c6 intelligence fraud glossary whitepaper

45
Fraud Glossary FOR PUBLIC DISTRIBUTION Date: 30 October 2012 © C6 Intelligence Information Systems Limited, 2012 NO PART OF THIS PUBLICATION MAY BE REPRODUCED, OR TRANSMITTED WITHOUT THE PRIOR PERMISSION OF C6 INTELLIGENCE INFORMATION SYSTEMS LTD

Upload: c6-intelligence-information-systems-ltd

Post on 27-Jan-2015

117 views

Category:

Economy & Finance


1 download

DESCRIPTION

The C6 intelligence Fraud Glossary Whitepaper is a list of terms used within the fraud industry. The glossary has 5 categories: Definition Crime Law Organization Slang Example: Account Detection Rate Definition - The percentage of fraud cases or accounts that are detected. Since a fraud case may have more than one fraudulent transaction this number is generally higher than the transaction detection rate. This current updated version has 315 entries

TRANSCRIPT

Page 1: C6 intelligence Fraud Glossary Whitepaper

Fraud Glossary FOR PUBLIC DISTRIBUTION Date: 30 October 2012

© C6 Intelligence Information Systems Limited, 2012

NO PART OF THIS PUBLICATION MAY BE REPRODUCED, OR TRANSMITTED WITHOUT THE PRIOR PERMISSION OF C6 INTELLIGENCE INFORMATION SYSTEMS LTD

Page 2: C6 intelligence Fraud Glossary Whitepaper

This page is intentionally left blank.

Page 3: C6 intelligence Fraud Glossary Whitepaper

Fraud Glossary

NO. TERM

CATEGORY: (Definition, Crime, Law, Organization,

Slang)

DESCRIPTION

(Various Sources)

1 Account Detection Rate

Definition The percentage of fraud cases or accounts that are detected. Since a fraud case may have more than one fraudulent transaction this number is generally higher than the transaction detection rate.

2 Account Takeover (1)

Crime Involves fraud on existing financial accounts. When a criminal uses a stolen credit card number to make fraudulent purchases on an existing credit line. Account takeovers are the more common type of identity theft, in contrast to a second type of identity theft referred to as “new account creation” Form of Identity Theft.

3 Account Takeover (2)

Definition A fraudster impersonates the victim and falsely claims a change of address so that he or she can ‘take over’ the victim’s bank account or other financial products.

4 Advance Fee Fraud (419 Fraud)

Crime A type of advance-fee fraud in which individuals or companies receive unsolicited emails or letters, originating from West Africa, promising a percentage of a huge sum of money in return for allowing funds to pass through the victim’s bank account. There is an administration fee to pay as a pre-condition of releasing the funds.

5 419 Fraud (Nigerian Advance Fee Fraud)

Crime Email asking to funnel money through user's bank account. '419' is the Nigerian penal code under which this offence would be prosecuted.

6 420 Fraud (Nigerian Advance Fee Fraud)

Definition Partner to the fraud scheme.

7 Advances Fraud (UK) Definition Premeditated credit abuse. This fraud can be carried out by the consumer or as a result of identity fraud.

Page 4: C6 intelligence Fraud Glossary Whitepaper

8 Advance Fee Fraud Scheme

Crime The victim is required to pay significant fees in advance of receiving a substantial amount of money or merchandise. The fees are usually passed off as taxes, or processing fees, or charges for notarized documents. The victim pays these fees and receives nothing in return. Perhaps the most common example of this type of fraud occurs when a victim is expecting a large payoff for helping to move millions of dollars out of a foreign country.

9 Advance-Fee fraud Crime This involves the criminal tricking a victim into paying an up-front fee with the promise of a large reward later.

10 Adware Definition Software that carries advertising. The software is usually free provided that the user agrees to accept the receipt of advertisements (either in the form of a banner within the application, or as separate pop-up Windows). There is nothing wrong with this arrangement provided everything is openly and clearly agreed between all parties concerned. Adware becomes a concern when it starts to incorporate elements of spyware.

11 Affidavit Definition A sworn statement.

12 Affiliate Bidding Definition A condition in purchasing when multiple bids are tendered for a contract from a single company under various names to give the appearance of competition.

13 Agent Fraud Crime Occurs when a third party involved in a financial transaction perpetrates fraud. See broker/dealer fraud.

14 Alias/Handle Definition An alternative name used by people (or bestowed upon objects) to hide their true identity.

15 Application fraud Crime A fraudster makes an application using a victim's details or false supporting documentation.

16 At Will Definition An employment situation where the employee is not protected from arbitrary firing. Contrast: For Cause.

17 ATM attachments Definition These can be fixed to cash machines (ATMs) to extract PIN numbers and personal details from cards. The attachments can include skimming devices or false fronts with built-in card readers, as well as pinhole cameras.

18 ATM Fraud Definition Encompassing term to describe fraud related to ATM card accounts where a card is used to immediately withdraw funds from a consumer's account using a PIN based transaction at an ATM.

Page 5: C6 intelligence Fraud Glossary Whitepaper

19 Back Door Definition Unauthorized entry point or weakness discovered by a hacker.

20 Back Door/ Trap Door

Definition A way into a software system that the programmer or administrator of that system (or a cracker who has gained access) has deliberately left for himself. A typical back door will allow its designer access to the system without checking the file of authorized users.

21 Backdate Definition To post a date on a document earlier than the actual creation for deception.

22 Bait and Switch Definition In consumer fraud, advertising a low cost item and then steering the customer to a higher priced item when they come to buy, claiming the "low priced item was "sold out".

23 Ban on Spam Law/Slang Nickname given to the EU's anti-spam directive. It sets out specific conditions for installing so-called cookies on users' personal computers and for using location data generated by mobile phones. Notably, the Directive also introduces a 'ban on spam' throughout the EU.

24 Bank Examiner Scheme

Crime The crook poses as a bank examiner who is trying to catch a dishonest teller. The crook needs the victim to withdraw a substantial sum of money to test the teller. The crook then asks the victim to turn over the cash for a receipt while they use the cash as evidence but runs with it.

25 Bank Identification Number (BIN)

Definition Unique number consists of two part code that is assigned to banks and savings associations for identification. The first part shows the location and the second part identifies the bank.

26 Bankruptcy Fund Crime The crook files a notice of bankruptcy, then approaches each of his creditors and tells each one that he wants them to get paid something, maybe 10 %. After all have been approached and settled the crook withdraws his filing and most of the debt has been settled for a faction of what he owes.

Page 6: C6 intelligence Fraud Glossary Whitepaper

27 Behaviour Blocking /

Sand Boxing

Definition Software monitors the executable actions of potentially malicious software and stops dangerous operations from taking place (such as deleting files, modifying system settings and so on). Often considered to be more effective than virus scanners in blocking malicious code because they monitor actual functions rather than look for a known signature. In order for a traditional virus scanner to detect a virus, it has to have the actual signature, or fingerprint, of the virus within its database. New viruses often succeed because they are not immediately recognised simply because their signatures are not yet held in the database. Behaviour blocking doesn't care whether it's a new virus, an old virus or something completely different - it simply stops it harming the system.

28 Bid Rigging Definition Any scheme that gives the appearance of competition but is not because participants establish the winner before submitting bids for the contract. See Affiliate Bidding and Bid Rotation.

29 Bin raiding Definition The practice of rifling through household or commercial bins to find documents, such as bills or statements, containing personal or confidential information about individuals, which could be used to assume their identity.

30 Boiler Room Scam Crime Refers to a busy centre of activity, often selling questionable goods by telephone. It typically refers to a room where salesmen work using unfair, dishonest sales tactics, sometimes selling penny stock or committing outright stock fraud.

31 BOLO Definition Be on the lookout for….

32 Bot Herding Definition Gathering of compromised computers prior to becoming a Botnet

33 Botnet Definition Set of compromised computers ("bots" or "zombies") under the unified command and control of a "botmaster;" commands are sent to bots via a command and control channel (bot commands are often transmitted via IRC, Internet Relay Chat).

34 Bots Definition Software applications that run automated tasks such data mining of webpages.

35 Broker/Dealer Fraud Crime Occurs when a third party involved in a financial transaction perpetrates fraud. See broker/dealer fraud.

Page 7: C6 intelligence Fraud Glossary Whitepaper

36 Browser Hijacker Crime Program or code that changes your browser settings so that you are redirected to different Web sites. Most browser hijackers alter the default home pages and search pages to those of customers who pay for the traffic generated.

37 Brute Force Attack Crime Attack in which every possible key is attempted until the correct key is found. Cipher text is deciphered under different keys until recognizable plaintext is discovered. On average, this will take half as many attempts as there are keys in the keyspace.

38 Buffer Overflow Definition A buffer is an area of memory used to hold data for processing. It has a predetermined size. If the data being placed into the buffer is too large, is not checked and is allowed to overflow the buffer, it can have unexpected effects. At best, the excess data is simply lost. At worst, the excess data might overwrite other legitimate data.

39 Business / Employment Schemes

Crime Typically incorporate identity theft, freight forwarding, and counterfeit check schemes. The fraudster posts a help-wanted ad on popular Internet job search sites. Respondents are required to fill out an application wherein they divulge sensitive personal information, such as their date of birth and Social Security number. The fraudster uses that information to purchase merchandise on credit. The merchandise is sent to another respondent who has been hired as a freight forwarder by the fraudster. The merchandise is then reshipped out of the country. The fraudster, who has represented himself as a foreign company, then pays the freight forwarder with a counterfeit check containing a significant overage amount. The overage is wired back to the fraudster, usually in a foreign country, before the fraud is discovered.

