Você está na página 1de 24

THE LITTLE GREEN BOOK on identity theft 

The little
green book
on identity theft
 THE LITTLE GREEN BOOK on identity theft

Now the serpent was more crafty than any of


the wild animals the Lord God had made. He
said to the woman, “Did God really say, ‘You
must not eat from any tree in the garden’?”
The woman said to the serpent, “We may eat
fruit from the trees in the garden, but God did
say, ‘You must not eat fruit from the tree that is
in the middle of the garden, and you must not
touch it, or you will die’.“
“You will not surely die,” the serpent said to the
woman. “For God knows that when you eat of
it your eyes will be opened, and you will be like
God, knowing good and evil.”
Genesis 3, 1-4

This text – from the very beginning of the Bible is probably the first exam-
ple of identity theft: The Devil, masquerading as a serpent, tricks Eve to
eat the fruit from the tree of knowledge of good and evil – the Devil has
stolen the serpent’s identity.

Thus, identity theft is not a new phenomenon – it has been there from the
beginning of time.
THE LITTLE GREEN BOOK on identity theft 

Content
The different roles as a potential victim.................... 6

The intent of the identity thief................................... 9

Techniques used for identity theft............................11

The Internet – a plethora of information................. 16

Social engineering
– THE most important tool to obtain information.... 17

How to protect yourself from identity theft.............. 18

Closing words......................................................... 22

Norman ASA is not liable for any form of loss or damage arising from use of the
documentation or from errors or deficiencies therein, including but not limited to loss
of earnings.

The information in this document is subject to change without notice. No part of this
documentation may be reproduced or transmitted in any form or by any means, elec-
tronic or mechanical, including photocopying, recording or information storage and
retrieval systems, for any purpose other than the purchaser’s personal use, without the
explicit written permission of Norman ASA.

The Norman logo is a registered trademark of Norman ASA.


Names of products mentioned in this documentation are either trademarks or reg-
istered trademarks of their respective owners. They are mentioned for identification
purposes only.

Copyright © 2006 Norman ASA.


All rights reserved.
 THE LITTLE GREEN BOOK on identity theft

Introduction and Carl in all matters that


definition count. Only those who
know Carl from before the
theft took place can know
This small book will discuss
that Carl is Carl. In all other
identity theft with particular
contexts Frank is Carl.
emphasis on the extended pos-
sibilities that the Internet and
2. Linda sends a postcard to
computing offer.
Yvonne’s aunt from Spain,
congratulating her with
One should note that identity
her birthday, and signs it
theft assumes many forms
Yvonne. The aunt is amazed
from the playful to the ex-
that Yvonne remembers her
tremely dangerous.
birthday while in Spain, and
tells herself that Yvonne is a
Consider these two scenarios:
really considerate niece.
1. By careful collection of
Both are examples of identity
information, interception
theft. Obviously the first is
of mail and theft of Carl’s
potentially quite severe for
original proofs of identity,
Carl, while the latter may be to
Frank is able to “become”
THE LITTLE GREEN BOOK on identity theft 

Yvonne’s advantage (e.g. in her theme in this book. We will


aunt’s last will). therefore hereafter restrict the
Thus, we cannot say that all general definition and refer
kinds of identity theft are to identity theft as the act of
neces­sarily bad, as one can pretending with malicious
“borrow” another person’s intent to be another person
identity with good intent and in communication with a
outcome as the second exam- third person or persons.
ple above shows.
This operative definition
We can therefore come up stated above does not define
with a general definition of whether this malicious intent
identity theft as the act of is directed against:
pretending to be another 1. The person that has his/her
person in communica- identity stolen
tion with a third person or 2. A third party that may suf-
persons. fer from dealing with per-
son x, while led to believe
However, identity theft is nor- that it is person y that he is
mally seen as something bad, dealing with.
which will also be the main 3. Both of the above men-
tioned.

