the role of phone numbers in understanding...

34
PST2013 Andrei Costin The role of phone numbers in understanding cyber-crime A. Costin * J. Isachenkova * M. Balduzzi + A. Francillon * D. Balzarotti * * Eurecom, Sophia Antipolis, France + Trend Micro Research, EMEA July 11, 2013 1/34

Upload: others

Post on 10-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin The role of phone numbers in

understanding cyber-crime

A. Costin ∗ J. Isachenkova ∗ M. Balduzzi +

A. Francillon ∗ D. Balzarotti ∗

∗Eurecom, Sophia Antipolis, France

+Trend Micro Research, EMEA

July 11, 2013

1/34

Page 2: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Introduction

Online/digital identifiers in cyber-crime

Mail

Domain name/Web site

Social networks/Nicknames profile

Extensive studies:[LMK+10, TGM+11, KKL+08, Ede03, CHMS06]

Phone numbers

Limited studies: [CYK10, STHB99, Pol05, Hyp]Studied mainly in context of premium short numbermobile fraudsOur main focus

2/34

Page 3: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Introduction

Phone number usages

Mail signatures

Extensively used in many businesses

Offers less anonymization than other identifiers

Links cyber domain to reality domain

Commonly used in various online frauds, e.g.:

Premium numbers fraudScam fraud

3/34

Page 4: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Introduction

Importance of cyber-crime and phone numbers – example

Banking Trojan.Shylock [symb]

Injects code into banking websites

Replaces telephone details into the contact pages ofonline banking websites

4/34

Page 5: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Hypothesis

Phone numbers are used in cyber-crime activities

Can we find telecom operators preference?

Can we find geographical preference?

Phone numbers can be a stronger identification metricvs. other identifiers

5/34

Page 6: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Goals

Check those hypothesis against real data-sets

Evaluate the reliability of automated phone numbersextraction and analysis

Identify challenges and limitations

Automatically find patterns associated with recurrentcriminal activities

Automatically correlate the extracted information for

Telecom operator preferenceGeographic area preference

6/34

Page 7: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Methodology

7/34

Page 8: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Datasets I

Data Sources initially considered

SPAM

Large and extremely noisy datasetExtremely challenging to extract and clean phonenumbers

WHOIS

Focused on malicious domainsHigh quality dataset (intl. format)Phone numbers are dummy or replaced by CERTs’contact numbers

8/34

Page 9: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Datasets II

ANDROID

Small and noisy dataset

Mainly contained short premium numbers – openproblem

SCAM

Large and high quality dataset

Phone numbers are an important part of business model

Focus on this dataset

9/34

Page 10: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Phone Number Extraction I

Success and Reliability of Extraction depend on

How well formatted the number is

Call: 0336 9505705 9 am - 5 pm

Can be decoded as 2 valid numbers: +443369505705 or+33695057059We aim at obtaining:

Non ambiguous normalized number

Fully qualified international format number

10/34

Page 11: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Phone Number Extraction II

How structured and easy to parse the information is

WHOIS records (easy) vs.

Malicious mobile binary (difficult)

How noisy the data source is

Spam messages are very noisy (to defeat anti-spamfilters)

Scam messages have almost no noise

11/34

Page 12: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Phone Number Extraction Challenges

Example Number obfuscation used [syma]

12/34

Page 13: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Scam Message Sample

13/34

Page 14: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

SCAM Dataset

Used user reports aggregator 419scam

Data timespan: January 2009 – August 2012

Enriched and correlated with numbering plans (NNPC)databases

Free (libphonenumber)Commercial (more detailed and updated)

14/34

Page 15: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

SCAM Email Categories

Emails classified in 10 categories

3 categories cover over 90% of the data

Scam Categories

Financial scam (62%)

Fake lottery (25%)

Next of kin (8%)

Other (5%)

15/34

Page 16: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

SCAM Phones Categories

˜67k unique normalized phone numbers

Classified using numbering plans (NNPC) databases

Number type breakdown

UK PRS (51%)

Mobile (44%)

Other (5%)

16/34

Page 17: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

SCAM Communities/Identity Links

Used clustering techniques, discovered identity linksIdentified 102 communitiesSupports the hypothesis that phone numbers are a goodmetric to study scammers

17/34

Page 18: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

ANALYSIS OF MOBILE PHONE NUMBERS

18/34

Page 19: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Questions and Hypothesis

For how long are phone numbers used?

Are phone numbers reused or discarded?

If discarded, after how long?

Are phone numbers used in roaming?

If roaming, to which extent?

