Hacking Without Exploits

Black Hat researchers will demonstrate how the bad guys are quietly raking in big bucks without ninja hacking skills, tools, or exploit code

Dark Reading logo in a gray background | Dark Reading

Cybercriminals increasingly are employing no-tech or low-tech techniques for making big money online -- no exploits or sophisticated hacker tools required.

The techniques themselves aren’t new -- some have been around for nearly a decade. But the Web model has made these schemes that capitalize on so-called business logic flaws more lucrative than ever, according to Jeremiah Grossman, one of the researchers who will pull back the covers on these insidious and often transparent methods of attack at Black Hat USA next week in Las Vegas. Grossman, CTO and founder of WhiteHat Security, says these increasingly popular methods take advantage of weaknesses in online applications or business processes, and could eventually usurp the ubiquitous SQL injection and cross-site scripting (XSS) vulnerabilities as the biggest threats to the Web. “We find these in Websites all the time,” he says. And all it takes to exploit them is a browser, he says. “In the last five years, cross-site scripting and SQL injection have been the imminent threat,” he says. “But the bad guys are increasingly looking to monetize [the Web], so we’ll see more of these business logic flaws [being exploited] in the next two years. They are way more difficult to detect.” Intrusion detection systems (IDS) can’t detect them, nor can Web application firewalls block them, he says, so there’s really no way to know for sure just how prevalent these attacks are today. But Grossman and fellow presenter Trey Ford, director of solutions architecture for WhiteHat, will show some real-world attacks, including some data from WhiteHat’s own clients. “What we do know is that large dollar sums are being lost already,” Grossman says. Some bad guys are making up to seven figures a month using these methods of attack, he says. Among the more popular venues for these attacks are online auctions and affiliate marketing networks, which help sites attract more traffic by sharing a percentage of the sales they drive to one another. These affiliate models can be easily abused to help pad hit numbers as well as to generate commissions, sometimes without even making a sale, according to Grossman. One hack that Grossman and Ford will show at Black Hat involved a bank customer of WhiteHat’s, which was among 600 small- to medium-sized financial institutions that were vulnerable to a logic flaw in their application-hosting provider’s system. The flaw allowed attackers to steal money from the bank. “The attackers didn’t build [or] host their own Website,” Grossman says. “One particular flaw in the ASP’s [application service provider] system allowed [them] to see and transfer money on any account on the entire system.” The ASP wasn’t willing to do the complete system redesign it would have taken to shore up the problem once WhiteHat pointed it out. “During one of our tests, we got the [system] to send us a check in the mail for $2, made out to ‘WH Test,’ and we emailed a photo of it to our customer.” It was discovered that the cybercriminals had stolen money from the bank using the flaw in the ASP’s system and wired over $70,000 to Eastern Europe, Grossman says. He plans to provide details of the ASP’s flaw in his presentation next week. The researchers also will detail a commonly exploited affiliate marketing arrangement wherein the bad guys rack up big commissions and bonuses each time they get a new customer to just sign up for a Website. Each time an affiliate scores a new customer for an online merchant in this arrangement, they get a $10 acquisition fee, for instance, as long as the customer also provides his or her credit card number. “I made $10 even if you didn’t spend a dime,” explains Grossman. So how do these scams succeed? “The marketing departments running these programs [that get exploited] see tons of new user registrations; all they are going to see is massive success,” he says. In some cases, it doesn’t behoove them to match the registrations with actual sales, he says. “The marketing teams needs to have better fraud-monitoring technology and/or work closely with security to limit security design flaws,” he says. "Money is being siphoned out and the security guys are the last to know."

Grossman and Ford will present their research on the silent rise in logic flaw attacks on August 7 at Black Hat. “I was shocked that some of this stuff was still around,” Grossman says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights