FB pixel

Russian IMPaaS industrializes high-stakes cybercrime

Russian IMPaaS industrializes high-stakes cybercrime
 

A pair of researchers say they have uncovered a cybercrime business model for the dark Web, one that sells behavioral biometrics.

The Netherlands-based pair call it impersonation as a service, or IMPaaS. They say they have found a marketplace in Russia selling 262,000 comprehensive, stolen user profiles, some of which are so detailed that they can be used to get around risk-based authentication.

Adding “as a service” to another activity, even cybercrime, might induce eyerolls, but the criminal enterprise described by Michele Campobasso and Luca Allodi of Eindhoven University of Technology is remarkable in its potential.

Unlike common ad-hoc attacks, in which gouts of leaked or stolen logons and passwords are sold online almost like burner phones for databases, the IMPaaS concept offers a systemic approach to theft of rich profile information, including behavioral biometrics.

Stolen passwords typically are useless after as few as one nefarious use by an attacker. Behavioral and physical biometrics, however, do not expire. And the IMPaaS model allows for updating profiles through persistent malware infection. It also allows the same profile to be sold multiple times.

The marketplace, according to the researchers’ paper, charges between 70 cents and $96 per profile.

Subscribers get “a customized software bundle,” according the researchers’ paper. The bundle includes a custom open-source browser. An extension gets purloined profiles behind which cybercriminals hide while in the IMPaaS environment.

A top-end meta-profile of a victim contains any or all of the person’s online platform profiles.

The usual targets — passwords, user agents, screen resolution, operating system and the like are table stakes.

IMPaaS profiles, which the researchers confusingly refer to as fingerprints, can indeed, contain fingerprints, but also other difficult to attain information including keystroke speed, mouse movements and times and locations when some tasks usually are conducted by the victim.

It is all information used by financial institutions in risk-based authentication, and that is no coincidence.

Risk-based authentication algorithms sic multi-factor authentication software on suspicious profiles, and if the criminal does not have the second factor, their money has been wasted.

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Biometric Update Podcast: Claire Ma explores the next phase of government digital identity

Governments around the world are moving toward digital identity systems, but not all are taking the same path. On the…

 

Trusted Caller ID with digital wallet and VCs improves call center authentication

Decentralized digital IDs shared from a digital wallet on a smartphone can significantly speed up identity verification by call centers,…

 

EES records 66M border crossings in first six months despite rollout friction

During its first six months of operation of Europe’s biometric-based Entry-Exit System (EES), daily fingerprint checks against EU databases rose…

 

IDDEEA outlines role of e-signatures in Bosnia’s digital transformation

Qualified electronic signatures (QES) have the potential to bring significant improvements to complex, fragmented public administrations like those in Bosnia…

 

Luxembourg opens tender for AI-generated content detection tool

Luxembourg’s Ministry of Digitalization has opened a call for solutions to develop a deepfake detection platform intended to support the…

 

Dutch court backs DigiD contract renewal amid U.S. CLOUD Act fears

A Dutch court has ruled that the government may extend its contract with Solvinity, a key infrastructure provider for the…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events