We try to answer these questions with HLR queries

19/34

Page 20: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

HLR Querying

HLR=Home Location Register

Important component of Mobile Network Operators

20/34

Page 21: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Single HLR Queries

In Aug 2012, querying once for all mobiles encountered in :

Jan – Jun 2012

Jul 2012

ERR OFF ON ROAM

0

10

20

30

40

50

60

70

80

90

Mobile phones network status

Jan−Jun 2012

Jul 2012

Network status

Pe

rce

nta

ge

21/34

Page 22: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Repeated HLR Queries

Performed HLR queries

For 1400 numbersEvery 3 daysDuring Jul – Aug 2012Hypothesis1: Possibility of a link with the NigeriangroupsHypothesis2: May be used to conceal location

22/34

Page 23: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Phone Numbers Reuse

Question:

For how long a scam number is used?

3 2 1

0

2

4

6

8

10

12

14

16

18

Phone number reuse

Age of reused phone number (years)

Re

use

pe

rce

nta

ge

23/34

Page 24: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

ANALYSIS OF UK PRS PHONE NUMBERS

24/34

Page 25: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

What are UK PRS numbers? I

Definition

Premium rate services (PRS) are a form ofmicro-payment for paid content, data services and valueadded services that are subsequently charged to userphone bill

UK PRS is a 800 Mil. GBP bussines (2009)

25/34

Page 26: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

What are UK PRS numbers? II

Usages

Conceal geographic location of real phone, via callforwarding

Earn revenue from calls to these numbers

Challenges

Hard to trace the ”service provider”

Hard to trace the real phone number behind forwarding

Hard to detect or prove that fraud is involved

26/34

Page 27: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Range of UK PRS numbers

˜34k unique phone numbers in UK range of 07xPremium Rate Services numbers

4 operators (out of 88) provide more than 90% offraud-related UK PRS numbers

˜5% of one operator allocated range is fraud-related

Magrathea Open Telecom FlexTel Invomo

0

10

20

30

40

50

60

Top 4 UK PRS Telecoms providing numbers found in fraud

Share of the fraud in operator’s numbering range

Operator share in total fraud

Telecom Name

Pe

rce

nta

ge

27/34

Page 28: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Conclusion – Results

Phone numbers are a strong digital identifier in somecyber-crime activities

Phone numbers help in automated scammer communitydetection

HLR lookups help

in identifying identify recurrent cyber-criminal businessmodelsto study phone numbers’ geographical use and activitypatterns

28/34

Page 29: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Conclusion – Future Work

Phone number extraction is an open, non-trivialproblem

Improve matching algorithms and theircontext-awareness

PRS phone numbers are opaque

is a ”traceroute” of PRS phone numbers possible?learn business models behind them

Short number extraction and evaluation

Open and challenging, non-trivial problemBecomes a growing concern with mobile malware

29/34

Page 30: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

Questions?

Contacts:

Software and System Security Group @ EURECOM

S3.eurecom.fr

Thank you!

30/34

Page 31: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

References I

Duncan Cook, Jacky Hartnett, Kevin Manderson, andJoel Scanlan, Catching spam before it arrives: domainspecific dynamic blacklists, Proceedings of the 2006Australasian workshops on Grid computing ande-research, ACSW Frontiers ’06, vol. 54, 2006.

Nicolas Christin, Sally S. Yanagihara, and KeisukeKamataki, Dissecting one click frauds, CCS ’10, ACM,2010.

Eve Edelson, The 419 scam: information warfare on thespam front and a proposal for local filtering., Computers& Security 22 (2003), no. 5.

31/34

Page 32: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

References II

Mikko Hypponen, Malware Goes Mobile,http://www.cs.virginia.edu/~robins/Malware_

Goes_Mobile.pdf.

Christian Kreibich, Chris Kanich, Kirill Levchenko,Brandon Enright, Geoffrey M. Voelker, Vern Paxson,and Stefan Savage, On the spam campaign trail,LEET’08, 2008.

Olumide B. Longe, Victor Mbarika, M. Kourouma,F. Wada, and R. Isabalija, Seeing beyond the surface,understanding and tracking fraudulent cyber activities,CoRR abs/1001.1993 (2010).

32/34

Page 33: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

References III

Craig Pollard, Telecom fraud: Telecom fraud: the cost ofdoing nothing just went up, Network Security 2005(2005), no. 2.

J. Shawe-Taylor, K. Howker, and P. Burge, Detection offraud in mobile telecommunications, InformationSecurity Technical Report 4 (1999), no. 1.

Evolution of Russian Phone Number Spam,http://www.symantec.com/connect/blogs/

revolution-russian-phone-number-spam.

33/34

Page 34: The role of phone numbers in understanding cyber-crimes3.eurecom.fr/slides/pst13_phones.slides.pdf · 2020-06-04 · 13/34. PST2013 Andrei Costin SCAM Dataset Used user reports aggregator

PST2013

AndreiCostin

References IV

Trojan.Shylock Injects Phone Numbers into OnlineBanking Websites,http://www.symantec.com/connect/blogs/

merchant-malice-trojanshylock-injects-phone-numbers-online-banking-websites.

Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson,and Dawn Song, Design and evaluation of a real-timeurl spam filtering service, Proceedings of the 2011 IEEESymposium on Security and Privacy, 2011.

34/34