Underground guide targets e-commerce, online banking sites Security vendor Trusteer has found an underground tutorial that teaches hackers an easy way to bypass fraud detection systems used on many e-commerce and online banking sites.The company uncovered the document while prowling forums used by cybercriminals to discuss the latest tools and techniques for penetrating security systems.The tutorial is aimed at technology that identifies devices contacting a site. Such systems monitor the visiting smartphones, tablets or personal computers for hacker-like behavior.The document shows how cybercriminals work together in promoting techniques for circumventing security systems. The discovery emphasizes the need for organizations to continuously upgrade systems and take a layered security approach to keep hackers out of corporate networks. “What was effective two or three years ago may be much less effective now,” Amit Klein, chief technology office for Trusteer, said on Tuesday.[See also: With new bank-security guidance, how safe is your firm?] The tutorial was written in English, even though it came from an underground forum where documents are typically written in Russian, Klein said. The document describes how to fool detection systems that monitor for unusual transactions.For example, hackers who have obtained a list of stolen credit- and debit-card numbers will attempt to use multiple cards on e-commerce sites or banking sites to obtain goods or cash, respectively.Key to the effectiveness of the detection systems is the ability to “fingerprint” each device to watch for behavior like multiple transactions, Klein said. The identifying information includes the IP address and the version of browser and operating system in the device.The latter two identifying bits are taken from what is called a “user-agent header” that the browser uses to identify itself as the software making the request of the Web site. Because multiple devices can have the same IP address, the information within the user-agent header is used by many detection systems to identify devices. The hacker tutorial recommends using a commercially available virtual private network or proxy server to hide the device’s real IP address. It then instructs hackers to use a browser plugin available on an underground site to modify the user-agent header each time the device starts a new transaction, Klein said.The discovery means organizations using fraud detection systems need to evaluate their methodology. Those still using user-agent headers should be replaced with systems that are less likely to be tricked, Klein said. “What [technology] people put in front to protect transactions have to be constantly evaluated and reevaluated against emerging threats,” he said. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe