The following is from: http://voices.washingtonpost.com/securityfix/2009/07/an_odyssey_of_fraud_part_ii.html#more Please go to the above link if you wish to access any of the links mentioned in this article. Steve Cyber criminals based in Ukraine stole $415,000 from the coffers of Bullitt County, Kentucky this week. The crooks were aided by more than two dozen co-conspirators in the United States, as well as a strain of malicious software capable of defeating online security measures put in place by many banks. bullittcar.JPG Bullitt County Attorney Walt Sholar said the trouble began on June 22, when someone started making unauthorized wire transfers of $10,000 or less from the county's payroll to accounts belonging to at least 25 individuals around the country (some individuals received multiple payments). On June 29, the county's bank realized something was wrong, and began requesting that the banks receiving those transfers start reversing them, Sholar said. "Our bank told us they would know by Thursday how many of those transactions would be able to be reversed," Sholar said. "They told us they thought we would get some of the money back, they just weren't sure how much." Sholar said the unauthorized transfers appear to have been driven by "some kind computer virus." Security Fix has been communicating with a cyber crime investigator who is familiar with the case. What follows is a description of the malicious software used, a blow-by-blow account of how the attackers worked the heist, as well interviews with a couple of women hired to receive the stolen funds and forward the money on to fraudsters in Ukraine. This case also serves as an example of how e-mail scams can be used to dupe unknowing victims in serving as accomplices in their plan. According to my source, who asked not to be identified because he's still investigating different sides of this case, the criminals stole the money using a custom variant of a keystroke logging Trojan known as "Zeus" (a.k.a. "Zbot") that included two new features. The first is that stolen credentials are sent immediately via instant message to the attackers. But the second, more interesting feature of this malware, the investigator said, is that it creates a direct connection between the infected Microsoft Windows system and the attackers, allowing the bad guys to log in to the victim's bank account using the victim's own Internet connection. Many online banks will check to see whether the customer's Internet address is coming from a location already associated with the customer's user name and password, or at least from a geographic location that is close to where the customer lives. By connecting through the victim's PC or Internet connection, the bad guys can avoid raising any suspicions. This might be enough to fool retail banks that serve regular online banking users, but Bullitt County's bank, like many other commercial banks, use even more rigorous authentication schemes. For instance, some technologies adopted by commercial bank Web sites will use special Javascript programming techniques to look at various aspects of the customer's system -- including screen size, browser version, operating system, and a myriad other variables -- to create a unique "fingerprint" of their customers' computers. In such cases, even if criminals have hijacked a victim's Internet connection, a bank using this approach should still be able to detect that the customer is connecting from a different computer because the fingerprints won't match. Also, the process of creating and approving outgoing wire transfers from the county's account could not be completed without two different authorized users signing off on the transaction. In the case of Bullitt County, that checks-and-balances system was designed to be carried out by the county treasurer and a local judge. Finally, if for whatever reason the bank's system noticed that either account was being used from a PC with an unknown fingerprint, that login attempt would fail, and that user would be prompted to check their e-mail account for a special, one-time passphrase that would need to be re-entered along with the username and password, in order to gain access to the account. According to the investigator, the attack against Bullitt County's bank account went down like this: - The attackers somehow got the Zeus Trojan on the county treasurer's PC, and used it to steal the username and password the treasurer needed to access e-mail and the county's bank account. - The attackers then logged into the county's bank account by tunneling through the treasurer's Internet connection. - Once logged in, the criminals changed the judge's password, as well as e-mail address tied to the judge's account, so that any future notifications about one-time passphrases would be sent to an e-mail address the attackers controlled. - They then created several fictitious employees of the county (these were the 25 real-life, co-conspirators hired by the attackers to receive the stolen funds), and created a batch of wire transfers to those individuals to be approved. - The crooks then logged into the county's bank account using the judge's credentials and a computer outside of the state of Kentucky. When the bank's security system failed to recognize the profile of the PC, the bank sent an e-mail with the challenge passphrase to an e-mail address the attackers controlled. - The attackers then retrieved the passphrase from the e-mail, and logged in again with the judge's new credentials and the one-time passphrase. Once