Keep Calm & Verify: How To Spot A Fake Online Data Dump

  /     /     /  
Publicated : 22/11/2024   Category : security


Keep Calm & Verify: How To Spot A Fake Online Data Dump


Determining whether a data dump on Pastebin or elsewhere online is legit can be time-consuming and resource-intensive. Deloitte & Touche offers tips for how to weed out the fake hacks.



Youve seen the online claims and headlines: hackers boasting on Twitter or another online forum that theyve hacked a major companys database or website and have leaked the stolen user credentials or credit-card numbers for all to see on Pastebin or another site.
But just because a data dump is posted online doesnt mean its legitimate. The victimized organization and threat intelligence experts have to investigate the leaks, a process that can be time-consuming, resource-intensive, and even hurt other security projects or monitoring. Worst-case, investigating a phony data dump could detract from an enterprises efforts to detect or mitigate a real data breach.
Allison Nixon, a threat researcher with Deloitte & Touche LLP, has seen the phony data breach dump scenario many times as a researcher with experience investigating them. Its pretty common that data dumps that come to me were actually fake, says Nixon, who has authored a new report with recommended techniques for vetting the authenticity of a data dump. I would say its a waste of everyones time to have to investigate phony ones, which can take days to verify. Not only that, but a companys reputation can easily be damaged by a phony data dump that wasnt tied to a real breach, she says.
Online data dumps traditionally are the handiwork of hacktivists or others looking for notoriety, but they also can be a tool for duping other bad guys or even just to taint the purported victim organizations reputation. So whos behind the fake data dumps? I wouldnt consider these really dangerous people, Nixon says, because if they had the skills to perpetrate a real breach, theyd have done so instead.
There are several possible motivations for posting phony stolen data such as fake usernames, passwords, or credit-card numbers. One MO is using phony data as a marketing tool for the cyber underground. The notion of dumping fake data is nothing new. Those kind of dumps are usually used as a proof to sell a bigger dump in underground forums, so they defraud fellow bad guys, says Aviv Raff, CTO at Seculert.
There is no honor amongst criminals, Raff notes. So, the same way they cheat the good guys, they also try to cheat the other bad guys. Needless to say, most of the criminals are not that stupid, and this is why we dont see those fake dumps so often.
While the notion of fake data being posted online may seem benign to the purported victim, even these made-up data dumps can be dangerous to a companys reputation. And in todays lucrative cybercrime world, the most worrisome scenario would be a phony data dump used as a distraction or smokescreen for waging a real attack on the victim, akin to how some distributed denial-of-service (DDoS) attacks are used to detract from an actual attack on the victims internal network.
It actually goes deeper in some situations, as state actors or competitors can use bad news or rumors to influence capital markets, says Robert Capps, senior director of customer success at RedSeal Networks and the former head of security and anti-fraud at StubHub.
What if its a cover? What if its an attempt to draw attention to a fake breach and then someone is actually breaching the victim in the background, he says. You may miss some sort of hit on a workstation that suddenly has malware on it. A lot of these teams are massively understaffed, so they are not in a position to even respond without some outside help, he says.
Even the insinuation that a firm was hacked, as in the recent case of StubHub users whose stolen credentials were used for ticket fraud, can stick. Some called it a breach at StubHub even though it wasnt, Capps says.
Deloittes Nixon has come up with a streamlined way to vet data dumps to save time and resources. Among her suggestions:
Check for recycled booty:
This is a way to determine if the data is just older stolen information being presented as new booty. Seek out unique-looking artifacts such as passwords, different names, text snippets from the rant in the preamble, etc., and simply perform a search for them, Nixon writes.
Check email redundancy:
Two user accounts cant typically use the same email address, so check for what Nixon calls email uniqueness. That entails checking to see if an email exists on the victim websites database. If the company does enforce email uniqueness, the veracity of the leak can be tested by changing an account’s email to randomly selected emails in the leak. Almost all emails should be traceable to the company’s site; untraceable emails indicate that the leak is very likely fake.
Confirm that the username exists:
If account creation is allowed on the site, attempting to create accounts with usernames from the dump should result in error messages if duplicates are not allowed. This technique works using the same fundamental concept as the email uniqueness section above: If unique identifiers are shown in the leaked dump, attempt to duplicate them on the live site. If the website allows you to view another users profile, you can verify its validity as well, she says.
Check for adherence to password policy:
Match the quality of the passwords by the sites password policy. It would be suspicious if the policy is generally enforced but a large number of leaked credentials are not in adherence to the site’s password policy. Conversely, if no password policy exists, and no users have absurdly simple passwords like 123456, the leak should be treated with suspicion.
Analyze the password origin:
Stolen, complex passwords that the attacker says came out of a cracked hash list are suspect, the report says.
Check credit card formats:
Check the format of the credit card accounts that were dumped, the report says. You can also spot phony accounts by checking the issuing banks: For example, a breach in America yielding credit cards mostly issued by banks in the Netherlands would raise some questions.
Contact the victim:
You can also try to track down the people listed in the dump to determine whether they exist and their information is compromised, according to the report.
Take the smell test:
Then theres the smell test. For example, a claim by a hacking group that it plans to release a vast credit card dump should be met with suspicion. Credit card dumps retain high dollar values on fraud markets and releasing a list for free would not be rational.
An FBI breach dump on Pastebin, for example, that includes passwords123 as an FBI user password would obviously raise suspicion, according to the report.

Last News

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Keep Calm & Verify: How To Spot A Fake Online Data Dump