It is important to be aware


of the fact that all these are
identity thefts. The party that
A general definition of might be hurt however will
identity theft as the act of differ. Although the situation
pretending to be another mentioned in item 1 above is
person in communica- the most focused in the press
tion with a third person or and other media, item 2 may
persons.
be as important and as crucial
to defend against.
 THE LITTLE GREEN BOOK on identity theft

This book will discuss various The different roles


examples of identity theft and as a potential victim
techniques used, as well as
outlining how you can defend
yourself against being victim-
Defining roles
ized. When discussing the means
and techniques of identity
Although Internet-based tech- theft, it is often useful to con-
niques for identity theft (like sider the different roles a per-
phishing) are almost exclu- son has in order to consider
sively in focus presently, as we which types of identity theft
shall see, other old-­fashioned that you should beware of in
techniques may be just as the different roles.
effective, often even more.
No matter how sophisticated Key words in the different
malicious software that is cre- roles are:
ated, no matter which sneaky • Who you are
hardware devices that is set up • What you know
– the human being (wetware)
is still the main security risk. Your role as a private
person
Nevertheless, this book will As a private person your
focus in particular on the identity may be interesting for
use on Internet as means for a number of totally different
Identity theft. reasons, and the motivation
for stealing your identity may
Throughout this book we will, be equally diversified.
when relevant, refer to the vic-
tim of identity theft as a “he” If you for some reason have
while the identity thief will be angered a person and this per-
a female. This is of course for son wants to take revenge, she
simplification reasons only. has a plethora of means liter-
THE LITTLE GREEN BOOK on identity theft 

ally available on her fingertips. you towards people who have


All of which involve stealing no (practical) means to check
your identity for a short while. if she is really you.
A couple of examples are:
• She can use any phone and One may of course view the
order subscriptions of lots above mentioned as mere
of different magazines in nuisances, which they to some
your name. extent also are. However,
• She can write a letter, it can be quite tedious and
signed in your name, time-consuming to cancel
cancelling your newspaper magazine subscriptions all the
subscription with immedi- time. And the person that has
ate effect. become your enemy for some
reason can of course escalate
Common for these examples her harassment with even
of such ad-hoc identity theft is more annoying and severe acts


that the thief is impersonating (shutting off your electric-

She can use any phone and order subscriptions of lots of


different magazines in your name.
 THE LITTLE GREEN BOOK on identity theft

ity because in her mail to the Your role as a person in a


supplier - signed by “you” corporation
– she states that she (“you”) is On the other hand you should
going away on a long journey consider your role as e.g. an
abroad). employee.

A more “popular” scenario In this case it is not you who


is when someone attempts to are the target, but the corpora-
steal your identity as a mean tion in which you are em-
to steal something, like money ployed. Stealing your identity
from your bank account. is only a means to be able
Whether you are a tempting to access/obtain something
target will of course depend from your employer – this is
on how much money you have usually some kind of industrial
as well as how easy it is to steal espionage.
your identity. This scenario
will be discussed further in a Again, some examples illus-
later chapter. trate this:

Suffice it to say in this context You work as a janitor and are


that identity theft directed as currently deployed to clean
the private person you are, is the premises of a big com-
motivated by your character- pany. One of this company’s
istics as this person (rich, un- competitors hires a person
popular, popular, famous etc.). to steal your identity as a tool
The identity thief will have to be able to go through the
you as her ultimate target. company’s dustbins hoping to
THE LITTLE GREEN BOOK on identity theft 

find information of interest, Later in this book we will go


or adding a little black box at into more detail regarding
the rear end of your computer the implementation of these
that monitors all key strokes kinds of identity theft. The
from the keyboard. Imper- point we want to make here

“ By social engineering techniques she can trick a person to reveal


his user name and password to a company server.

sonating you (stealing your is merely that it is your role as


identity) could be done easily a corporate person that is the
by showing up at another time intermediate target here. The
of the day than you usually do main target is not you.
(who would notice in a large
corporation?).
The intent of the
Another scenario is if you are identity thief
employed in the company’s
IT department. The thief of Keeping the theft secret
your identity could then call or not
someone in the company The previous chapter’s exam-
pretending to be you, and by ples show that the time frame
social engineering techniques of the identity theft will differ,
she tricks that person to reveal depending on the intent of the
his user name and password to identity thief.
a company server. Again it is
possible to obtain information In most of the cases the iden-
that the company does not tity thief only needed to steal
want to fall into the hands of a person’s identity for a very
the competitor. short time in order to accom-
10 THE LITTLE GREEN BOOK on identity theft