40 Bust Out Fraud (US) Crime When fraud occurs in an account that has only been opened for a short time. The account appears to be a good account until the limit is raised, charged up, and then does not pay. Differs from account takeover since it is intended and carried out by original holder.

41 Call Centre Fraud Crime Call centre fraud happens when a call service representative accesses several accounts during a call from a customer and steals the data.

Page 8: C6 intelligence Fraud Glossary Whitepaper

42 Capital Controls Definition Measures such as transaction taxes or caps on volume and other limitations which a country's government can use to regulate the flows into and out of the nation's capital account. They include exchange controls that prevent or limit the buying and selling of a nation currency at the market rate, controls on the international sale or purchase of various financial assets, transaction taxes such as the proposed Tobin tax and sometimes even limits on the amount of money a private citizen is allowed to take out of the country.

43 Captcha Definition A security technique that ensures that a human has made the transaction online rather than a computer. It is also known as "Automated Turing Tests" and was originally developed at Carnegie Mellon University. Random words or letters are displayed in a distorted fashion so that they can be deciphered by people, but not by software. This usually involves the use of graphic images of characters and numbers. Users are asked to type in what they see on screen to verify human involvement.

44 Card capture device / card trapping

Definition A device inserted into the card slot of a cash machine (ATM) to capture the data contained on cards.

45 Card cloning or ‘Skimming'

Crime Cloning involves creating a duplicate of your payment card. The data on a card's magnetic stripe is read electronically by a 'skimming' device and downloaded onto a computer or copied onto a duplicate card.

46 Card Issuer loss Definition Three types of losses: “(1) costs associated with reissuing new payment cards, (2) costs associated with monitoring open accounts for fraud (with or without reissue), and (3) fraud losses.

47 Card Not Necessary (CNN)

Definition Without possessing the victim’s credit card, having sufficient personal and financial details to be able to orders goods online/mail order.

48 Card Not Present (CNP)

Definition A transaction where the card is not present at the time of purchase-internet, mail, telephone.

49 Card Trapping / Card Capture Device

Definition A device inserted into the card slot of a cash machine (ATM) to capture the data contained on cards

Page 9: C6 intelligence Fraud Glossary Whitepaper

50 Card Verification Value (CVV)

Definition Authentication number established by prepaid debit card companies to further efforts towards reducing fraud for internet transactions. A three-digit number printed in the signature space on the back of most credit cards, such as Visa, Mastercard, and Discover cards. On American Express Cards it is a four digit code.

51 Carderplanet Organization Prior to 2004, Shadow crew and Carderplanet were only two carding forums. Organized much like the Mafia.

52 Carders Crime Individuals engaged in criminal carding activities.

53 Cardersmarket Organization Founded in 2005. In 2006 one of its admins, "Iceman", took over four carding rivals to increase membership.

54 Cardholder Information Security Program (CISP)

Definition Now called the Payment Card Industry Data Security Standard (PCI DSS), is a comprehensive set of international security requirements for protecting cardholder data. Developed by VISA and etc to help facilitate the broad adoption of consistent data security measures on a global basis. Twelve Requirements.

55 Cardholder-Not-Present Fraud (CNP)

Definition Using stolen cards or card details and personal information, a fraudster purchases good or services remotely - online, by telephone or by mail order.

56 Carding (1) Crime Broad definition. Process by which large volumes of data are stolen, resold, and ultimately used by criminals to commit fraud is revealed in an underground world.

57 Carding (2) Crime Narrow definition. Refers to the unauthorized use of credit and debit card account information to fraudulently purchase goods and services.

58 Carding (3) Crime Evolving definition. An assortment of activities surrounding the theft and fraudulent use of credit and debit card account numbers including computer hacking, phishing, cashing-out stolen account numbers, re-shipping schemes, and Internet auction fraud.

59 Carding (4) Crime Involves the large scale theft of credit card account numbers and other financial information versus other methods with limited ID theft which uses dumpster diving, skimming, phishing, change of address, and “old-fashioned stealing.”

Page 10: C6 intelligence Fraud Glossary Whitepaper

60 Carding (5) Crime Process by which large volumes of data are stolen, resold, and ultimately used by criminals to commit fraud. Narrow sense- Unauthorized use of credit and debit card account information to fraudulently purchase goods and services.

61 Carding Forums Crime Websites for carders who have membership.

62 Case Management Definition System that provides the facility to assign and prioritize transactions for review on suspect cases.

63 CCpowerForums (1) Organization Carding forum with forums on hacking, trojans, keylogger, etc.

64 CCpowerForums (2) Organization Offered hacking, etc help on its forum in addition to cards.

65 Change of address fraud

Crime Using a victim’s name and address details, a criminal contacts banks and businesses to register a change of address. The fraudster may then ask for valuable items such as cheque books, debit cards or account statements to be sent to the new address. Change of address fraud can also be used to facilitate an account takeover.

66 Chargeback Definition A credit card transaction that is billed back to the merchant after the sale has been settled. Results when a card holder disputes a transaction to the issuer then initiates on the card holder's behalf.

67 Check Fraud Definition Encompassing term used to describe fraud related to checks including kiting, counterfeiting, forgery, and paperhanging.

68 Check Kiting Definition The illegal act of taking advantage of the float to make use of non-existent funds in a checking or other bank account. It is commonly defined as writing a check from one bank knowingly with non-sufficient funds, then writing a check to another bank, also with non-sufficient funds, in order to cover the absence. The purpose of check kiting is to falsely inflate the balance of a checking account in order to allow checks that have been written that would otherwise bounce to clear.

69 Checksum Definition Checksums are generated by a function that is dependent upon the data in question. For security purposes, checksums are generated by one-way hash functions. Once a checksum has been generated, it is either stored with or transmitted with the data in question. The integrity of the data can be checked by generating a new checksum. If the two checksums are identical, then the file has not changed. If the two checksums are different, then the data (or file) in question has been altered.

Page 11: C6 intelligence Fraud Glossary Whitepaper

70 CIFAS Organization UK's Fraud Prevention Service, a third sector organisation dedicated to preventing fraud. Originally founded in 1988 as the "Credit Industry Fraud Avoidance System", its membership today includes many organisations from outside of the credit industry. It addresses identity fraud, application fraud, staff fraud, first and third party fraud, insurance fraud and fraud against public sector organisations. . It provides a range of fraud prevention services to its members.

71 Circular Check / Cheque Kiting

Definition Forms of kiting in which one or more additional banks serve as the location of float, and involve the use of multiple accounts at different banks. In its simplest form, the kiter, who has two or more accounts of his own at different banks, writes a cheque on day one to himself from Bank A to Bank B (this cheque is referred to as the kite), so funds become available that day at Bank B sufficient for all cheques due to clear. On the following business day, the kiter writes a cheque on his Bank B account to himself and deposits it into his account at Bank A to provide artificial funds allowing the cheque he wrote a day earlier to clear. This cycle repeats until the offender is caught, or until the offender deposits genuine funds, thereby eliminating the need to kite, and often going unnoticed. May involve more than one person or groups.

72 Click Fraud Definition/Crime Occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link. Use of a computer to commit this type of Internet fraud is a felony in many jurisdictions. There have been arrests relating to click fraud with regard to malicious clicking in order to deplete a competitor's advertising budget.

73 Click Jacking/ UI Redressing

Definition/Crime A malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages. Vulnerability across a variety of browsers and platforms, a click jacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function.

74 Collusion Definition/Crime An agreement between two or more people to participate in an illegal activity.

Page 12: C6 intelligence Fraud Glossary Whitepaper

75 Commercial / Corporate identity theft

Definition/Crime The use of the identity of a company, business or its directors, without their knowledge, to facilitate fraud.

76 Commercialware Definition Software id either shareware or commercial. Commercial costs money.

77 Common Point of Compromise (CPC)

Definition A designation assigned to a Merchant by a Payment Brand when a pattern of fraudulent use of credit cards has been detected after these cards were used legitimately at this Merchant location. Often used interchangeably with Point of Compromise Reports (POC).

78 Common Point of Purchase (CPP) Common Point of Compromise

Definition A designation assigned to a Merchant by a Payment Brand when a pattern of fraudulent use of credit cards has been detected after these cards were used legitimately at this Merchant location. Often used interchangeably with Point of Compromise Reports (POC).

79 Confirmer Slang Accomplice that validates a fake identity.

80 Consumer Loan Fraud

Definition Application fraud related to consumer loans.

81 Cookie Definition This is a small data file automatically stored on a user's computer for record-keeping purposes. It contains information about the user in relation to a particular website, such as their username and preferences.

82 Corporate Fraud Definition/Crime The dishonest abuse of their position by (usually) senior members of staff to misrepresent a company's true financial position.

83 Corporate Kiting Definition/Crime Involves the use of a large kiting scheme involving perhaps millions of dollars to secretly borrow money or earn interest. While limits are often placed on an individual as to how much money can be deposited without a temporary hold, corporations may be granted immediate access to funds, which can make the scheme go unnoticed

84 Corporate / Commercial Identity Theft

Definition/Crime The use of the identity of a company, business or its directors, without their knowledge, to facilitate fraud.

85 Counterfeit Card Definition/Crime A fraudulent reproduction of a printed, embossed and encoded credit or debit card. Or a payment card that has been validly issued but has been altered or fabricated.

