SlideShare a Scribd company logo
Asian Digital Thief : It’s not about faking the approval
               MrX @ IDSECCONF2009
Agenda
•   Intro
•   Who are they?
•   Prevention Methods
•   Case Studies
•   Conclusions
•   Q&A
Intro
Intro
• Hi Tech = Lazy
• Cyber Crime Increased
• Internet Fraud Still Exist
Who are they?
Who are they?
•   Credit Card Fraudster
•   Suppliers (crackers/phisers/scammers)
•   Proxy Providers
•   Drop Point / Reshippers
Prevention Methods
Prevention Methods
•   SSL
•   AVS
•   3D Secure
•   Automate Fraud Detection
•   Blocking Transaction from High Risk Country
•   System Hardening
SSL
• SSL is good, but it’s not everything.
AVS
• Definition
• Advantage
• Facts
  – Not globally supported
  – Still can bypassed
  – System Abuse
• Solution
3D Secure
• Definition
• Advantage
• Facts
  –   Weak Password
  –   Expensive
  –   Still can bypassed
  –   Miss configuration
  –   User vulnerable to phising attack
• Solution
Automate Fraud Detection
• Definition
• Advantage
• Facts
  – Still can bypassed with proxies
  – Easier for Fraudster
• Solution
Blocking Transaction from High Risk Country

• Definition
• Advantage
• Facts
  – No Manual Check
  – Drop Point
  – Jump Shipment
• Solution
System Hardening
• Definition
• Advantage
• Facts
  – OS & Network Hardening
  – Backdooring Source Code
  – “Cracked” Web Application
• Solution
Case Studies
Case Studies
• SSL is not everything
• 3D Secure
• Security Conference?
Conclusions
Conclusions
• 100% Secure System?
• Manual Check still needed
• Internet Fraud = Never Ending Crime
Q&A
•   UAI
•   Depkominfo
•   Maxindo Mitra Solusi
•   Nimhost
kthxbai!!

More Related Content

PDF
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
PDF
Turning tl mr 3020 into automate wireless attacker
PDF
Desain skema rn4 s1
PPTX
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
PPTX
How i hack_hacker_facebook - el_rumi
PDF
Spying The Wire
PDF
The21stcenturybankjob 101014152255-phpapp02
PDF
Micro control idsecconf2010
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
Turning tl mr 3020 into automate wireless attacker
Desain skema rn4 s1
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
How i hack_hacker_facebook - el_rumi
Spying The Wire
The21stcenturybankjob 101014152255-phpapp02
Micro control idsecconf2010

Viewers also liked (18)

PDF
How to train your ninja
PDF
Turning tl mr 3020 into automate wireless attacker
PDF
Mobile security-an-introduction - za
PPTX
Reversing blue coat proxysg - wa-
PDF
y3dips, mastering the network hackingFU
PPTX
Analisa kejahatan menggunakan jaringan gsm
PDF
Reksoprodjo cyber warfare stmik bali 2010
PDF
indounderground, Carding, carder and why you should avoid it!
PDF
Generating the responses
PDF
A million little tracking devices - Don Bailey
PDF
Keynote - Jim Geovedi - professional-hackers
PDF
Linux kernel-rootkit-dev - Wonokaerun
PDF
Ctf online idsecconf2012 walkthrough
PDF
Mobile Malware defense and possibly Anti-forensics
PDF
theday, windows hacking with commandline
PDF
y3dips hacking priv8 network
PPT
Bruteforce basic presentation_file - linx
PDF
oauth-for-credentials-security-in-rest-api-access
How to train your ninja
Turning tl mr 3020 into automate wireless attacker
Mobile security-an-introduction - za
Reversing blue coat proxysg - wa-
y3dips, mastering the network hackingFU
Analisa kejahatan menggunakan jaringan gsm
Reksoprodjo cyber warfare stmik bali 2010
indounderground, Carding, carder and why you should avoid it!
Generating the responses
A million little tracking devices - Don Bailey
Keynote - Jim Geovedi - professional-hackers
Linux kernel-rootkit-dev - Wonokaerun
Ctf online idsecconf2012 walkthrough
Mobile Malware defense and possibly Anti-forensics
theday, windows hacking with commandline
y3dips hacking priv8 network
Bruteforce basic presentation_file - linx
oauth-for-credentials-security-in-rest-api-access
Ad

Similar to MrX - ADT: It's not about Faking the Approval (20)

PPTX
Keeping Secrets on the Internet of Things - Mobile Web Application Security
PPT
Authentication technologies
PPT
Authentication Technologies
PDF
CNIT 160 4e Security Program Management (Part 5)
PPTX
Security is not a feature
PPT
Authenticationtechnologies 120711134100-phpapp01
PPT
IWMW 2000: Trusted e-Commerce: What Does it Mean?
PPTX
E payment Project Demo
PPT
Oath appsec sf 2015 dem rev. 2
PPT
Strong Authentication - Open Source
PDF
Cybersecurity Basics - Aravindr.com
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPT
Security what it means to your business - circa 1999
PPTX
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
PDF
Mobile Security
PPTX
Understanding Zero Trust Security for IBM i
PDF
Bsu skills and_careers_in_cybersecurity
PDF
Digital Marketing in the "Secure Age"
PDF
The What, Why, and How of DevSecOps
PDF
Ciso executive forum 2013
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Authentication technologies
Authentication Technologies
CNIT 160 4e Security Program Management (Part 5)
Security is not a feature
Authenticationtechnologies 120711134100-phpapp01
IWMW 2000: Trusted e-Commerce: What Does it Mean?
E payment Project Demo
Oath appsec sf 2015 dem rev. 2
Strong Authentication - Open Source
Cybersecurity Basics - Aravindr.com
Cyber Security Awareness Session for Executives and Non-IT professionals
Security what it means to your business - circa 1999
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
Mobile Security
Understanding Zero Trust Security for IBM i
Bsu skills and_careers_in_cybersecurity
Digital Marketing in the "Secure Age"
The What, Why, and How of DevSecOps
Ciso executive forum 2013
Ad

More from idsecconf (20)

PDF
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
PDF
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnera...
PDF
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requiremen...
PDF
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendara...
PDF
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber den...
PDF
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
PDF
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To S...
PDF
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak ...
PDF
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protoco...
PDF
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
PDF
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
PDF
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
PDF
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
PDF
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
PDF
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
PDF
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
PDF
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
PDF
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
PDF
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
PDF
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnera...
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requiremen...
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendara...
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber den...
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To S...
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak ...
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protoco...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...

MrX - ADT: It's not about Faking the Approval