plish a particular task. Often have a major problem proving


it does not even matter if the to lots of different public and
person who had his identity corporate parties, that you
stolen notices this after the actually is you.
theft took place.
An interesting exercise for
In the example where you each and every one of us is to
were the victim of harassment consider is this:
it is actually a point in itself
that you are aware of the fact How do you proceed if
that someone is harassing someone has managed to get
you. On the other hand, the a driver’s license, a passport
example of industrial espio- and several credit cards in
nage would probably be more your name. She then takes
successful if it was not re- control of your bank account,
vealed that secret information asks for and is granted a loan
was in the hand of the wrong (in your name of course) and
persons. If your bank account the monthly instalments are
is emptied, the identity thief not met. The credit cards are
has accomplished what she heavily used and you get huge
wanted; that particular theft bills from credit card compa-
would probably not succeed nies you never had plans to do
a second and third time with business with.
you and your bank account. What do you do?

She becomes you


As a special case we should
consider when someone takes
over your complete identity to Industrial espionage
become you. If this is conduct- would probably be more
successful if it was not
ed in the most sophisti­cated
revealed that secret infor-
manner it actually does not mation was in the hand of
matter if the scam is known or the wrong persons.
not. As several horror stories
have shown, you may then
THE LITTLE GREEN BOOK on identity theft 11

Techniques used for • Attempting to harvest


identity theft information from a huge
number of individuals
hoping that someone is
General willing to offer the desired
In a previous chapter a few information.
examples of identity theft were
briefly discussed. We will in Specialized information
this chapter discuss in more gathering
detail some of the different
When the identity thief knows
techniques that may be used
a person and a few poten-
for information gathering. In
tial persons whose identity
particular we will emphasize
she needs to steal, there is a
the use of tools available on
need to gather some kind of
the Internet for such informa-
information about that person
tion gathering.
to facilitate this identity take-
over.
In general there are two
approaches to information
There are different techniques
gathering with the attempt to
that an identity thief may use
steal someone’s identity:
to gather information about
• Collecting as much infor-
the person she wants to be. In
mation as possible about
many cases she already knows
one or a very few individu-
something about the person
als
12 THE LITTLE GREEN BOOK on identity theft

(name, gender, address etc.) stealing the victim’s bank


but this is not always the case. account statements)
• Purchasing credit informa-
Scenario 1 – the victim tion on the victim
is a particular identified • Hacking the victims com-
person puter
When some information (e.g. • Social engineering tech-
name) is known about the per- niques by using the

“ When the identity thief has the information she needs, she
can set the theft itself into action.

son our identity thief wants to telephone or email to obtain


target, she can use some of the particular information.
following techniques to gather
more information: When the identity thief has
• Telephone directories for the information she needs,
obtaining telephone num- she can set the theft itself into
bers and address action by impersonating the
• Internet search engines for victim as needed.
any information about the
person that is available on Scenario 2 – the victim
the World Wide Web. This is not identified, but his
information can be any- role is
thing from the extremely This would be the case when
useful (for the thief) to the an organization is the ultimate
trivial. target. The identity thief will
• Trash bin investigation (e.g. attempt to target the organiza-
THE LITTLE GREEN BOOK on identity theft 13

tion by stealing the identity Internet sites host such infor-


of one of its employees. She mation, e.g.
is not interested in a random http://www.whois.org/,
employee, but preferably one http://www.allwhois.com/
who has particular access etc.
rights and/or one from the
management. After a few seconds she has
gathered information that

A good start would be to enables her to target more


identify the organization’s systematically one or a few key
management and technical persons using the techniques
staff in the IT department. that is mentioned in Scenario
The obvious starting point is 1 above.
the corporation’s web site! It is
more normal than not that the Bulk information gathering
web site has information about A totally different approach
management, other contact is used if the identity thief
persons, telephone numbers, wants to obtain some kind of
email addresses etc. special information regardless
She may add and cross check of whether it is obtained from
this information by check- one individual or another, as
ing the persons who are the long as the type of informa-
contacts on the corporation’s tion is the same.
domain registration. Several
14 THE LITTLE GREEN BOOK on identity theft

