Cover credit: Laura Drew |
Hi
– I’m Greg Scott and Larissa graciously offered me a chance to write a
guest blog post here. I’m a crusty, grizzled, veteran IT guy and a
grandpa, and I’ve
been doing IT work since I had a full head of hair a long time ago.
So why is a grizzled IT pro doing a guest blog post here? Because I
also wrote a cool fiction book named “Bullseye Breach” that will be
available this April, 2015. It’s a story ripped
from recent headlines about a large retailer that loses 40 million card
numbers to an international cast of criminals. The main characters are
a young, enthusiastic fraud analyst and, of course, a grizzled IT pro
who work together to figure out a way to fight
back. It’s a great story with all the thriller elements, including a
floating dead body in the Gulf of Finland. It also has some emotional
scenes that still make me tear up, especially when I’m sleep deprived. I
hope readers love it. The idea is to present
an interesting story to educate readers that IT security is important
to everyone in today’s interconnected world, and the repercussions from
these security incidents are felt far and wide.
I also have my own blog on my website at
http://www.infrasupport.com and some teasers for “Bullseye Breach” at
http://www.infrasupport.com/ security/bullseye-breach-book- greg-scott/. Check it out.
Here’s
a short fiction story I first published on my blog that I hope
Larissa’s readers enjoy. It may resonate with some readers.
Abby
Kramer was a third year student at a Bible college in Colorado. A
pastor’s daughter, she liked to socialize online with friends from all
over the world and kept a large library of
pictures and videos from friends in her Facebook account. After a hard
day of classes and studying, she allowed herself a few minutes each
evening before bed to watch a new video or laugh at a few pictures and
comment on posts from her online friends. The
dialog with friends was always refreshing and no matter what
frustrations the day brought, these few minutes always brightened her
mood before bed.
She
was shocked when she woke up one Saturday morning after a difficult mid
semester week filled with tests to find this email waiting in her
inbox:
From: Facebook [mailto:update+hiehdzge@ facebookmail.com]
Sent: Saturday, March 16, 2013 4:16 AM
To: akramer@cobible.org
Subject: You requested a new Facebook password
Sent: Saturday, March 16, 2013 4:16 AM
To: akramer@cobible.org
Subject: You requested a new Facebook password
Hello,
You recently asked to reset your Facebook password.
Click here to change your password.
Didn’t request this change?
If you didn’t request a new password, let us know immediately.
Click here to change your password.
Didn’t request this change?
If you didn’t request a new password, let us know immediately.
Change Password
This message was sent to akramer@cobible.org at your request.
Facebook, Inc., Attention: Department 415, PO Box 10005, Palo Alto, CA 94303
Facebook, Inc., Attention: Department 415, PO Box 10005, Palo Alto, CA 94303
It
was a shame Abby never looked at the email header. If she had, she
would have noticed it originated in Florida and routed through a relay
server in China. It came from a character
who called himself “Duceml.” It didn’t come from Facebook.
But Abby didn’t know or care about how to look up any of that.
First
alarmed that somebody tried to change her password, then relieved that
Facebook had the wisdom to put in this email safety mechanism, Abby
quickly clicked the “Change Password”
link, which took her to what looked like a Facebook password change
screen. Obviously, somebody had her password. She would change it and
make sure nobody ever knew it this time. If Angie Gilroy ever saw what
she said about Angie’s brother to Donna Gustafson,
it would be awful.
A
few seconds after filling in the old password and new password boxes,
she found herself looking at the Facebook login screen. She was dying to
know if Angie Gilroy found out what Abby
said about Angie’s brother and what she had to say about it, so she
decided to log in and check. When she saw a popup box with “Invalid
username and/or password,” she tried again with her old password.
Curious – her old password still worked. Didn’t she just
change it? Annoyed, she went through the password change process again.
This time it worked.
It
was time for breakfast in Abby’s dormitory, and a school dance was
coming up that night and Abby quickly forgot about her Facebook scare.
But
a Russian FTP server did not forget. FTP – file transfer protocol (or
program) – is one of the oldest programs on the Internet. Millions of
people use FTP every day to upload and
download files to and from websites. And criminals use FTP to
surreptitiously upload and download information to and from computers
owned by naive users.
Had Abby looked more closely at that first Change Password screen, she would have noticed it said, www.facebrook.com.ru.
It was a website in Russia designed to look like Facebook. But
Abby didn’t look closely. Instead, she entered her old and new password
and waited several seconds as that fake website scooped it all up and
redirected her computer to the real Facebook website. And even though
she changed her Facebook password, she used
the same email address and password for the bank account she shared
with her parents to cover college expenses.
An
anonymous criminal somewhere in Russia eagerly monitored the growing
list of Facebook usernames and passwords accumulating in his FTP server.
He would try these credentials against
a list of retailers and banks and no doubt find a few matches. It would
be tedious trying variations of user akramer@cobible.org with password either, “IheartJ3sus” or “i@msav3d” against thousands of banking websites, but that’s why people write software –
to handle tedious tasks. And a program could do the job in a few minutes.
He
smiled when he found a match at a large bank website and looked up the
bank balance – more than $1000 US dollars. After posting the credentials
for sale on an underground website,
somebody in the US named Matt1117 bought them for $750, paid into an
anonymous escrow account. The transaction was routine. Just one drop in
an ocean of transactions every day.
Two
weeks later, Tamara Kramer, Abby’s mother, waited in the checkout line
in the local grocery store. She wanted to surprise her starving college
daughter with some ramen noodles and
other snacks. When she swiped her debit card from the shared checking
account with her daughter, the cashier politely told her it was
declined. Surely there must be some mistake? She swiped it again and was
declined again. As people queued up in line, Tamara
called her bank. What was going on? After waiting on hold for more than
15 minutes, she finally connected with an agent named Nancy with a
thick Indian accent who tried to be helpful. The language barrier was
difficult to overcome, but Nancy eventually told
Tamara that her bank account was over drafted.
“What? How can this be? I deposited $1000 in that account 3 weeks ago and haven’t bought anything since then.”
“Ma’am Tamara, it says here you spent $1232.55 at an online electronics store last week.”
“I did not! … Unless Abby did. Thank you, I will talk to my daughter.”
Embarrassed,
Tamara paid for her groceries with a credit card and apologized to the
cashier and everyone waiting in the growing line. She called Abby and
left a message. Abby returned
the call several hours later and felt the wrath of a mother betrayed.
Abby tearfully assured her mother she did no such thing. Tamara called
the bank, disputed the bill pay and closed the checking account. She had
to visit the local branch of her bank to open
a new account, and contacted everyone with checks from the old bank
account that had not yet cleared. Over the next two weeks, Tamara
managed to reimburse everyone to whom she or Abby had written checks by
scavenging money from savings and delaying other bills.
The bank fraud department investigated and after 3 months, filed an
insurance claim and reimbursed Tamara for the stolen money, less
Tamara’s $50 liability. The bank called appropriate law enforcement
agencies about the matter, which took the reports and filed
them away with thousands of similar reports.
Nobody
tried to recover or even locate the stolen money. But a teenager named
Kenny enjoyed the new game console he bought on Craigslist from somebody
named Matt1117.
Thanks for letting me hang out here for a little while.
No comments:
Post a Comment
I love comments, and I will definitely read anything that is left here. Don't be shy, I'd love to know what you are thinking!