logged in, the crooks were able to approve the batch of wire transfers. When asked to comment on this version of events, County Attorney Sholar said he was limited in what he could say, because the FBI had asked him not to discuss details of the case. But he did say that "We know there were initiations and approvals for wire transfers that were both generated and sent to the bank by computers that were physically located outside of the state of Kentucky." The Role of the Money Mules - Scammed Into Serving With the help of the cyber crime investigator, I was able to reach two of the 25 so-called "money mules" who were hired to act as intermediaries in this scam. Both were females under the age of 35 who initially were contacted after placing their resumes on Careerbuilder.com. Each received e-mails from a company calling itself Fairlove Delivery Service. Both women agreed to speak with Security Fix on the condition of anonymity. Both were hired by Fairlove to edit documents for grammar and flow, and promised a pay of $8 for each kilobyte of data they processed (see the initial Careerbuilder scam e-mail here ). The documents they were hired to edit often were full of grammatical errors and faulty or missing punctuation. Both money mules said it appeared that whoever wrote the letters was not a native English speaker. It's not clear whether the cyber scammers first enlisted the mules as text editors in order to test their trustworthiness, or because they really needed their help making their scam letters look more believable. What is clear from looking at copies of the letters they were asked to edit, is that they were editing missives that would be sent to recruit and scam other mules. Have a look at some of those yet-to-be-edited messages sent to our anonymous mules, viewable at this link here . The first person I spoke with, a 34 year-old woman from Miami, had been editing texts e-mailed to her by Fairlove representatives for a couple of weeks. Shortly after she inquired about when she would be paid for her work, she received an e-mail asking if she'd be interested in a position as a "local agent," for the company. The Fairlove representative who contacted her via e-mail said something about how the company often had trouble getting money to its clients overseas as quickly as they needed it, and desperately needed help speeding up that process (at least they were honest on that claim). A description of the local agent job position, as sent to this woman, is available here . Last Thursday, she received a deposit of more than $9,900, with instructions to wire all but about $500 (her 5 percent "commission") via Western Union to a bank account in Ukraine. The woman said she began to grow suspicious that "something wasn't right about the whole thing," and only wired $3,000 of the money. After being contacted by Security Fix about the scam, she learned from her bank that her account was frozen. Her bank assured her if she could come in and produce the e-mails showing she'd been caught up in a scam, they might be able to work something out. The second woman I spoke with, a 27-year-old single mom, also from Florida, was not so lucky. She had more than $9,700 transferred into her checking account from Bullitt County's bank by the fraudsters on Monday. She pulled nearly all of that amount out of her bank almost immediately, wiring nearly $9,200 to the scammers in the Ukraine. Shortly after that, her bank reversed the initial $9,700 deposit at the request of Bullitt County's bank. Her bank now says she is on the hook for that amount: her checking account balance is now almost $9,000 in the red. Here are a couple of observations and tips so you don't get scammed, however obvious they may be: - Avoid responding to job offers sent via e-mail. If you use job search Web sites like Monster.com and CareerBuilder.com, at least be aware that criminal gangs use these sites also, to recruit the desperate, unwary, and the greedy. - If you get in bed with a company that you haven't even researched on Google, expect to regret that decision: A search on Fairlove Delivery Service returns little but page after page of complaints from other job searchers scammed by these criminals. - Avoid clicking on links in e-mails that you are not expecting, and be particularly wary of any e-mail that warns of dire consequences unless you act or respond immediately. The malware used to infect Bullitt County's computers was part of a huge Zeus/Zbot spam campaign that has been ongoing for the past several weeks now, variously disguised as alerts about greeting cards, package tracking numbers, and security updates from Microsoft. - The last time I wrote about money mule scams, some readers wrote in to say, in effect: "The mules were stupid: They should have just taken ALL of the money." These readers miss the fundamental point about these scams that the bad guys understand all too well: it's all about the timing. The bank will always recall the deposit. It's just a matter of when. - Be extremely wary -- nay, run away from -- any transaction in which the other party asks you to convert a revocable transaction into an irrevocable one. Hard cash sent via Western Union, Moneygram and other wire transfer services, is an example of an irrevocable transaction: Once it's done, there's no undoing it. On the other hand, checks can be canceled, and deposits can be reversed. By Brian Krebs | July 2, 2009; 5:14 PM ET To subscribe or to leave the list, or to set other subscription options, go to www.freelists.org/list/real-eyes