Schneier on Security's Journal
 
[Most Recent Entries] [Calendar View]

Friday, December 28th, 2018

    Time Event
    1:15p
    Massive Ad Fraud Scheme Relied on BGP Hijacking

    This is a really interesting story of an ad fraud scheme that relied on hijacking the Border Gateway Protocol:

    Members of 3ve (pronounced "eve") used their large reservoir of trusted IP addresses to conceal a fraud that otherwise would have been easy for advertisers to detect. The scheme employed a thousand servers hosted inside data centers to impersonate real human beings who purportedly "viewed" ads that were hosted on bogus pages run by the scammers themselvesĀ­ -- who then received a check from ad networks for these billions of fake ad impressions. Normally, a scam of this magnitude coming from such a small pool of server-hosted bots would have stuck out to defrauded advertisers. To camouflage the scam, 3ve operators funneled the servers' fraudulent page requests through millions of compromised IP addresses.

    About one million of those IP addresses belonged to computers, primarily based in the US and the UK, that attackers had infected with botnet software strains known as Boaxxe and Kovter. But at the scale employed by 3ve, not even that number of IP addresses was enough. And that's where the BGP hijacking came in. The hijacking gave 3ve a nearly limitless supply of high-value IP addresses. Combined with the botnets, the ruse made it seem like millions of real people from some of the most affluent parts of the world were viewing the ads.

    Lots of details in the article.

    An aphorism I often use in my talks is "expertise flows downhill: today's top-secret NSA programs become tomorrow's PhD theses and the next day's hacking tools." This is an example of that. BGP hacking -- known as "traffic shaping" inside the NSA -- has long been a tool of national intelligence agencies. Now it is being used by cybercriminals.

    EDITED TO ADD (1/2): Classified NSA presentation on "network shaping." I don't know if there is a difference inside the NSA between the two terms.

    7:04p
    Click Here to Kill Everybody Available as an Audiobook

    Click Here to Kill Everybody is finally available on Audible.com. I have ten download codes. Not having anything better to do with them, here they are:

    1. HADQSSFC98WCQ
    2. LDLMC6AJLBDJY
    3. YWSY8CXYMQNJ6
    4. JWM7SGNUXX7DB
    5. UPKAJ6MHB2LEF
    6. M85YN36UR926H
    7. 9ULE4NFAH2SLF
    8. GU7A79GSDCXAT
    9. 9K8Q4RX6DKL84
    10. M92GB246XY7JN

    Congratulations to the first ten people to try to use them.

    EDITED TO ADD (12/30): All the codes are long gone.

    10:30p
    Friday Squid Blogging: Squid-Focused Menus in Croatia

    This is almost over:

    From 1 December 2018 -- 6 January 2019, Days of Adriatic squid will take place at restaurants all over north-west Istria. Restaurants will be offering affordable full-course menus based on Adriatic squid, combined with quality local olive oil and fine wines.

    As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

    Read my blog posting guidelines here.

    << Previous Day 2018/12/28
    [Calendar]
    Next Day >>

Schneier on Security   About LJ.Rossia.org