Typically this may be


• password(s) to access a The use of the Internet to
special resource (e.g. bank gather information with the
accounts) attempt to commit fraud
• valid credit card numbers is called phishing (derived
from “fishing”). This will be
This can be carried out by em- discussed in more detail in a
ploying a different set of tools. separate chapter below.
However, use of the Internet is
unrivalled as the tool to use in Phishing – a special
these cases, as it facilitates: case of bulk information
• a certain degree of anonym- ­gathering
ity on the identity thief’s Phishing is an increasingly
side popular way to obtain infor-
• malicious programs that mation from users – infor-
can be installed on users’ mation that may be used to
computers to reveal confi- commit crime. New phishing
dential information to the attempts are set up daily.
identity thief
• possibilities to send a huge A typical phishing scheme
number of emails to poten- would be carried out in this
tial victims manner:
• setting up fake web sites
tailored to the identity 1. The identity thief purchases
thief’s needs or harvests electronically in
THE LITTLE GREEN BOOK on identity theft 15

some manner a large set of programs (malware) on a com-


email addresses. puter are beyond this book.
2. She sends an email to these Suffice it to mention that
addresses with a spoofed distributing malware through
sender (e.g. a bank) emails, network spreaders,
3. In the email she claims that utilization of vulnerabilities
something wrong happened in operating systems and
with the user’s account and applications, are all popular
requesting a confirmation and widely used techniques to
of the password. distribute malware.
Keyloggers, trojans and back-
Quite a lot of such emails have doors are typical malware used
a spoofed link to a web site by the identity thief.
that looks (almost) identical to
the institution’s real one. How- Although these tools are
ever, it is of course a fake site mainly used in a bulk informa-
that attempts to obtain secret tion gathering scheme, it is
user information with the obviously likely that malicious
intent to commit fraud. software may be targeted
on a particular person/or-
An identity thief may also use ganization exclusively. Then
special malicious programs to it would be quite difficult to
collect information. Details detect, as most antivirus and
regarding the techniques antispyware products may
used to insert such malicious not uncover it unless detected
by SandBox-like techniques
similar to the one integrated in


Norman’s antivirus products.

The use of the Internet to Online questionnaires are also


gather information with the efficient tools to gather infor-
attempt to commit fraud is mation about you – informa-
called phishing. tion that you normally would
not offer to anyone, but which
you may be tricked into giving
16 THE LITTLE GREEN BOOK on identity theft

because the questions appears Internet may be so danger-


on an official looking (though ous with respect to identity
fake) web site. theft is that its electronic form
enables automatic processing
Norman has previously pub- and systematization. As more
lished “Norman’s little green and more personal informa-
book of phishing”, which cov- tion (hospital records, bank
ers this topic in more detail. information, insurance data
Please refer to this book for etc.) are accessible through the
more in-depth information. Internet, it is of utmost impor-

“ The Internet has made the


task for the identity thief much
easier.

The Internet tance that this information is


– a plethora of stored in a way that ensures
­information that it cannot be accessed by
someone who is not legitimate.
Unfortunately we often see
Although identity theft has examples that this is not the
been possible and carried case.
out for ages, the Internet has
made the task for the identity Securing digital informa-
thief much easier. We have tion is becoming ­increasingly
discussed some of these issues important as our lives are
above. evolving more and more into a
networked society.
One of the main reasons
why the information on the
THE LITTLE GREEN BOOK on identity theft 17

Social engineering If you work in a large organi-


– THE most impor- zation and someone calls you
tant tool to obtain on your phone, saying that she
is from your organization’s IT
information
department and asks for your
password because she has to
Regardless of the fact that the update your account (for what-
Internet has made the identity ever reason), most persons
thief’s task easier, the by far would be inclined to give the
most important tool for her is password rather than chal-
good old social engineering lenge the caller’s identity.
techniques.
Another trick it to count on
The most famous hacker of your vanity. Like it or not,
our time – Kevin David Mit- most of us are susceptible to
nick – is (in)famous for break- flattery, and a skilled person
ing into high-profile computer can utilize this to persuade
systems. He was eventually you into giving her informa-
arrested (in 1995) and spent tion that you should not part
some years in prison. The with.
fact, however, is that Mitnick’s
attacks were mainly based on The set of conventional social
social engineering techniques. engineering tools available
It is maintained that he was for the identity thief is only
very convincing and persua- limited by her imagination.
sive in his attempts to trick
people to disclose information When discussing social engi-
that he needed. neering however, the social
engineering aspect involved
The reason why social in identity theft by use of the
engine­ering techniques are so Internet as a channel cannot
effective is that most humans be ignored. Most phishing
are eager to please. When attempts will rely on social en-
someone asks you for assist- gineering. The more elegantly
ance your initial reaction is to performed the more likely to
help that person.
18 THE LITTLE GREEN BOOK on identity theft

