Keep Calm & Verify: How To Spot A Fake Online Data Dump
Determining whether a data dump on Pastebin or elsewhere online is legit can be time-consuming and resource-intensive. Deloitte & Touche offers tips for how to weed out the fake hacks.
October 29, 2014
You've seen the online claims and headlines: hackers boasting on Twitter or another online forum that they've hacked a major company's database or website and have leaked the stolen user credentials or credit-card numbers for all to see on Pastebin or another site.
But just because a data dump is posted online doesn't mean it's legitimate. The victimized organization and threat intelligence experts have to investigate the leaks, a process that can be time-consuming, resource-intensive, and even hurt other security projects or monitoring. Worst-case, investigating a phony data dump could detract from an enterprise's efforts to detect or mitigate a real data breach.
Allison Nixon, a threat researcher with Deloitte & Touche LLP, has seen the phony data breach dump scenario many times as a researcher with experience investigating them. "It's pretty common that data dumps that come to me were actually fake," says Nixon, who has authored a new report with recommended techniques for vetting the authenticity of a data dump. "I would say it's a waste of everyone's time" to have to investigate phony ones, which can take days to verify. Not only that, but a company's reputation can easily be damaged by a phony data dump that wasn't tied to a real breach, she says.
Online data dumps traditionally are the handiwork of hacktivists or others looking for notoriety, but they also can be a tool for duping other bad guys or even just to taint the purported victim organization's reputation. So who's behind the fake data dumps? "I wouldn't consider these really dangerous people," Nixon says, because if they had the skills to perpetrate a real breach, they'd have done so instead.
There are several possible motivations for posting phony stolen data such as fake usernames, passwords, or credit-card numbers. One MO is using phony data as a marketing tool for the cyber underground. "The notion of dumping fake data is nothing new. Those kind of dumps are usually used as a 'proof' to sell a bigger dump in underground forums," so they defraud fellow bad guys, says Aviv Raff, CTO at Seculert.
"There is no honor amongst criminals," Raff notes. "So, the same way they cheat the good guys, they also try to cheat the other bad guys. Needless to say, most of the criminals are not that stupid, and this is why we don't see those fake dumps so often."
While the notion of fake data being posted online may seem benign to the purported victim, even these made-up data dumps can be dangerous to a company's reputation. And in today's lucrative cybercrime world, the most worrisome scenario would be a phony data dump used as a distraction or smokescreen for waging a real attack on the victim, akin to how some distributed denial-of-service (DDoS) attacks are used to detract from an actual attack on the victim's internal network.
"It actually goes deeper" in some situations, as state actors or competitors can use bad news or rumors to influence capital markets, says Robert Capps, senior director of customer success at RedSeal Networks and the former head of security and anti-fraud at StubHub.
"What if it's a cover? What if it's an attempt to draw attention to a fake breach and then someone is actually breaching" the victim in the background, he says. "You may miss some sort of hit on a workstation that suddenly has malware on it. A lot of these teams are massively understaffed, so they are not in a position to even respond" without some outside help, he says.
Even the insinuation that a firm was hacked, as in the recent case of StubHub users whose stolen credentials were used for ticket fraud, can stick. "Some called it a breach at StubHub even though it wasn't," Capps says.
Deloitte's Nixon has come up with a streamlined way to vet data dumps to save time and resources. Among her suggestions:
Check for recycled booty: This is a way to determine if the data is just older stolen information being presented as new booty. "Seek out unique-looking artifacts such as passwords, different names, text snippets from the rant in the preamble, etc., and simply perform a search for them," Nixon writes.
Check email redundancy: Two user accounts can't typically use the same email address, so check for what Nixon calls "email uniqueness." That entails checking to see if an email exists on the "victim" website's database. "If the company does enforce email uniqueness, the veracity of the leak can be tested by changing an account’s email to randomly selected emails in the leak. Almost all emails should be traceable to the company’s site; untraceable emails indicate that the leak is very likely fake."
Confirm that the username exists: "If account creation is allowed on the site, attempting to create accounts with usernames from the dump should result in error messages if duplicates are not allowed. This technique works using the same fundamental concept as the 'email uniqueness' section above: If unique identifiers are shown in the leaked dump, attempt to duplicate them on the live site." If the website allows you to view another user's profile, you can verify its validity as well, she says.
Check for adherence to password policy: Match the quality of the passwords by the site's password policy. "It would be suspicious if the policy is generally enforced but a large number of leaked credentials are not in adherence to the site’s password policy. Conversely, if no password policy exists, and no users have absurdly simple passwords like '123456,' the leak should be treated with suspicion."
Analyze the password origin: Stolen, complex passwords that the attacker says came out of a cracked hash list "are suspect," the report says.
Check credit card formats: Check the format of the credit card accounts that were dumped, the report says. You can also spot phony accounts by checking the issuing banks: "For example, a breach in America yielding credit cards mostly issued by banks in the Netherlands would raise some questions."
Contact the victim: You can also try to track down the people listed in the dump to determine whether they exist and their information is compromised, according to the report.
Take the "smell test": Then there's the smell test. "For example, a claim by a hacking group that it plans to release a vast credit card dump should be met with suspicion. Credit card dumps retain high dollar values on fraud markets and releasing a list for free would not be rational."
An "FBI breach" dump on Pastebin, for example, that includes "passwords123" as an FBI user password would obviously raise suspicion, according to the report.
About the Author
You May Also Like
Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024The Unreasonable Effectiveness of Inside Out Attack Surface Management
Dec 4, 2024