86 Counterfeit Check Schemes

Crime A counterfeit or fraudulent cashier’s check or corporate check is utilized to pay for merchandise. Often these checks are made out for a substantially

Page 13: C6 intelligence Fraud Glossary Whitepaper

larger amount than the purchase price. The victims are instructed to deposit the check and return the overage amount, usually by wire transfer, to a foreign country. Because banks may release funds from a cashier's check before the check actually clears, the victim believes the check has cleared and wires the money as instructed. One popular variation of this scam involves the purchase of automobiles listed for sale in various Internet classified advertisements. The sellers are contacted about purchasing the autos and shipping them to a foreign country. The buyer, or person acting on behalf of a buyer, then sends the seller a cashier's check for an amount several thousand dollars over the price of the vehicle. The seller is directed to deposit the check and wire the excess back to the buyer so they can pay the shipping charges. Once the money is sent, the buyer typically comes up with an excuse for cancelling the purchase, and attempts to have the rest of the money returned. Although the seller does not lose the vehicle, he is typically held responsible by his bank for depositing a counterfeit check.

87 Credit Card Generators

Definition/Crime Programs used by criminal organizations to generate valid credit card numbers that will successfully process for a transaction yet are not actual issued card numbers. Numbers are generated based on the institution's BIN and sequence numbers and also follow MOD-10 rules.

88 Credit Freeze Definition Prevents potential creditors and other third parties from accessing your credit report unless you lift the freeze or already have a relationship with the company.

89 Credit/Debit Card Fraud

Definition/Crime It is the unauthorized use of a credit/debit card to fraudulently obtain money or property. Credit/debit card numbers can be stolen from unsecured web sites, or can be obtained in an identity theft scheme.

90 Current Account Fraud (UK)

Definition Fraud related to demand deposit accounts. This can include application fraud, check fraud, ATM fraud, or debit card fraud. Also called Demand Deposit Account Fraud.

91 Current Address Fraud

Definition Identity fraud perpetrated by a criminal who shares the same address as the victim. The fraudster is likely to have access to or is able to intercept the victim's post and so can apply for and use existing products and services in the name of the victim.

Page 14: C6 intelligence Fraud Glossary Whitepaper

92 Cut and Paste Attack Definition/Crime An assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed. The substituted section appears to decrypt normally, along with the authentic sections, but results in plaintext (unencrypted text) that serves a particular purpose for the attacker. A type of message modification attack: the attacker removes a message from network traffic, alters it, and reinserts it. This is called an active attack, because it involves an attempts to change information; in comparison, a passive attack, such as password sniffing, seeks information but does not itself modify the valid information, although it may be used in conjunction with an active form of attack for various purposes.

93 Cyber Fraud Definition Fraud committed using a computer, such as hacking, denial of service attacks, phishing, etc.

94 Daemon Definition A background process that carries out tasks on behalf of every user. Daemons spend most of their time sleeping until something comes along which requires their help. Unix systems have many daemons. The term probably originated in its mythological counterpart and was later rationalized into Disk And Execution Monitor.

95 Data Theft / Personal Information Theft

Definition Incidents seem to fall into three main categories: theft (usually of laptops), hacking, and what is often somewhat kindly referred to as “inadvertent disclosure.” Ironically, it is quite easy to draw a parallel between these categories and the three most commonly cited safeguards of security in the legislative specifications found in the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley Act (GLBA) regulations. Laptop theft is a physical security issue; hacking prevention falls under technical safeguards; and various breakdowns in process can be prevented with administrative security controls.

96 Data Breach (1) Definition Generally and broadly defined to include “an organization’s unauthorized or unintentional exposure, disclosure, or loss of sensitive personal information, which can include personally identifiable information such as Social Security numbers, or financial information such as credit card numbers.

Page 15: C6 intelligence Fraud Glossary Whitepaper

97 Data Breach (2) Definition Generally and broadly defined to include “an organization’s unauthorized or unintentional exposure, disclosure, or loss of sensitive personal information, which can include personally identifiable information such as Social Security numbers, or financial information such as credit card numbers.

98 Data Dump Slang It contains a record of the table structure and/or the data from a database and is usually in the form of a list of SQL statements. A database dump is most often used for backing up a database so that its contents can be restored in the event of data loss. Corrupted databases can often be recovered by analysis of the dump. Database dumps are often published by free software and free content projects, to allow reuse or forking of the database.

99 Data Masking Definition A method of creating a structurally similar but inauthentic version of an organization's data that can be used for purposes such as software testing and user training. The purpose is to protect the actual data while having a functional substitute for occasions when the real data is not required. The format of data remains the same; only the values are changed. The data may be altered in a number of ways, including encryption, character shuffling and character or word substitution. Whatever method is chosen, the values must be changed in some way that makes detection or reverse engineering impossible.

100 Data Protection Act (UK)

Law The Data Protection Act 1998 sets out the legal basis for handling and protecting private information and data in the UK.

101 Data Splitting Definition An approach to protecting sensitive data from unauthorized access by encrypting the data and storing different portions of a file on different servers. When split data is accessed, the parts are retrieved, combined and decrypted. An unauthorized person would need to know the locations of the servers containing the parts, be able to get access to each server, know what data to combine, and how to decrypt it.

102 Day of the Jackal fraud

Definition/Crime Fraudster assumes the identity of a deceased child, many years after their death when they would have been an adult, in order to commit identity fraud.

103 Debit Card Fraud Definition/Crime Fraud with Debit Cards where funds are immediately withdrawn from account.

Page 16: C6 intelligence Fraud Glossary Whitepaper

104 Debit Cards Definition Three ways that can be processed-online debit (also known as PIN debit), offline debit (also known as signature debit) and the Electronic Purse Card System.

105 Demand Deposit Account Fraud

Definition/Crime Fraud related to demand deposit accounts. This can include application fraud, check fraud, ATM fraud, or debit card fraud. Also called Current Account Fraud.

106 Denial of Service Definition An attack that is specifically designed to prevent the normal functioning of a system and thereby to prevent lawful access to that system and its data by its authorized users. DoS can be caused by the destruction or modification of data, by bringing down the system, or by overloading the system's servers (flooding) to the extent that service to authorized users is delayed or prevented.

107 Detection Rate Definition/Crime Amount of fraud detected by a fraud prevention system at a given level of account reviews.

108 Diploma Scam Definition/Crime The buying of degrees without studying. Fake degrees can help terrorist get around immigration issues and visa laws.

109 DMZ/Perimeter Network

Definition Sometimes called a DMZ (de-militarized zone); a perimeter network is an additional network between the protected network and the unprotected network, providing an additional layer of security. Servers that are necessarily exposed to the Internet (such as web servers, mail servers) are best placed in the DMZ and protected by a firewall or firewalls. Further firewalls separate the DMZ from the trusted network, or corporate LAN.

110 DNS Poisoning Definition A way of forcing users to a malicious site by injecting bad data into a domain name server's cache in order to change (for users of that server) the destination a domain resolves to. The effect of DNS poisoning is that the conversion from a URL to an IP address fails. For example, instead of translating the address www.americanexpress.com to the IP address corresponding to the actual site of American Express, a server that has been a victim of DNS poisoning will supply the incorrect IP address. The URL that the user types will still be printed in the address bar, and if the content of the fraudulent website to which the translation is done looks the same as that of the legitimate site, then the user will not notice that the attack took place. Moreover, the fraudulent website will be able to harvest all the cookies intended for the legitimate website, which will allow it to impersonate the user's machine to

Page 17: C6 intelligence Fraud Glossary Whitepaper

the real site as well.

111 DNS Server Definition A server that translates DNS names (such as malwarecity.com) into an IP address that is actually used for communication on the Internet.

112 Dobber Slang The member of the criminal gang responsible for finding the Dates of Birth of intended victims of Identity Theft. The Dobber frequently also conducts credit searches as well as well as other personal data used as security questions by financial institutions.

113 Dump Slang Information electronically copied from magnetic stripe on back of cards. See full track data.

114 Dumpster Diving Crime Known as skipping in the UK is the practice of sifting through commercial or residential trash to find items that have been discarded by their owners, but which may be useful to the dumpster diver.

115 Email Spoofing Definition When an e-mail appears to have been originated from one source, yet it has actually been generated from another is known as e-mail spoofing. The act of forging an e-mail header (the [email protected] portion of an e-mail) allows individuals who are sending "junk mail", or "SPAM" to author e-mails that cannot (or can be difficult) be traced back to the originator.

116 Embezzling Definition/Crime Cash taken directly from an organization by an insider.

117 Encryption Definition The process of converting data into cipher text to prevent it from being understood by an unauthorised party.

118 Exploit Definition The methodology for enacting an attack against a particular vulnerability.

119 Extortion Definition/Crime A crime in which someone gets money or information from someone else by using force or threats

120 Fail Safe Definition The design principle that requires that the failure of part of a system will not result in the failure of the rest of the system - particularly in terms of access to the rest of the system.

121 False Identity Fraud Definition The creation of a fictitious or false identity to facilitate fraudulent activity.

122 False Negative Definition A false negative is the term applied to a failure in an alerting system - most commonly in an anti-virus product or intrusion detection system. It occurs when a virus or intrusion condition exists, but is 'allowed' (or ignored or missed) by the alerting

Page 18: C6 intelligence Fraud Glossary Whitepaper

system.

123 False Positive (1) Definition The amount of good or true accounts flagged by the fraud prevention system as fraudulent at a given level of account reviews.

124 False Positive (2) Definition A false positive is a term applied to a failure in an alerting system - most commonly in an anti-virus product or intrusion detection system. It occurs when a virus or intrusion condition is incorrectly reported; that is, the alerting systems report a virus or intrusion condition that does not exist. Too many false positives can be very intrusive.

