specially for this purpose – the accounts were created, and then immediately started sending spam. In some cases, genuine account owners had identified the problem and taken corrective actions to restore their accounts. However, this was significantly rarer than account suspension. (We do not have statistics on this because it was difficult to establish when compromises occurred; we only have anecdotal evidence of their occurrence.)
2.4 Suspended and compromised accounts
2. Overview of the abuse on Twitter
We collected as many Tweets with embedded URLs as possible within the two-week period from 25 September to 9 October 2013. We restricted the Tweets we examined to those with embedded URLs. While it is possible to use Twitter to send spam and other messages without URLs, the majority of the spam and other malicious messages we found on Twitter contained embedded URLs. Among the thousands of spam messages that humans inspected in the course of our research, we only found a handful of Tweets without URLs that could be considered abusive or harmful.
We categorize Tweets that contain malicious URLs as ‘malicious Tweets’. The data we collected is shown in Table 1. We gathered a total of 573.5 million Tweets containing URLs and identified 33.3 million malicious Tweets, which accounted for approximately 5.8% of all of the Tweets with URLs . We used two methods to identify malicious Tweets. The first involved the use of the Trend Micro Web Reputation Technology , which uses a blacklist. The second method involved identifying groups of malicious Tweets using the clustering algorithm described in Section 4. Note that we experienced a disruption in our data collection process on 29 and 30 September 2013, which accounted for data loss during said period.
|Day/date||Number of Tweets with URLs||Number of malicious Tweets||Percentage of malicious Tweets|
Table 1. Data collected.
3. Research scope and methodology
One of our research goals was to obtain a high-level understanding of the various types of spam and scams on Twitter. We determined that one approach to achieving this aim would be to cluster malicious Tweets into groups. Forming clusters of malicious Tweets would be successful if we could explain adequately why Tweets in a group are considered similar to one another, and why they are considered malicious.
Several possible variables could be extracted from Tweets, including: content, embedded URLs, hash tags and sender data, including frequency. It would prove very useful if it were possible to group Twitter spam into distinct outbreaks rather than try to understand a huge mass of data. Traditional approaches for doing this include grouping spam Tweets that have similar content or applying machine-learning approaches. Applying machine-learning approaches involves extracting numerical or categorical variables from Tweets and users (e.g. how often they send messages, dramatic changes in their behaviour, etc.) and applying a statistical or machine-learning approach to the data (e.g. SVMs or Nearest Neighbor).
We took another approach. Our proposal for identifying certain classes of high-volume spam was to create a graph consisting of senders and domains in URLs and to identify bipartite cliques  in this graph. Such graphical approaches to identifying cliques in data have previously been applied to computer security problems . To do this, we constructed a graph where the Twitter users are nodes on the left-hand side of the graph while the domains in links are nodes on the right-hand side. For each Tweet from User U that contains a link with Domain D, we include an arc in the graph from User U to Domain D. Some spammers use applications that employ a round-robin approach for sending spam. Given a number of sending accounts and destinations for URLs in the Tweets, the use of a round-robin approach maximizes the number of spam messages while minimizing the effects of (i) having their accounts suspended and (ii) blacklists blocking their spam. When the graphical approach described above is used, a set of users involved in a round-robin approach will generate a bipartite clique in the graph. Hence, bipartite cliques in such a graph are very suspicious – the probability of real users behaving this way in the normal course of events is extraordinarily small. There are scalable approaches for using map-reduce [6, 7] to identify cliques in large data sets.
Figure 2 provides an example of a bipartite clique found in the data, which consists of 727 users who sent Tweets containing links to 11 domains; all of the users in the clique sent Tweets containing links to all of the domains in the clique.
Figure 2. Sample bipartite clique.
This approach is well suited to understanding certain types of Twitter spamming behaviours, but unsuited to others. For example, it is not suitable for analysing the Twitter follower scam described in Section 6, since that did not use a round-robin approach for sending messages. The Twitter follower scam was confirmed as malicious by installing the app and monitoring its behaviour.
Other malicious behaviour was identified by following the links through to the final website and confirming that the website was malicious.
4. Clustering algorithm to identify malicious tweets
We applied the clique algorithm described in Section 4  to the Twitter data we collected. The algorithm identified 16 cliques, each of which accounted for 1% or more of the Twitter spam. Table 2 describes each of the cliques generated. In addition, Group G was a Twitter follower spam group, which accounted for 2.5% of the Twitter spam.
|Description||Percentage of malicious Tweets||Number of senders||Hash tags||Number of domains||Percentage of suspended accounts|
|A. Education spam, etc.||27.28%||797||None||24||10.3%|
|B. Cracked software and game spam||8.11%||578||None||20||31.5%|
|C. Education spam||6.26%||539||None||20||19.7%|
|D. Cracked software spam||6.19%||9,509||Limited[a]||21||12.0%|
|E. Cracked software spam||4.39%||727||None||11||11.6%|
|F. Printer/mobile spam||3.72%||12,275||Low||3||89.1%|
|G. Twitter follower spam||2.54%||59,205||Yes||1||2.1%|
|H. Video/mobile/cracked software/game spam||2.23%||8,987||Low||50||95.2%|
|I. Game and computer spam||2.04%||608||None||19||97.9%|
|J. Education spam, etc.||1.99%||284||None||14||47.9%|
|K. Shirt spam||1.91%||1,699||None||5||74.7%|
|L. Game, mobile, and printer spam||1.81%||1,197||None||18||98.8%|
|M. Computer/printer spam||1.77%||26,603||Low||60||42.3%|
Table 2. High-level perspective.
5. High-level perspective
VB2017 paper: The router of all evil: more than just default passwords and silly scripts
In the last couple of years, we have seen a few highly sophisticated router attacks and pieces of malware. This paper looks at two case studies: the Netgear router attack involving the Multiple Netgear Routers Remote Command Injection Vulnerability…
A review of the evolution of Andromeda over the years before we say goodbye
Andromeda, also known as Gamaru and Wauchos, is a modular and HTTP-based botnet that was discovered in late 2011. From that point on, it managed to survive and continue hardening by evolving in different ways. This paper describes the evolution of…
VB2012 paper: Malware taking a bit(coin) more than we bargained for
When a new system of currency gains acceptance and widespread adoption in a computer-mediated population, it is only a matter of time before malware authors attempt to exploit it. As of halfway through 2011, we started seeing another means of…
VB2017 paper: VirusTotal tips, tricks and myths
Outside of the anti-malware industry, users of VirusTotal generally believe it is simply a virus-scanning service. Most users quickly reach erroneous conclusions about the meaning of various scanning results. At the same time, many very technical…
The threat and security product landscape in 2017
VB Editor Martijn Grooten looks at the state of the threat and security product landscape in 2017.