A new report from the U.S. Treasury Department found
 that a majority of bank account takeovers by cyberthieves over the past
 decade might have been thwarted had affected institutions known to look
 for and block transactions coming through Tor, a global communications network that helps users maintain anonymity by obfuscating their true location online.
The findings come in a non-public report obtained by KrebsOnSecurity that was produced by the Financial Crimes Enforcement Network
 (FinCEN), a Treasury Department bureau responsible for collecting and 
analyzing data about financial transactions to combat domestic and 
international money laundering, terrorist financing and other financial 
crimes.
In the report, released on Dec. 2, 2014, FinCEN said it examined some
 6,048 suspicious activity reports (SARs) filed by banks between August 
2001 and July 2014, searching the reports for those involving one of 
more than 6,000 known Tor network nodes. Investigators found 975 hits 
corresponding to reports totaling nearly $24 million in likely 
fraudulent activity.
“Analysis of these documents found that few filers were aware of the 
connection to Tor, that the bulk of these filings were related to 
cybercrime, and that Tor related filings were rapidly rising,” the 
report concluded. “Our BSA [Bank Secrecy Act] analysis of 6,048 IP addresses associated with the Tor darknet [link
 added] found that in the majority of the SAR filings, the underlying 
suspicious activity — most frequently account takeovers — might have 
been prevented if the filing institution had been aware that their 
network was being accessed via Tor IP addresses.”
FinCEN said it was clear from the SAR filings that most financial 
institutions were unaware that the IP address where the suspected 
fraudulent activity occurred was in fact a Tor node.
“Our analysis of the type of suspicious activity indicates that a 
majority of the SARs were filed for account takeover or identity theft,”
 the report noted. “In addition, analysis of the SARs filed with the 
designation ‘Other revealed that most were filed for ‘Account Takeover,’
 and at least five additional SARs were filed incorrectly and should 
have been ‘Account Takeover.'”
The government also notes that there has been a fairly recent and 
rapid rise in the number of SAR filings over the last year involving 
bank fraud tied to Tor nodes.
“From October 2007 to March 2013, filings increased by 50 percent,” 
the report observed. “During the most recent period — March 1, 2013 to 
July 11, 2014 — filings rose 100 percent.”
While banks may be able to detect and block more fraudulent 
transactions by paying closer attention to or outright barring traffic 
from Tor nodes, such an approach is unlikely to have a lasting impact on
 fraud, said Nicholas Weaver, a researcher at the International Computer Science Institute (ICSI) and at the University of California, Berkeley.
“I’m not surprised by this: Tor is easy for bad actors to use to 
isolate their identity,” Weaver said “Yet blocking all Tor will do 
little good, because there are many other easy ways for attackers to 
hide their source address.”
Earlier this summer, the folks who maintain the Tor Project 
identified this problem — that many sites and even ISPs are increasingly
 blocking Tor traffic because of its abuse by fraudsters — as an 
existential threat to the anonymity network. The organization used this 
trend as a rallying cry for Tor users to consider lending their brainpower to help the network thrive in spite of these threats.
A growing number of websites treat users from anonymity services differently Slashdot doesn’t let you post comments over Tor, Wikipedia won’t let you edit over Tor
“A
 growing number of websites treat users from anonymity services 
differently Slashdot doesn’t let you post comments over Tor, Wikipedia 
won’t let you edit over Tor, and Google sometimes gives you a 
captcha when you try to search (depending on what other activity they’ve
 seen from that exit relay lately),” wrote Tor Project Leader Roger Dingledine. “Some sites like Yelp go further and refuse to even serve pages to Tor users.”
Dingledine continued:
“The result is that the Internet as we know it is siloing. Each 
website operator works by itself to figure out how to handle anonymous 
users, and generally neither side is happy with the solution. The 
problem isn’t limited to just Tor users, since these websites face 
basically the same issue with users from open proxies, users from AOL, 
users from Africa, etc.
Weaver said the problem of high volumes of fraudulent activity coming
 through the Tor Network presents something of a no-win situation for 
any website dealing with Tor users.
“If you treat Tor as hostile, you cause collateral damage to real 
users, while the scum use many easy workarounds.  If you treat Tor as 
benign, the scum come flowing through,” Weaver said. “For some sites, 
such as Wikipedia, there is perhaps a middle ground. But for banks? 
That’s another story.”
Source:
krebsonsecurity 


 
 
No comments:
Post a Comment