125 Fictitious Identity Fraud

Definition/Crime Fraudster creates false personal information or manipulates an existing identity to avoid detection. Also known as Identity Fraud.

126 Financial Action Task Force (FATF)

Organization Also known by its French name Groupe d'action financière (GAFI) is an intergovernmental organization founded in 1989 by the G7. The purpose of the FATF is to develop policies to combat money laundering and terrorist financing. The FATF Secretariat is housed at the headquarters of the OECD in Paris.

127 Financial Institution Loss

Definition The economic loss for both the financial institutions issuing payment cards and the corporate entities from which cardholder account information is stolen is significant. Issuing financial institutions may experience three types of losses, including “(1) costs associated with reissuing new payment cards, (2) costs associated with monitoring open accounts for fraud (with or without reissue), and (3) fraud losses.

128 Financial Services Act

Law Imposed four statutory objectives upon the FSA:

* market confidence: maintaining confidence in the financial system

* public awareness: promoting public understanding of the financial system;

* consumer protection: securing the appropriate degree of protection for consumers; and

* reduction of financial crime: reducing the extent to which it is possible for a business carried on by a regulated person to be used for a purpose connected with financial crime

Regulatory principles:

* efficiency and economy: the need to use its resources in the most efficient and economic way.

* role of management: a firm’s senior management is responsible for its activities and for ensuring that

Page 19: C6 intelligence Fraud Glossary Whitepaper

its business complies with regulatory requirements. This principle is designed to guard against unnecessary intrusion by the FSA into firms’ business and requires it to hold senior management responsible for risk management and controls within firms. Accordingly, firms must take reasonable care to make it clear who has what responsibility and to ensure that the affairs of the firm can be adequately monitored and controlled.

* proportionality: The restrictions the FSA imposes on the industry must be proportionate to the benefits that are expected to result from those restrictions. In making judgements in this area, the FSA takes into account the costs to firms and consumers. One of the main techniques they use is cost benefit analysis of proposed regulatory requirements. This approach is shown, in particular, in the different regulatory requirements applied to wholesale and retail markets.

* innovation: The desirability of facilitating innovation in connection with regulated activities. For example, allowing scope for different means of compliance so as not to unduly restrict market participants from launching new financial products and services.

* international character: Including the desirability of maintaining the competitive position of the UK. The FSA takes into account the international aspects of much financial business and the competitive position of the UK. This involves co-operating with overseas regulators, both to agree international standards and to monitor global firms and markets effectively.

* competition: The need to minimise the adverse effects on competition that may arise from the FSA's activities and the desirability of facilitating competition between the firms it regulates. This covers avoiding unnecessary regulatory barriers to entry or business expansion. Competition and innovation considerations play a key role in the FSA's cost-benefit analysis work. Under the Financial Services and Markets Act, the Treasury, the Office of Fair Trading and the Competition Commission all have a role to play in reviewing the impact of the FSA's rules and practices on competition.

129 Financial Services Authority (FSA)

Organization An independent, non-governmental board appointed by UK Treasury.

Page 20: C6 intelligence Fraud Glossary Whitepaper

130 Firewall Definition Computer hardware or software designed to prevent unauthorised access to the system via the internet.

131 First Party Fraud Definition/Crime Fraud committed against a financial institution by one of its own customers.

132 Float Definition Duplicate money present in the banking system during the time between a deposit being made in the recipient's account and the money being deducted from the sender's account.

133 Forgery Definition/Crime Process of making or adapting documents such as a check with the intent to deceive.

134 Fraud Definition/Crime The use of deception to make a gain by unlawful or unfair means.

135 Fraud Alert Definition When placed on credit report, potential creditors must either contact you or have “reasonable policies and procedures in place to verify your identity before issuing credit in your name.

136 Fraud Alert Website www.met.police.uk/fraudalert

Organization The Fraud section of the Metropolitan Police website originally designed and written by Detective Sergeant Colin Holder in 2001.

137 Fraud Prevention Service (UK)

Organization UK's Fraud Prevention Service, a third sector organisation dedicated to preventing fraud. Originally founded in 1988 as the "Credit Industry Fraud Avoidance System", its membership today includes many organisations from outside of the credit industry. It addresses identity fraud, application fraud, staff fraud, first and third party fraud, insurance fraud and fraud against public sector organisations.

138 Fraud Gang Definition A group of organised criminals / fraudsters working together to defraud financial organisations, retailers, companies or individuals.

139 Fraud Ring Definition/Crime A group of organised criminals / fraudsters working together to defraud financial organisations, retailers, companies or individuals. In general, a group of individuals who collude together to commit fraud.

140 Fraudster Definition/crime A person who commits fraud.

141 Free product and Service Offers

Definition Drive traffic to its website, often registering personal information, or some variable of rip-off.

142 Freight Forwarding /

Reshipping

Crime The receiving and subsequent reshipping of on-line ordered merchandise to locations usually abroad. Individuals are often solicited to participate in this activity in chat rooms, or through Internet job

Page 21: C6 intelligence Fraud Glossary Whitepaper

postings. Unbeknownst to the reshipper, the merchandise has been paid for with fraudulent credit cards.

143 Front Companies Definition/Crime Businesses set up by criminals to facilitate fraud. The company may be used to process transactions on fraudulently acquired products.

144 Full Track Data Definition In the Dump, it is the two tracks of data that is on the back of cards. Track 1 is alpha numeric and contains customer's name and account number. Track 2 is numeric and contains the account number, expiration date, and secure code (CVV) and other institution data. Dumps for sale on forums usually contain Track 2. Carders refer to BINs and PINs.

145 Fulls Slang A full set of personal information including maiden name of mother.

146 Ghost Terminal Definition Skimming device where a fake ATM touch pad and reader are placed over a legitimate ATM. Reader obtain card information and PIN but will not process the transaction since the legitimate ATM does not function.

147 Google Hacking Definition The use of a search engine, such as Google, to locate a security vulnerability on the Internet. There are generally two types of vulnerabilities to be found on the Web: software vulnerabilities and misconfigurations. The use of a search engine, such as Google, to locate a security vulnerability on the Internet. There are generally two types of vulnerabilities to be found on the Web: software vulnerabilities and misconfigurations.

148 Grayware Definition Grayware (or greyware) is a general term sometimes used as a classification for applications that behave in a manner that is annoying or undesirable, and yet less serious or troublesome than malware. Grayware encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that are designed to harm the performance of computers on your network. The term has been in use since at least as early as September 2004. Refers to applications or files that are not classified as viruses or trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization.

Page 22: C6 intelligence Fraud Glossary Whitepaper

149 Hacker Definition The origin of the term is not clear. Some trace it back to the Model Railroad Club at the Massachusetts Institute of Technology in the '50s - others to early radio enthusiasts. The genuine hacker is more likely to use his or her own computer, or someone else's computer with permission and approval. The genuine hacker will look for weaknesses in the system, but will publish his or her discoveries. The cracker is more likely to keep discoveries secret or disclosed only to other crackers.

150 Hactivism Definition Politically-motivated hacking. The term demonstrates how the two terms 'hacker' and 'cracker' are becoming confused - since there is malicious intent involved, it would be best described as 'cracktivism'.

151 Handle/Alias Definition An alternative name used by people (or bestowed upon objects) to hide their true identity.

152 Hard Fraud Definition/Crime Type of fraud committed where the intent is to defraud an organization.

153 Heist Definition/Crime An organized attempt by thieves to steal something

154 Heuristic Analysis Definition The ability of a virus scanner to identify a potential virus by analysing the behaviour of the program, rather than looking for a known virus signature. In general, heuristic analysis is not as reliable as signature-based virus scanning as it is not possible to predict precisely what a program will do when executed. However, heuristic scanning is a useful addition to any anti-virus policy.

155 Hype and Dump Manipulation (Pump and Dump)

Definition Involve the touting of a company's stock (typically microcap companies) through false and misleading statements to the marketplace. After pumping the stock, fraudsters make huge profits by selling their cheap stock into the market. Pump and dump schemes often occur on the Internet where it is common to see messages posted that urge readers to buy a stock quickly or to sell before the price goes down.

156 "I Go Chop Your Dollar"

Slang Song related to 419 Frauds. Made famous by Nigerian singer who was arrested for fraud. ("Oyinbo man I go chop your dollar, I go take your money and disappear 419 is just a game, you are the loser I am the winner" *…+), which was banned in Nigeria after many complaints.

157 Iceman Organization Cardersmarket admin took control of 4 competitors carding forums

Page 23: C6 intelligence Fraud Glossary Whitepaper

158 Identity Fraud (1) Crime The use of a misappropriated identity in criminal activity, to obtain goods or services by deception. This usually involves the use of stolen or forged identity documents such as a passport or driving licence.

159 Identity Fraud (2) Crime Fraudster creates false personal information or manipulates an existing identity to avoid detection. Also known as Fictitious Identity Fraud.

160 Identity Fraud (cifas) Definition The use of a misappropriated identity in criminal activity, to obtain goods or services by deception. This usually involves the use of stolen or forged identity documents such as a passport or driving licence.

161 Identity Fraud /

Identity Theft

Definition/Crime The use of an individual's identifying details (name, date of birth, current or previous address, mother’s maiden name, etc) without their knowledge or consent to assume their identity. The criminal uses these details to obtain goods or services, loans, passports, credit cards or bank accounts in the victim's name.