succeed. An email written in This view should also be taken


English attempting to phish when protection from identity
for secret user information theft is the issue.
from users of a Norwegian
bank is not likely to succeed… Different protection
(real life example!) depending on the thief’s
approach
Social engineering works over Obviously there are differ-
and over again because unfor- ent approaches that should
tunately users are gullible! be applied to the different
kinds of identity theft that are
How to protect discussed in previous chapters.
yourself from We will go through some use-
­identity theft ful guidelines here.


General
It is presumably possible to
be totally protected against It is presumably possible
any kind of danger. The dis­ to be totally protected
advantage is that if you are, against any kind of
it will either be extremely danger.
expensive or, conducting your
normal tasks will be extremely
cumbersome or even impos-
sible.

The correct general approach


to risk is therefore not elimi-
Two general guidelines to keep
nation, but rather finding the
in mind:
correct balance between the
1. Everything is not necessar-
risk you expose yourself to and
ily what is seems like
the price you pay if you are
2. There are some people that
being hit by an incident that
may not have your welfare
is not avoided (for whatever
as their top priority
reason).
THE LITTLE GREEN BOOK on identity theft 19

Protection against activity, not to mention that


conventional social you will loose all your friends
­engineering in quite a short time.
Social engineering is probably
the most difficult to resist. A better operational ap-
One approach that may work proach is use intelligent
quite well is to switch into a scepticism.
permanent paranoid mode:
Try asking yourself whether
Assume that anyone who an initiated contact and her
contacts you for whatever reason for contacting you is
reason is not the one she probable. Would a person
claims to be, and that her from the IT department re-
ally need your password? Is it
intensions are nasty.

This may be a tempting likely that the person from the


approach to shield against credit card company doesn’t
conventional social engineer- know and cannot find your
ing, but will probably not be credit card’s number and
applicable in real life. It will be expiry date? Why would your
too cumbersome to conduct bank representative need your
normal social and professional pin code?
20 THE LITTLE GREEN BOOK on identity theft

By asking yourself such com- what information you disclose,


mon sense questions instead in which environment, and to
of supplying the requested whom.
information just to be helpful,
you will be better prepared It may be wise to destroy your

“ It may be wise to destroy your credit card statements


before throwing them in the dust bin. It is not particularly
smart to leave your cash dispenser withdrawals receipt in
the open beside the bank

and protected from becoming credit card statements before


the victim of social engineer- throwing them in the dust
ing techniques. bin. It is not particularly smart
to leave your cash dispenser
Protection against withdrawals receipt in the
­conventional “espionage” open beside the bank. The
Espionage with the intent of most secret company infor-
identity theft would use a lot mation drafts should not be
of the same techniques as seen disposed of in an off-hand
in spy movies: manner.
• dustbin harvesting
• telephone tapping Protection against Internet
• monitoring conversations based social engineering
behind closed doors
• impersonation Much of the same approach
• information gathering and is sufficient when protecting
systematization yourself from Internet based
social engineering techniques
The general rule to observe as for conventional social
is that you should beware of engineering. Again:
THE LITTLE GREEN BOOK on identity theft 21

Use intelligent scepticism. You will also remember to


update your operating system
Is it likely that your local bank and applications with the latest
is sending emails in English? program patches, as you know
Why would your Internet shop that authors of malware are

ask for your password – can effective in utilizing newly


you think of anything credible discovered program deficien-
that explains such a request? cies. And of course you update
your antivirus and antispam
Protection against Inter- programs often, and you use a
net based “espionage” firewall.
If you follow the general
guideline about intelligent In spite of all these precau-
scepticism you will also to tions someone may write a
some extent be protected malicious piece of software
against Internet based espio- that is placed on your PC
nage. You will of course not without your knowledge. An
open the attachment in the additional level of protection
email (allegedly) from your would then be to encrypt the
favorite female movie star who information that is available
for some weird reason has on your hard drive or network.
decided to email you her nude
photographs.
22 THE LITTLE GREEN BOOK on identity theft

