{"id":3641,"date":"2014-07-09T10:29:04","date_gmt":"2014-07-09T14:29:04","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3641"},"modified":"2020-02-26T18:58:50","modified_gmt":"2020-02-26T14:58:50","slug":"boletos_what_can_we_learn","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/boletos_what_can_we_learn\/3641\/","title":{"rendered":"What Can We Learn From the Billion Dollar Brazilian Boleto Scam?"},"content":{"rendered":"<p>If you\u2019re a regular reader with a remarkable capacity to recall unique words (or just a resident of Brazil), then you might recognize the term \u201cBoleto.\u201d We first became aware of <a href=\"https:\/\/www.kaspersky.com\/blog\/sas-day-two-kaspersky-showcases-company-industry-talent\/\" target=\"_blank\" rel=\"noopener nofollow\">a scam involving Boletos<\/a> \u2013a popular payment method in Brazil \u2013 back in February at Kaspersky Lab\u2019s annual Security Analysts Summit. Now the term is back in the news following RSA\u2019s <a href=\"https:\/\/blogs.rsa.com\/wp-content\/uploads\/2015\/07\/Bolware-Fraud-Ring-RSA-Research-July-2-FINALr2.pdf\" target=\"_blank\" rel=\"noopener nofollow\">publication<\/a> of a research paper suggesting that Boleto-related fraud cost South America\u2019s most populous country $3.75 billion in 2012.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05111432\/boleto-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5371\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05111432\/boleto-1.png\" alt=\"boleto\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>Boletos are special invoice documents issued by banks and businesses that are used not only to pay bills but also more broadly to pay for goods and services. With a little hacking and a lot of social engineering, Brazilian cybercriminals have been making serviceable counterfeit Boletos, which they can print and use to transfer money out of out of bank accounts that belong to the people whose Boletos the criminals are mimicking.<\/p>\n<p>That $3.75 billion dollar is hotly contested. <a href=\"https:\/\/threatpost.com\/brazilian-payment-fraud-campaign-steals-billions\/106997\" target=\"_blank\" rel=\"noopener nofollow\">According to our friends at Threatpost.com<\/a>, the Brazilian banking association FEBRABAN estimates that Boleto-related fraud accounts for just $700 million. In private conversations, I have been told the number may sit near $1.1 billion. Whichever is correct, Boletos are costing Brazil a lot of money, <a href=\"http:\/\/sas.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">as Kaspersky Lab security experts Fabio Assolini and Santiago Pontiroli noted at SAS earlier this year<\/a>.<\/p>\n<div class=\"pullquote\">\u201cBrazil may be proud of not only its football team, but its developed economy and modern banking ecosystem as well. Unfortunately, the country has a developed cyber-underground as well.\u201d<\/div>\n<p>Another of Kaspersky\u2019s global research and analysis team members, Dimitry Bestuzhev, explained to the Kaspersky Daily that as Brazil has developed into the economic powerhouse of South America, so has that country\u2019s cybercriminal underground.<\/p>\n<p>\u201cBrazil may be proud of not only its football team, but its developed economy and modern banking ecosystem as well,\u201d Bestuzhev said in an interview that coincided with the playing of <a href=\"https:\/\/www.kaspersky.com\/blog\/world-cup-streaming-scams\/\" target=\"_blank\" rel=\"noopener nofollow\">the World Cup<\/a> in the country. \u201cUnfortunately, the country has a developed cyber-underground as well.\u201d<\/p>\n<p>Bestuzhev went on to explain that there are large numbers of criminals that deploys so called \u2018bankers\u2019 in Brazil. \u2018Bankers\u2019 is just his term for <a href=\"https:\/\/www.kaspersky.com\/blog\/the-big-four-banking-trojans\/\" target=\"_blank\" rel=\"noopener nofollow\">banking trojans<\/a> or malware designed with malicious code that steals financial data from victims in or near Brazil.<\/p>\n<p>\u201cThe Brazil-specific twist is a popular, alternative payment system, called a \u2018Boleto,'\u201d he explained. \u201cBoletos are very popular, because anyone paying with Boleto typically receives an additional discount.\u201d<\/p>\n<p>Bestuzhev noted that these scams aren\u2019t new \u2013 citing Assolini and Pontirolli\u2019s SAS briefing \u2013 and also contested RSA\u2019s figures, saying their loss estimation is \u201cway overblown.\u201d<\/p>\n<p>The trick is not a complicated one, Bestuzhev explained. While a user is printing their Boleto, a Trojan on the victim\u2019s computer modifies that Boleto\u2019s barcode. The printed Boleto is then useless. The criminal then uses the legit Boleto-barcode in order to transfer money into his or her own account.<\/p>\n<p>\u201cOrdinary users must utilize a strong antimalware protection system to prevent their machines from being infected,\u201d Bestuzhev said. \u201cHowever, more efficient technologies, like <a href=\"https:\/\/www.kaspersky.com\/downloads\/pdf\/kaspersky_lab_whitepaper_safe_money_eng_final.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Safe Money<\/a>, can prevent theft even when a machine is infected.\u201d<\/p>\n<p>In other words, stay smart; follow the security advice you read here and elsewhere. All you really need to do to protect yourself from these Boleto scams is <a href=\"https:\/\/www.kaspersky.com\/home-security\" target=\"_blank\" rel=\"noopener nofollow\">run a solid antivirus product<\/a>.<\/p>\n<p>Assolini will be presenting <a href=\"https:\/\/www.virusbtn.com\/conference\/vb2014\/abstracts\/Assolini.xml\" target=\"_blank\" rel=\"noopener nofollow\">new information about Boleto scams at the upcoming Virus Bulletin Conference in Seattle in September<\/a>. A corresponding blog-post will be published on Securelist (which just got a slick redesign!).<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"pt\" dir=\"ltr\">Nossa tecnologia Safe Money protege contra trojans BHO e extens\u00f5es maliciosas que alteram boletos banc\u00e1rios <a href=\"http:\/\/t.co\/a26dVMbk72\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/a26dVMbk72<\/a><\/p>\n<p>\u2014 Fabio Assolini (@assolini) <a href=\"https:\/\/twitter.com\/assolini\/status\/484445527254507521?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 2, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><em>Tweet translation: Our Safe Money technology protects against trojans and malicious BHO extensions that alter Boletos.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Brazilian cybercriminal scam targeting a popular payment method known as Boletos is costing that country billions. How can you protect yourself?<\/p>\n","protected":false},"author":42,"featured_media":3642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[705,703,704,36,695],"class_list":{"0":"post-3641","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-banking-fraud","9":"tag-boletos","10":"tag-brazil","11":"tag-malware-2","12":"tag-scam"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/boletos_what_can_we_learn\/3641\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/boletos_what_can_we_learn\/3740\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/boletos_what_can_we_learn\/4116\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/boletos_what_can_we_learn\/4368\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/boletos_what_can_we_learn\/4610\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/boletos_what_can_we_learn\/5370\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/boletos_what_can_we_learn\/4206\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/boletos_what_can_we_learn\/4610\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/boletos_what_can_we_learn\/5370\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/boletos_what_can_we_learn\/5370\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/banking-fraud\/","name":"banking fraud"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3641"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3641\/revisions"}],"predecessor-version":[{"id":15847,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3641\/revisions\/15847"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3642"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}