162 Identity Theft (1) Crime Used without victim’s knowledge to commit theft or fraud. Identity theft is a vehicle for perpetrating other types of fraud schemes. Typically, the victim is led to believe they are divulging sensitive personal information to a legitimate business, sometimes as a response to an email solicitation to update billing or membership information, or as an application to a fraudulent Internet job posting.

163 Identity Theft (2) Crime Includes Account Takeover and New Account Creation

164 Identity Theft (3) Crime When someone steals personal information that is then used to either obtain credit in the victim's name, employment, health care, or housing. Also known as True Name Identity Theft.

165 Identity Theft (4) Crime Identity Theft (also known as impersonation fraud) is the misappropriation of the identity (such as the name, date of birth, current address or previous addresses) of another person, without their knowledge or consent. These identity details are then used to obtain goods and services in that person's name.

166 Identity Theft (CIFAS) Definition (also known as impersonation fraud) is the misappropriation of the identity (such as the name, date of birth, current address or previous addresses) of another person, without their knowledge or consent. These identity details are then used to obtain goods and services in that person's name.

Definition Identity Theft (also known as impersonation fraud) is the misappropriation of the identity (such as the name, date of birth, current address or previous addresses) of another person, without their knowledge or consent. These identity details are

Page 24: C6 intelligence Fraud Glossary Whitepaper

then used to obtain goods and services in that person's name.

167 Identity Theft/Fraud Definition The use of an individual's identifying details (name, date of birth, current or previous address, mother’s maiden name, etc) without their knowledge or consent to assume their identity. The criminal uses these details to obtain goods or services, loans, passports, credit cards or bank accounts in the victim's name.

168 IDs/novs Slang Identity fraud perpetrated by a criminal who shares the same address as the victim. The fraudster is likely to have access to or is able to intercept the victim's post and so can apply for and use existing products and services in the name of the victim.

169 Impersonation of the Deceased Fraud (IOD)

Definition/Crime A criminal takes on the identity of a deceased person to facilitate fraudulent activity.

170 Integration (1) Definition/Crime The third of the Money Laundering stages. If the Layering process succeeds, then the integration places the laundered proceeds back into the legitimate economy so that it seems like normal business funds. See Money Laundering Stages.

171 Integration (2) Definition/Crime The money re-enters the mainstream economy in legitimate-looking form — it appears to come from a legal transaction. At this point, the criminal can use the money without getting caught.

172 Internal Fraud Definition Fraud by someone within the organization. See Embezzling and Identity Theft.

173 International Association for the Advancement of Criminal Activity (IAACA)

Organization Criminal organization which later became Theft Services, CardersMarket, and CCpowersForum.

174 Internet Crime Complaint Center (IC3)

Organization A multi-agency task force made up by the Federal Bureau of Investigation (FBI), the National White Collar Crime Centre (NW3C), and the Bureau of Justice Assistance (BJA). Purpose is to serve as a central hub to receive, develop, and refer criminal complaints regarding the rapidly expanding occurrences of cyber-crime.

175 Investment Fraud Definition/Crime An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.

176 IP Spoofing Definition IP spoofing involves imitating a trusted IP address in order to gain access to protected information

Page 25: C6 intelligence Fraud Glossary Whitepaper

resources. One method is by exploiting source routing in IPv4. This allows the originator of a datagram to specify certain, or even all intermediate routers that the datagram must pass through on its way to the destination address. Effectively, you make the destination host think that you are a known and trusted host rather than a school kid on his father's laptop.

177 Key stroke logger (1) Definition Hardware or software installed onto a computer to record keystrokes and mouse movements. Fraudsters can use this device to obtain the passwords, user names and other confidential details of the computer user.

178 Key stroke logger (2) Definition A program that operates without a user’s knowledge and records all of the keystrokes. Once the keystrokes are logged, they are hidden in the machine for later retrieval or shipped raw to the attacker. The attacker then carefully goes through the data in hopes of either finding a password, or possibly other useful information. Often used for identity theft.

179 Kiting Definition Using several bank accounts in different banks, making deposits and writing checks against the accounts before the deposit checks clear the banking system, creating a "float" of money out of nothing more than the lag in time when checks clear and post to their respective accounts.

180 Larceny Definition The crime of stealing personal property

181 Layering Definition The second of the three Money Laundering stages. The process of separating criminal proceeds from their source using complex layers of financial transaction designed to hide the audit trail and provide anonymity.

Involves sending the money through various financial transactions to change its form and make it difficult to follow. Layering may consist of several bank-to-bank transfers, wire transfers between different accounts in different names in different countries, making deposits and withdrawals to continually vary the amount of money in the accounts, changing the money’s currency, and purchasing high-value items (boats, houses, cars etc) to change the form of the money. This is the most complex step in any laundering scheme, and it’s all about making the original dirty money as hard to trace as possible. See Money Laundering Stages.

Page 26: C6 intelligence Fraud Glossary Whitepaper

182 Leeches Slang Leechers are actively downloading the file via torrent file. See Seeds.

184 Letter Bomb Definition A piece of email containing live data intended to do malicious things to the recipient's machine or terminal. Under UNIX, a letter bomb can also try to get part of its content interpreted as a shell command to the mailer. The results of this could range from amusing to denial of service.

185 Logic Bomb Definition A resident computer program that triggers the perpetration of an unauthorized act when particular states of the system are realized. For example, a logic bomb could remain hidden and dormant until December 25th, and then delete all or specified files.

186 London Illegal Money Lending Team

Organization London group that protects against loan sharks.

187 Lost card fraud Definition The fraudulent use of payment cards that have been reported as lost.

188 Macro Virus Definition Similar to a standard virus in all but its delivery. Rather than being code written in a programming language and attached to an executable, it is code written in a macro language and attached to a document.

189 Mail / telephone order fraud

Definition/Crime A criminal uses a genuine account number obtained fraudulently to obtain goods or services from mail order companies.

190 Mail Bomb Definition Mail bomb' is generally used as a verb rather than a noun. It is the act of, or even incitement to, send massive amounts of probably meaningless text to a particular e-mail address. The purpose is to annoy the recipient, or even crash his/her system - and it is usually done in retaliation for some real or perceived offense.

191 Mail Drop Definition Thieves use a mail drop address different than their own.

192 Mail re-direct Definition Post is fraudulently re-directed to another address without the intended recipient's knowledge. The fraudster then receives important documents, such as bank statements and bills, intended for the victim and uses them to facilitate identity fraud.

193 Mailing Lists Definition A mailing list is an automated e-mail distribution mechanism for a defined subject (the list topic) to a registered readership (a list of e-mail addresses). Often just called 'lists', there are innumerable

Page 27: C6 intelligence Fraud Glossary Whitepaper

mailing lists on the Internet catering for every subject under the sun. Lists are controlled by the list 'owner' - usually the person or organisation that set it up, and probably the owner of the server on which it is run. People registered on the list are known as list 'members'.

194 Malware (1) Definition An inclusive term for all bad software -- "malicious software"

195 Malware (2) Definition Software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.

196 Malware (3) Definition Malware is the generic term for software that is designed to do harm - a contraction of 'malicious software'. It is not yet in universal usage, but its popularity as a general term for viruses, Trojan Horses, worms, and malicious mobile code is growing. In general, an inclusive term for all bad software -- "malicious software"

197 Man in the Browser Attack (MitB)

Definition/Crime Internet threat related to Man-in-the-Middle (MitM), is a trojan that infects a web browser and has the ability to modify pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host application. In an example exchange between user and host, e.g. an Internet banking transaction such as a funds transfer, the customer will always be shown, via confirmation screens, the exact payment information as keyed into the browser. The bank, however, will receive a transaction with materially altered instructions, i.e. a different destination account number and possibly amount. The use of strong authentication tools simply creates an increased level of misplaced confidence on the part of both customer and bank that the transaction is secure. Authentication, by definition, is concerned with the validation of identity credentials. This should not be confused with transaction verification. Combating a MitB attack is through an out-of-band (OOB) Transaction verification process. This overcomes the MitB Trojan by verifying the transaction details, as received by the host (bank), to the user (customer) over a channel other than the browser. Combat by using transaction verification.

198 Man in the Middle Attack MITM)

Definition/Crime Man-in-the-middle attack (often abbreviated MITM), bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them,

Page 28: C6 intelligence Fraud Glossary Whitepaper

making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones.

199 Masquerade Definition/Crime A type of attack where the attacker pretends to be an authorized user of a system in order to gain access to it or to gain greater privileges than they are authorized for. A masquerade may be attempted through the use of stolen logon IDs and passwords, through finding security gaps in programs, or through bypassing the authentication mechanism. The attempt may come from within an organization, for example, from an employee; or from an outside user.

200 Mass Compromise Definition/Crime Situations where massive amounts of consumer data is stolen.

201 Merchants Risk Council

Organization A merchant-led trade association focused on electronic commerce risk and payments globally. US/UK/Australia.

202 Metamoric Virus Definition Virus that changes its own code but keeps the same functionality from one infection to another.

203 MOD-10 Rules (1) Definition Validation rule to determine if card number is legitimate.

204 MOD-10 Rules (2) Definition The rules for a Mod 10 check: The credit card number must be between 13 and 16 digits. The credit card number must start with: 4 for Visa Cards , 37 for American Express Cards , 5 for MasterCards , 6 for Discover Cards . If the credit card number is less than 16 digits add zeros to the beginning to make it 16 digits. Multiply each digit of the credit card number by the corresponding digit of the mask, and sum the results together. Once all the results are summed divide by 10, if there is no remainder then the credit card number is valid.

