{"id":13127,"date":"2019-04-09T03:51:04","date_gmt":"2019-04-09T07:51:04","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/digital-masks-card-fraud\/13127\/"},"modified":"2020-03-26T17:22:36","modified_gmt":"2020-03-26T13:22:36","slug":"digital-masks-card-fraud","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/digital-masks-card-fraud\/13127\/","title":{"rendered":"How crooks use your doppelgangers to pay with your card"},"content":{"rendered":"<p>You probably know that weird phenomenon: Airplane crashes get significantly more media attention than traffic accidents, despite the number of casualties per year being significantly smaller in the former. The same phenomenon applies to other aspects of life, including cybersecurity and cybercrime reporting.<\/p>\n<p>When back in 2014 we discovered <a href=\"https:\/\/www.kaspersky.com\/blog\/the-great-bank-robbery-carbanak-apt\/3598\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Carbanak<\/a>, the cybergang that had stolen more than a billion USD, that was a big deal for the press. But we should not forget that the more common credit card fraud that happens every day results in significantly bigger financial losses. For example, <em>The Nilson Report<\/em> estimates that <a href=\"https:\/\/www.businesswire.com\/news\/home\/20190129005802\/en\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">in 2018 card fraud caused about $24 billion in losses<\/a> and is set to grow significantly this year. Carding \u2014 that\u2019s what cybercriminals and security specialists call card fraud \u2014 is not dead. On the contrary, it\u2019s growing.<\/p>\n<p>That may seem surprising, with more and more banks implementing strict security systems and clever fraud-prevention solutions based on machine learning, and otherwise protecting funds on cards from being stolen. Theoretically, that should\u2019ve stopped at least the newbie crooks from stealing money from cards, but the statistics say otherwise. And on darknet forums, if someone asks a question like \u201cWhat is the first step in a cybercriminal career?\u201d the answer is \u201ccarding.\u201d<\/p>\n<p>Fortunately, carding has indeed become harder because of the security measures implemented by banks and payment platforms. Unfortunately, antifraud systems don\u2019t work that flawlessly in reality \u2014 and special services, tools, and marketplaces for those services and tools are available for those who want to give stealing money from others\u2019 credit cards a try.<\/p>\n<h2>Digital fingerprinting: Borrowing an identity to steal from its card<\/h2>\n<p>Kaspersky Lab researcher Sergey Lozhkin has <a href=\"https:\/\/securelist.com\/digital-doppelgangers\/90378\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">discovered a market on the darknet<\/a>, called Genesis, that is used to sell users\u2019 digital masks. He delivered a keynote on his discovery at the <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/sas-2019\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Security Analyst Summit 2019<\/a>. A digital mask consists of a user\u2019s digital fingerprint \u2014 Web history, OS and browser information, installed plugins, and so on \u2014 and information about the user\u2019s behavior: what they do online and how they do it.<\/p>\n<p>Why would crooks sell masks, and how is that related to carding? Digital masks are used by antifraud systems to verify users. If the digital mask that an antifraud system sees matches the one it has previously seen for the same user, it will mark the transaction legitimate. For quite a lot of banks, that means they won\u2019t even require a 3D Secure code sent by SMS or push notification to the user to confirm the transaction.<\/p>\n<p>So, if a criminal somehow manages to steal your digital mask and your online banking credentials, the antifraud system will think it\u2019s you and won\u2019t raise any flags. That way the criminal can siphon all the money from your account without being noticed.<\/p>\n<p>That is why some malefactors scrape the data from users\u2019 devices and put it on Genesis for sale. Others buy that information, which costs $5 to $200 depending on the amounts of data and credentials included, and use it to pretend to be the owner of that digital mask.<\/p>\n<p>To do that they use a free browser plugin. Developed by the people behind Genesis and called Genesis Security, the plugin lets them use the digital mask to recreate the legitimate user\u2019s virtual identity and thus fool antifraud systems. Basically, it modifies the parameters the antifraud system sees so that they match the parameters of the victim\u2019s device and recreates their behavior.<\/p>\n<h3>Collecting the fingerprints<\/h3>\n<p>So, where do the cybercriminals behind Genesis get the data they sell? The answer is simple, but rather vague: from various malware species.<\/p>\n<p>Not every piece of malware tries to encrypt your data for ransom or steal your money right after it gets on your device. Some species sit quietly, gathering all the data they can reach and creating those digital masks that are later sold on Genesis.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h3>Other ways to bypass fraud prevention<\/h3>\n<p>The first way to bypass fraud prevention systems is to look familiar. The other is to look completely new. And, since criminals know about the other way, there\u2019s a service on the Internet to do that as well.<\/p>\n<p><em>Completely new<\/em> means next to no matching parameters between the digital mask used and any other digital masks the service is aware of. It means the fraudster won\u2019t be allowed to log in to a service with a fraud prevention system, even if they install a new browser on their PC, if some of the parameters \u2014 such as computer hardware, screen resolution, and many more \u2014 will be the same as in the digital mask they used earlier.<\/p>\n<p>But a service called Sphere allows the crooks to create a new digital identity and customize all of those parameters so that the fraud prevention system sees them as someone completely new. And it has no reason not to trust that new person.<\/p>\n<h3>Saying no to doppelgangsters<\/h3>\n<p>The problem is that no matter how advanced the fraud prevention system is, these techniques still work, because the fraud prevention system\u2019s algorithms that determine if the person is allowed to access the funds rely on exactly the same data the malefactors harvest.<\/p>\n<p>So, is it possible to protect from this advanced card fraud?<\/p>\n<p>For banks, protection requires introducing mandatory <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/two-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">two-factor authentication<\/a>, maybe even using some biometrics such as fingerprint reading (real, not digital), iris scanning, or face recognition as the second factor. Banks also need to be aware of the various kinds of fraud that emerge; otherwise, they won\u2019t implement measures to fight that fraud.<\/p>\n<p>From the user\u2019s perspective, the only way to protect yourself from this type of card fraud is to make sure no one can harvest your digital mask. And to do that, you need to install a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">robust security solution<\/a> that will eliminate every single piece of malware trying to tamper with your data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How criminals use data harvested from users\u2019 devices to fool antifraud systems and siphon money from victims\u2019 accounts.<\/p>\n","protected":false},"author":40,"featured_media":13128,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[1993,936,132,2085,80,337,2066,333],"class_list":{"0":"post-13127","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-thesas2019","10":"tag-bank-cards","11":"tag-credit-cards","12":"tag-digital-identity","13":"tag-fraud","14":"tag-sas","15":"tag-sas-2019","16":"tag-security-analyst-summit"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/digital-masks-card-fraud\/13127\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/digital-masks-card-fraud\/15582\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/digital-masks-card-fraud\/17503\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/digital-masks-card-fraud\/15653\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/digital-masks-card-fraud\/14347\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/digital-masks-card-fraud\/18214\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/digital-masks-card-fraud\/17157\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/digital-masks-card-fraud\/22584\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/digital-masks-card-fraud\/5867\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/digital-masks-card-fraud\/26357\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/digital-masks-card-fraud\/11622\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/digital-masks-card-fraud\/11624\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/digital-masks-card-fraud\/10584\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/digital-masks-card-fraud\/18989\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/digital-masks-card-fraud\/23014\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/digital-masks-card-fraud\/18237\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/digital-masks-card-fraud\/22435\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/digital-masks-card-fraud\/22371\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13127"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13127\/revisions"}],"predecessor-version":[{"id":16211,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13127\/revisions\/16211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13128"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}