Closing words stealing a person’s identity


easier and much more difficult
to reclaim. The presence of In-
This book has briefly
ternet accessible databases that
discussed some aspects of
hold electronic information
identity theft. Much more
about each and every one of
information is freely avail-
us makes identity theft easier.
able in interesting articles on
And more difficult to reclaim
the Internet and as printed
your identity if stolen.
books. Although – as shown
at the very start of this book
There are strong indications
– identity theft is not a new
that identity theft will prevail
phenomenon. The Internet
for a long time in some form
and gathering of electronic
or another. To end this book
information about each and
on a similar note as it started
every one of us in huge data-
– this time from the end of
bases (that may in some cases
the Bible, where the identity
be cross-referenced) make
thief is imprisoned:

And I saw an angel coming down out of heaven,


having the key to the Abyss and holding in his
hand a great chain. He seized the dragon, that
ancient serpent, who is the devil, or Satan, and
bound him for a thousand years. He threw him
into the Abyss, and locked and sealed it over
him, to keep him from deceiving the nations
anymore until the thousand years were ended.
After that, he must be set free for a short time.
Revelation 20, 1-4
THE LITTLE GREEN BOOK on identity theft 23

Norway Switzerland
Norman ASA Norman Data Defense Systems AG
Strandvn. 37, Postboks 43 Münchensteinerstrasse 43
1324 Lysaker, Norway 4052 Basel, Switzerland
Tel: +47 67 10 97 00 Tel: +41-61 317 25 25
email: norman@norman.no email: norman@norman.ch
www.norman.no www.norman.ch

Denmark The Netherlands and Luxemburg


Norman Data Defense Systems A/S Norman/SHARK BV
Blangstedgårdsvej 1 Postbus 159
5220 Odense SØ, Denmark 2130 AD Hoofddorp, The Netherlands
Tel: +45 63 11 05 08 Tel.: +31-23-7890222
email: info@normandk.com email: info@norman.nl
www.norman.com/dk www.norman.nl

Sweden Belgium
Norman Data Defense Systems AB Norman/SHARK BV
ProNova Science Park, Korsgata 2 Grote Baan 119/2
602 33 Norrköping, Sweden 3511 Kuringen (Hasselt), Belgium
Tel: +46 011-230 330 Tel: +32 89 24 37 04
email: sales.se@norman.no email: belgium@norman.nl
www.norman.com/se
France
UK Norman France
Norman Data Defense Systems (UK) Ltd 8 rue de Berri
15 Linford Forum, Rockingham Drive 75008 Paris, France
Linford Wood Tel : + 33 1 42 99 94 14
Milton Keynes email: info@norman.fr
MK14 6LY, UK www.norman.fr
Tel: +44-1908 678496
email: norman@normanuk.com Spain
www.normanuk.com Norman Data Defense Systems
Camino Cerro de los Gamos 1, Edif.1
Germany 28224 Pozuelo de Alarcón MADRID, Spain
Norman Data Defense Systems GmbH Tel: +34 (0)91 790 11 31
Gladbecker Strasse 3 email: norman@normandata.es
40472 Düsseldorf, Germany www.normandata.es
Tel: +49-211 / 5 86 99-0
email: info@norman.de Italy
www.norman.de Norman Data Defense Systems
Centro Direzionale Lombardo
Germany Via Roma, 108
Norman Data Defense Systems GmbH 20060 Cassina de’Pecchi (MI), Italy
Niederlassung München Tel: +39 02 951 58 952
Ludwigstr. 47 email: info@normanit.com
85399 Hallbergmoos, Germany www.normanit.com
Tel: +49-811 / 5 41 84-0
email: info@norman.de USA
www.norman.de Norman Data Defense Systems Inc
9302 Lee Highway, Suite 950A
Fairfax, VA 22031, USA
Tel: +1-703 267 6109
email: norman@norman.com
www.norman.com
24 THE LITTLE GREEN BOOK on identity theft

w w w. n o r m a n . c o m

Você também pode gostar