205 Money Laundering Definition/Crime Process where origin of funds generated by illegal means is concealed by making the funds appear as though they were derived from a legitimate source.

206 Money Laundering Stages

Definition Three stages of Money Laundering: 1) Placement- placing the criminal funds into the financial system directly or indirectly. 2) Layering- the process of separating criminal proceeds from their source using complex layers of financial transaction designed to hide the audit trail and provide anonymity. 3) Integration- if the layering process succeeds, then the integration places the laundered

Page 29: C6 intelligence Fraud Glossary Whitepaper

proceeds back into the legitimate economy so that it seems like normal business funds.

207 Money Service Businesses

Definition Money transmitters, retail currency exchangers, check cashiers, and issuers of stored value cards.

208 Money Mule Definition/Crime A person who transfers stolen money or merchandise from one country to another, either in person, through a courier service, or electronically. Online money mule scams typically exist as a result of other types of online fraud, such as phishing scams, malware scams or scams that operate around auction sites like eBay. Money mules are commonly recruited with job advertisements for "payment processing agents," "money transfer agents," "local processors," and other similar titles usually from home.

209 Mortgage Fraud Definition/Crime Fraud related to mortgages. This can include application fraud or collusion by parties involved in mortgage transactions such as appraisals.

210 Muffin/Cake Man Slang The crook is nice to people. He brings muffins and remembers details about each employee (good at banks).

211 Mule Definition A person who transfers stolen money or merchandise from one country to another, either in person, through a courier service, or electronically. Online money mule scams typically exist as a result of other types of online fraud, such as phishing scams, malware scams or scams that operate around auction sites like eBay. Money mules are commonly recruited with job advertisements for "payment processing agents," "money transfer agents," "local processors," and other similar titles usually from home.

212 Multi-Channel Fraud Definition When compromised bank accounts are often used to conduct basic reconnaissance, such as viewing old checks and signatures. Cyber-criminals then use that information to conduct a wire transfer or to withdraw money in person using forged signatures and blank checks. Often such online access is from a new location or a location not normally associated with the account owner.”

213 New Account Creation

Definition Involve the fraudulent creation of new accounts, for example, when a criminal uses stolen data to open a bank or credit card account in someone else’s name. Engage in this type of identity theft, the criminal must steal more personal information than merely credit and debit account information. Form of Identity Theft.

Page 30: C6 intelligence Fraud Glossary Whitepaper

214 Nigerian Advance Fee Fraud (419 Fraud)

Definition/Crime A type of advance-fee fraud in which individuals or companies receive unsolicited emails or letters, originating from West Africa, promising a percentage of a huge sum of money in return for allowing funds to pass through the victim’s bank account. There is an administration fee to pay as a pre-condition of releasing the funds. '419' is the Nigerian penal code under which this offence would be prosecuted.

215 Non-delivery of Goods/Services

Definition/Crime Merchandise or services that were purchased or contracted by individuals on-line are never delivered.

216 Off Line Crime Definition/Crime Any crime that is not committed on the internet. Counterfeit check crime used to be an off line crime but with certain VPN bots has become an on line crime.

217 Off Shore Banking Definition Money launderers often send money through various “offshore accounts” in countries that have bank secrecy laws, meaning that for all intents and purposes, these countries allow anonymous banking. A complex scheme can involve hundreds of bank transfers to and from offshore banks.

218 Online Auction / Retail

Crime The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.

219 Out of Band Definition Communications which occur outside of a previously established communication method or channel. Out-of-band data (called "urgent data" in TCP) looks - to the application - like a separate stream of data from the main data stream. This can be useful for separating two different kinds of data.

220 P2P Banking/Lending

Definition Either person to person or peer to peer. The transfer of money without going through a financial institution. Examples: Popmoney by Cashedge that use the Popmoney site or can go through a bank account. Not like Paypal which uses a bank account or credit card.

221 Paperhanging Definition Checks are written on closed accounts.

222 Partnerka Organization Hundreds of organized networks that send out spam, Scareware, ‘Canadian Pharmacy’ spam, adult sites, comment spam on forums and blogs etc.

223 Password Aging Definition Password aging is the process of forcing a user to change (or maintain) his or her password after, or for, a specified period of time. In Unix it is effected by the inclusion of password aging data after the

Page 31: C6 intelligence Fraud Glossary Whitepaper

user's password in the password field of the password file, separated from the password itself by a comma (,).

224 Password Attack Definition A password attack is an attempt to obtain or decrypt the legitimate user's password key into the system. Readily available password dictionaries, cracking programs, and password sniffers combine to make passwords very vulnerable.

225 Password Sniffing Definition The use of a sniffer to capture passwords as they pass across a network. The network could be a local area network, or the Internet itself. And the sniffer could be hardware (if the attacker has physical access to the network) or software (in which case all that is required is the ability to compromise a server). A favourite method for 'installing' a password sniffer onto a local area network would be through the use of a Trojan Horse.

226 Patch Definition A patch is a band-aid produced by a software vendor to heal a wound or vulnerability in its software.

227 Pay per Click (PPC) Definition An advertiser agrees to pay whenever someone clicks on one of their ads. PPC ads are placed both on things like search engine results, and on relevant syndicated web pages authored by 3rd parties. To compensate 3rd parties for inserting ads on their web pages, the advertising company shares part of what they've been paid with the 3rd parties.

228 Payment Card Industry Data Security Standard (PCI DSS)

Definition Formally called the Cardholder Information Security Program (CISP), is a comprehensive set of international security requirements for protecting cardholder data. Developed by VISA to help facilitate the broad adoption of consistent data security measures on a global basis. See PCI DSS Twelve Requirements.

229 Payment Card Industry Data Security Standard (PCI DSS)

Organization Twelve Requirements: 1. Install and maintain a firewall configuration to protect cardholder data, 2. Do not use vendor-supplied defaults for system passwords and other security parameters, 3. Protect stored cardholder data, 4. Encrypt transmission of cardholder data across open, public networks, 5. Use and regularly update anti-virus software on all systems commonly affected by malware, 6. Develop and maintain secure systems and applications, 7. Restrict access to cardholder data by business need-to-know, 8. Assign a unique ID to each person with computer access, 9. Restrict physical access to cardholder data, 10. Track and

Page 32: C6 intelligence Fraud Glossary Whitepaper

monitor all access to network resources and cardholder data, 11. Regularly test security systems and processes, 12. Maintain a policy that addresses information security.

230 Payment Fraud Definition/Crime When a single transaction made on a payment card is fraudulent. May be the result of account takeover or use of a counterfeit card with the consumer's account number.

231 Payment Services Regulations 2009

Law Shifted the onus onto the banks to prove negligence by the holder of debit and credit cards in cases of disputed payments.[8]. The FSA said "It is for the bank, building society or credit card company to show that the transaction was made by you, and there was no breakdown in procedures or technical difficulty" before refusing liability.

232 PayPal Definition An e-commerce business allowing payments and money transfers to be made through the Internet. PayPal serves as an electronic alternative to traditional paper methods. Such as checks and money orders. A PayPal account can be funded with an electronic debit from a bank account or by a credit card. The recipient of a PayPal transfer can request a check from PayPal, establish their own PayPal deposit account or request a transfer to their bank account. PayPal is an example of a payment intermediary service that facilitates worldwide e-commerce.

233 Peer to Peer (P2P) Definition Protocol which allows sharing of files over internet by direct contact between two or more computers (a server is not required).

234 Perimeter network / DMZ

Definition Sometimes called a DMZ (de-militarized zone), a perimeter network is an additional network between the protected network and the unprotected network, providing an additional layer of security. Servers that are necessarily exposed to the Internet (such as web servers, mail servers) are best placed in the DMZ and protected by a firewall or firewalls. Further firewalls separate the DMZ from the trusted network, or corporate LAN.

235 Personal Information / Data Theft

Definition Incidents seem to fall into three main categories: theft (usually of laptops), hacking, and what is often somewhat kindly referred to as “inadvertent disclosure.” Ironically, it is quite easy to draw a parallel between these categories and the three most commonly cited safeguards of security in the legislative specifications found in the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley Act (GLBA) regulations.

Page 33: C6 intelligence Fraud Glossary Whitepaper

Laptop theft is a physical security issue; hacking prevention falls under technical safeguards; and various breakdowns in process can be prevented with administrative security controls.

236 Pharming (1) Definition In computer security, this is an attack where an attacker compromises domain name values and redirects many people to the wrong IP for a given domain. Often this is accomplished with DNS poisoning or by modifying the hosts files on peoples' computers. This is a special case of DNS poisoning, and is often the result of malware infections.

237 Pharming (2) Definition The hijacking of an official website's address, usually by hacking a Domain Name System server and altering the legitimate website's IP address so that users who enter the correct Web address (for example, www.bankersonline.com) are directed instead to a 'knock of' of the correct page, where user names, passwords and perhaps additional personal information is collected for later illegal use.

238 Pharming / Phishing Definition These are scams in which criminals send bogus emails to thousands of people. The emails look like they have come from trusted organisations, such as banks, credit card companies and online stores. They usually contain compelling messages, urging the recipient to click on a link to visit a supposedly trusted website. If the victim clicks on the link they are taken to a website that looks like the real thing, where they are prompted to enter their personal details. The criminals can then use this information to impersonate the victim and commit identity fraud. Fraudsters may also call you on the phone, pretending to be from your bank or credit card company, asking you for personal details.

239 Phishing (1) Definition Social engineering where crooks use "spoofed" emails and phony websites to fool users into divulging personal financial information that is then used to commit identity theft.

240 Phishing (2) Definition The practice of trying to trick someone into giving their secret bank information by sending them an email that looks as if it comes from their bank and that asks them to give their account number or password

Page 34: C6 intelligence Fraud Glossary Whitepaper

241 Phishing (3) Definition In computing, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from PayPal, eBay, YouTube or online banks are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a website. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

242 Phishing (4) Definition Involve the use of spoofed emails to lead consumers to counterfeit websites designed to trick them into divulging personal data.

243 Phishing / Pharming Crime These are scams in which criminals send bogus emails to thousands of people. The emails look like they have come from trusted organisations, such as banks, credit card companies and online stores. They usually contain compelling messages, urging the recipient to click on a link to visit a supposedly trusted website. If the victim clicks on the link they are taken to a website that looks like the real thing, where they are prompted to enter their personal details. The criminals can then use this information to impersonate the victim and commit identity fraud. Fraudsters may also call you on the phone, pretending to be from your bank or credit card company, asking you for personal details. Pharming isthe hijacking of an official website's address, usually by hacking a Domain Name System server and altering the legitimate website's IP address so that users who enter the correct Web address (for example, www.bankersonline.com) are directed instead to a 'knock of' of the correct page, where user names, passwords and perhaps additional personal information is collected for later illegal use.

244 Phishing/Spoofing Crime A technique whereby a fraudster pretends to be someone else's email or web site. This is typically done by copying the web content of a legitimate web site to the fraudster's newly created fraudulent web site. Phishing refers to the scheme whereby the perpetrators use the spoofed web sites in an attempt to dupe the victim into divulging sensitive information, such as passwords, credit card and bank account numbers. The victim, usually via email

Page 35: C6 intelligence Fraud Glossary Whitepaper

is provided with a hyperlink that directs him/her to a fraudster's web site. This fraudulent web site’s name (Uniform Resource Locator) closely resembles the true name of the legitimate business. The victim arrives at the fraudulent web site and is convinced by the sites content that they are in fact at the company’s legitimate web site and are tricked into divulging sensitive personal information. Spoofing and phishing are done to further perpetrate other schemes, including identity theft and auction fraud.

245 Phony Escrow Services

Crime In an effort to persuade a wary Internet auction participant, the fraudster will propose the use of a third-party escrow service to facilitate the exchange of nothing in return. Merchandise. The victim is unaware the fraudster has spoofed a legitimate escrow service. The victim sends payment or merchandise to the phony escrow and receives nothing in return.

246 Phreak Definition A phreak is a 'phone freak' - a hacker who concentrates his or her knowledge on telephone systems. The origins of phreaking possibly comes from university campuses from the '50s onwards, where the cost of using the telephone system was a major burden. A phreak was a person who found weaknesses in the telephone system in order to gain cheap or free telephone usage.

247 Ping of Death Definition Ping of Death' is the name given to a Denial of Service exploit that was widely used in conjunction with the Ping utility. The exploit required the transmission of an illegal packet size; that is, a packet greater than 65536 bytes. This often led to a buffer overflow on the receiving system - with sometimes disastrous and often unpredictable results: system crashes, reboots, kernel dumps and so on. Most platforms now have effective patches and fixes, and the exploit is no longer as dangerous as it was.

248 Placement Definition One of three money laundering stages. Placing the criminal funds into the financial system directly or indirectly. The launderer inserts the dirty money into a legitimate financial institution. This is often in the form of cash deposits. The deposits must be kept relatively small, no more than $10,000 otherwise they will almost certainly be reported. See Money Laundering Stages.

249 Plunder Definition The act of taking valuable things from a place using force.

Page 36: C6 intelligence Fraud Glossary Whitepaper

250 Point of Compromise (POC)

Definition Linking back to where multiple users’ personal information was obtained. (eg. Skimming device at a restaurant).

251 Point of Compromise Reports (POC)

Definition A variation of CPP with confirmation of a breach.

252 Point of Fraud (POF) Definition Beginning where fraud occurs generally using stolen of counterfeit cards.

253 Ponzi/Pyramid Schemes

Crime Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits. However, no investments are actually made by the so called “investment firm.” Early investors are paid returns with the investment capital received from subsequent investors. The system eventually collapses and investors do not receive their promised dividends and lose their initial investment.

254 Port Scanning Definition The act of sending queries to Internet servers (hosts) in order to obtain information about their services and their level of security (see port scanner). On Internet hosts, there are standard port numbers for each type of service. Port scanning is sometimes performed by hackers and crackers to find out if a network can be compromised.

255 Pretexting Definition The practice of getting your personal information under false pretences. Pretexters sell your information to people who may use it to get credit in your name, to steal your assets, or to investigate or sue you. Pretexting is against the law.

256 Profiles Definition Cardholder or merchant information the represents behaviour patterns. These patterns compare historical behaviour with recent patterns that correspond to legitimate and illegitimate behaviour which is then used by a neutral network model to improve the detection and accuracy of scoring.

257 Proxy Server Definition Computer that allows other computers to make indirect network connections through it to other networked computers. Disguises IP addresses.

258 Pulsing Zombie Definition See Zombie. A 'pulsing zombie' is one that sends its bogus messages in periodic bursts rather than continuously.

259 Pump and Dump Fraud (Hype and Dump Manipulation)

Definition Involve the touting of a company's stock (typically microcap companies) through false and misleading statements to the marketplace. After pumping the stock, fraudsters make huge profits by selling their cheap stock into the market. Pump and dump

Page 37: C6 intelligence Fraud Glossary Whitepaper

schemes often occur on the Internet where it is common to see messages posted that urge readers to buy a stock quickly or to sell before the price goes down.

260 Ransomware (1) Definition Malware used to extort money from victim. The SMS Blocker (cell phone extortion) is a type of ransomware.

261 Ransomware (2) Definition Also known as cryptovirus or cryptotrojan or cryptoworm, is a coined term which defines a type of e-threat that encrypts the data stored within a system and demands on behalf of its author a ransom/payment from the victim user in order to decrypt it back.

262 Reshipping Fraud Definition The receiving and subsequent reshipping of on-line ordered merchandise to locations usually abroad. Individuals are often solicited to participate in this activity in chat rooms, or through Internet job postings.

263 Retail based Kiting Definition Involves the use of a party other than a bank to unknowingly provide temporary funds to an account holder lacking funds needed for cheque to clear. In these cases, the kiter writes cheque(s) to one or more places of retail (usually supermarket(s)) that offer cash back in addition to the amount of a purchase as a courtesy to their patrons. Following the transaction, the kiter deposits the cash received back into his/her bank on the same day in order to provide sufficient funds for other cheque to clear, while the cheque written that day will clear one or more business days later. This action is repeated as necessary until legitimate funds can be deposited into the account.

264 Root Definition Root is the name given to the 'superuser' account on a Unix system. The account ignores permission bits, so anybody using this account has complete freedom within the system. Gaining root is thus the primary aim for anybody attacking a Unix system.

265 Rootkit Definition A set of programs designed to allow an adversary to surreptitiously gain full control of a targeted system while avoiding detection and resisting removal, with the emphasis being on evading detection and removal.

266 Runners Definition Those who do the actual stealing (ex. Snatching from mailboxes).

Page 38: C6 intelligence Fraud Glossary Whitepaper

267 Sand Boxing / Behaviour Blocking

Definition Software monitors the executable actions of potentially malicious software and stops dangerous operations from taking place (such as deleting files, modifying system. settings and so on). Often considered to be more effective than virus scanners in blocking malicious code because they monitor actual functions rather than look for a known signature. In order for a traditional virus scanner to detect a virus, it has to have the actual signature, or fingerprint, of the virus within its database. New viruses often succeed because they are not immediately recognised simply because their signatures are not yet held in the database. Behaviour blocking doesn't care whether it's a new virus, an old virus or something completely different - it simply stops it harming the system.

268 Screen Scraping Crime Bot data mines all possible information from web pages.

269 Scriptkiddies Definition Derogative term used to describe 'wannabe hackers'. Given that the original meaning of 'hacker' was not pejorative, but described a person with great systems knowledge and ingenuity, a script kiddie is someone who likes to break into other peoples computers, but does not have the personal expertise of the genuine hacker.

270 Second party fraud Definition Fraud committed by someone close to or known by the victim, usually a relative or employee.

271 Seeds Slang Seeds are people who have downloaded the entire file and are uploading to others via torrent file. See Leeches.

272 Sensitive Compartmented Information Facility (SCIF)

Definition Pronounced "Skiff". An enclosed area within a building that is used to process Sensitive Compartmented Information (SCI) level classified information.

273 Serious Fraud Office (SFO)

Organization Responsible for the investigation and prosecution of suspected cases of serious or complex fraud where £1 million or more are involved or covers more than one national jurisdiction, an arm of the Government of the United Kingdom, accountable to the Attorney-General.

274 Shadowcrew Organization A global organization of thousands of carders. Operated from 2002 until October 2004, when it was taken down by US Secret Service in Operation Firewall. Used a hierarchal framework of operations. Administrators governed organization. Moderators oversaw different forums based on expertise. Reviewers examined and/or tested

Page 39: C6 intelligence Fraud Glossary Whitepaper

products or services members wanted to sell. Vendors advertised and sold products. General members are carding forum users. Established standard for carding forums.

275 Shakedown Definition/Crime A situation in which someone uses threats to force someone else to give them money.

276 Shareware Definition Software distributed by the shareware method. To obtain the software you simply copy it from a friend or colleague, or download it from an online service. You then evaluate it (normally for a period of 30 days). If you then decide that you wish to use the software, you send a payment direct to the author. If you do not intend to use the program you simply delete it. Software is either shareware or commercial.

277 Shell Companies Definition Fake companies that exist for no other reason than to launder money. They take in dirty money as “payment” for supposed goods or services but actually provide no goods or services; they simply create the appearance of legitimate transactions through fake invoices and balance sheets.

278 Shoulder surfing Definition The act of looking over the shoulder of an individual using a cash machine, making payments or filling out an application form in order to capture personal details and PIN numbers to facilitate identity fraud.

279 Skimmer Definition A device that reads and records details held on the magnetic stripe of payment cards.

280 Skimming Definition/Crime The crime of using electronic information from someone’s credit card or payment card after they have used it to pay for something

Use of an electronic storage device by criminals to read and record the encoded data on the magnetic stripe on the back of a card.

281 Skimming/ Card Cloning

Definition/Crime Cloning involves creating a duplicate of your payment card. The data on a card's magnetic stripe is read electronically by a 'skimming' device and downloaded onto a computer or copied onto a duplicate card.

282 Skipping Crime Known as dumpster diving in the US is the practice of sifting through commercial or residential trash to find items that have been discarded by their owners, but which may be useful to the dumpster diver.

283 Smurfing/ Structuring Accounts

Definition The simplest way to launder money it entails breaking up large amounts of money into smaller, less-suspicious amounts. Generally these amounts

Page 40: C6 intelligence Fraud Glossary Whitepaper

must be smaller than $10,000 otherwise they are reported. The money is then deposited into one or more bank accounts either by multiple people (smurfs) or by a single person over an extended period of time.

284 Snooping Definition Unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail that appears on another's computer screen or watching what someone else is typing.

285 Soft Fraud Definition A true individual who is credit hungry manipulates or alters information on credit applications in order to be approved.

286 Software as a Service (SaaS)

Definition Software that is used over the internet and/or is deployed to run behind a firewall in your local area network or personal computer. With SaaS, a provider licenses an application to customers as a service on demand, through a subscription or a “pay-as-you-go” model. Saas is also called “software on demand. Software is either hosted or SaaS.

287 Spam Definition Unsolicited commercial email. In the US, spam is regulated by the CAN-SPAM Act (15 USC 7701) and 18 USC 1037, "Fraud and related activity in connection with electronic mail"

288 Spoofing/Phishing Crime A technique whereby a fraudster pretends to be someone else's email or web site. This is typically done by copying the web content of a legitimate web site to the fraudster's newly created fraudulent web site. Phishing refers to the scheme whereby the perpetrators use the spoofed web sites in an attempt to dupe the victim into divulging sensitive information, such as passwords, credit card and bank account numbers. The victim, usually via email is provided with a hyperlink that directs him/her to a fraudster's web site. This fraudulent web site’s name (Uniform Resource Locator) closely resembles the true name of the legitimate business. The victim arrives at the fraudulent web site and is convinced by the sites content that they are in fact at the company’s legitimate web site and are tricked into divulging sensitive personal information. Spoofing and phishing are done to further perpetrate other schemes, including identity theft and auction fraud.

Page 41: C6 intelligence Fraud Glossary Whitepaper

289 Spoofs Definition Various scams in which fraudsters attempt to gather personal information directly from unwitting individuals. The methods could include letters, telephone calls, canvassing, websites, emails, street surveys, etc.

290 Spyware Definition Computer software that steals information from a user's computer without the user's knowledge or consent.

Assorted privacy-invading/browser-perverting programs.

291 Structuring Accounts/ Smurfing

Definition "Plant crimeware onto PCs to steal credentials directly, often using key logging systems to intercept consumers online account user names and passwords, and to corrupt local and remote navigational infrastructures to misdirect consumers to counterfeit websites and to authentic websites through phisher-controlled proxies that can be used to monitor and intercept consumers’ keystrokes."" Phishing uses both social engineering and technical subterfuge to plant Trojans."

292 Technical Subterfuge Schemes

Definition Plant crimeware onto PCs to steal credentials directly, often using key logging systems to intercept consumers online account user names and passwords, and to corrupt local and remote navigational infrastructures to misdirect consumers to counterfeit websites and to authentic websites through phisher-controlled proxies that can be used to monitor and intercept consumers’ keystrokes." Phishing uses both social engineering and technical subterfuge to plant trojans.

293 Telephone/Mail Order Fraud

Definition/Crime A criminal uses a genuine account number obtained fraudulently to obtain goods or services from mail order companies.

294 The International Association for the Advancement of Criminal Activity (IAACA)

Organization Founded after the takedown of Shadowcrew, In 2005 site reorganized and operated under name The Theft Services. One of the forum's admins is former Russian tech student "Zo0mer".

295 The National White Collar Crime Centre (NWC3)

Organization A congressionally funded non-profit corporation that trains state and local law enforcement agencies in how to combat emerging economic and cyber crime problems. Partnered with IC3.

296 Third party fraud Definition/Crime Fraud committed against an individual by an unrelated or unknown third party. Most cases of identity fraud are committed by individuals unknown to the victim.

Page 42: C6 intelligence Fraud Glossary Whitepaper

297 Transaction Detection Rate

Definition The percentage of fraudulent transactions detected by a fraud detection system.

298 Transaction Verifications

Definition Generic term to describe the Internet-based security method of verifying that the actual content of a transaction has not been altered by the fraudulent techniques known as Man-in-the-Middle (MitM) and Man-in-the-Browser (MitB). This form of transaction protection is alternatively known as Transaction Integrity Verification (TIV).

299 Trap Door/ Back Door

Definition A way into a software system that the programmer or administrator of that system (or a cracker who has gained access) has deliberately left for himself. A typical back door will allow its designer access to the system without checking the file of authorized users.

300 Triangle Scheme Definition Auction fraud where the seller uses a buyer's credit card information to purchase the good that is being auctioned and retaining the proceeds of the auction sale.

301 Trojan Horse Definition A program which purports to do one thing, but secretly does something else; example: free screen saver which installs a backdoor.

302 True Name Identity Theft

Definition When someone steals personal information that is then used to either obtain credit in the victim's name, employment, health care, or housing. Also known as Identity Theft.

303 UI Redressing/ Click Jacking

Definition An attack that takes advantage of vulnerability found in various Web platforms from major browsers, which allows attackers to alter a Web site’s visual display to the user from the browser while preserving its functionality. Specifically, clickjacking involves generating a fake graphical overlay on top of an existing Web page in order to visually change the Web page while preserving its functionality (buttons, forms, etc.). This is done with the intension of misleading users to interact with the hidden Web page while they believe they are interacting with a completely different Web site.

304 Virus Definition A program which can copy itself and surreptitiously infect another computer, often via shared media such as a floppy disk, CD, thumb drive, shared directory, etc. Viruses are always embedded within another file or program.

305 VISA Address Verification Code (AVS)

Definition Enables a merchant to check the billing address (street number and zip code) against card issuer's mailing address for the account.

Page 43: C6 intelligence Fraud Glossary Whitepaper

306 Walkers Slang Those who deposit the stolen or forged checks.

307 War Dialling / Google Hacking

Definition The use of a search engine, such as Google, to locate security vulnerability on the Internet. There are generally two types of vulnerabilities to be found on the Web: software vulnerabilities and misconfigurations.

308 Warez Definition (Pronounced "wearzz," NOT "wahr-ez") are pirated copies of proprietary commercial software, typically distributed over the Internet after the program's copyright protection mechanisms (if any) have been disabled.

309 West African 419 fraud

Crime A type of advance-fee fraud in which individuals or companies receive unsolicited emails or letters, originating from West Africa, promising a percentage of a huge sum of money in return for allowing funds to pass through the victim’s bank account. There is an administration fee to pay as a pre-condition of releasing the funds. '419' is the Nigerian penal code under which this offence would be prosecuted.

310 Whois Definition A TCP/IP utility that lets you query compatible servers for detailed information about other Internet users.

311 Wild List Definition Over the years, antivirus expert Joe Wells has collected reports of which viruses have been found spreading in the real world. He decided to create a list of these viruses and make that list available to the public, free of charge, to offset some of the 'numbers games' played by some antivirus product developers. Used as a basis for testing antivirus software by proficient and competent testing authorities, The Wild list remains available free to computer users worldwide. The list is created each month by a team of volunteers, using reports from over 55 antivirus researchers and corporations world-wide.

312 Worm Definition A self-reproducing program which propagates via the network.

313 Zo0mer Organization A well-known administrator on IAACA and Theft Services.

314 Zombies Definition Also known as Bots or IRC Bots, these programs are used by hackers to deploy Distributed Denial of Service (DDoS) agents to various victim machines. For example, when an IRC Bot infected Windows PC is started, the Bot waits for the system to finish booting, and then connects to a previously

Page 44: C6 intelligence Fraud Glossary Whitepaper

designated IRC server. It then joins a secret IRC channel that is not visible to other users of the IRC server, and waits for a command from its 'owner'. Hackers create Bot-carrying email viruses and Trojan-infected Internet downloads and do anything they can to get their Bots into other peoples' computers. Machines that receive a Zombie will most likely also receive a complimentary copy of the latest version of the incredibly invasive Sub7Server Trojan. This grants the hacker who is controlling the Zombie absolute control over the victim's machine.

315 Zoo Definition A zoo virus is one that exists only within a research establishment (such as an anti-virus company's research laboratories).

Page 45: C6 intelligence Fraud Glossary Whitepaper

Visit us at:

www.c6-intelligence.com

© C6 Intelligence Information Systems Limited