Please create an account to participate in the Slashdot moderation system


Forgot your password?
Crime Facebook Security Social Networks

Russian Hacker Selling 1.5M Facebook Accounts 193

Sir Codelot writes "A hacker who calls himself Kirllos has obtained and is now offering to sell 1.5 million Facebook IDs at astonishingly low prices — $25 per 1,000 IDs for users with fewer than 10 friends and $45 per 1,000 IDs for users with more than 10 friends. Looking at the numbers, Kirllos has stolen the IDs of one out of every 300 Facebook users. Quoting: 'VeriSign director of cyber intelligence Rick Howard told the New York Times that it appeared close to 700,000 had already been sold. Kirllos would have earned at least $25,000 from the scam. Howard told the newspaper that it was not apparent whether the accounts and passwords were legitimate, but a Russian underground hacking magazine reported it had tested some of Kirllos' previous samples and managed to get into people's accounts.'"
This discussion has been archived. No new comments can be posted.

Russian Hacker Selling 1.5M Facebook Accounts

Comments Filter:
  • Re:Great PoE (Score:4, Interesting)

    by Bigjeff5 ( 1143585 ) on Sunday April 25, 2010 @12:45PM (#31975570)

    The wonderful thing about his product though, is that he can keep selling it even after he has sold it.

    He doesn't have 1.5 million accounts to sell once, he has 1.5 million accounts to sell over and over and over. He may only be able to get $50k for the lot, but he can sell them all a dozen times. Depending on if they catch him or not, and how effective they are at getting people to change their passwords (the only way to make the accounts worthless), this guy could make half a million dollars or more pretty easily.

  • Re:Translation (Score:3, Interesting)

    by init100 ( 915886 ) on Sunday April 25, 2010 @01:00PM (#31975714)

    Actually... what this means is that you should change your banking passwords.

    Do any banks actually use ordinary password authentication? My bank has provided me with a Digipass, a small device with a numeric keypad, where I enter my PIN, select an authentication mode, input a challenge (a couple of randomly generated bank-provided numbers) and when confirming transfer orders, an amount. The device then displays a string of digits, which I enter into the bank login page. Using ordinary passwords seem pretty insecure in comparison.

  • Re:Translation (Score:4, Interesting)

    by human spam filter ( 994463 ) on Sunday April 25, 2010 @01:10PM (#31975802)
    Being from Europe I was pretty surprised when I came to the US and learned that virtually all* banks use ordinary passwords for online banking.. *the ones I know of: Citi, Bank of America, US Bank
  • Re:Translation (Score:5, Interesting)

    by tomhudson ( 43916 ) <> on Sunday April 25, 2010 @01:16PM (#31975852) Journal
    1. Write script to make a million face facebook accounts, friend each other at random
    2. Sell fake accounts.
  • Re:Translation (Score:3, Interesting)

    by hedwards ( 940851 ) on Sunday April 25, 2010 @01:17PM (#31975866)
    Honestly, E*Trade is pretty much the only one I can think of off the top of my head that uses something like that. Pretty much every bank in the country just uses simple passwords with verification questions. And an astonishing number don't bother to make their home page load via SSl.

    The main reason being that they aren't generally held accountable for breaches that may occur due to their own lax security measures. In relative recent history it was still relatively common for ID thieves to be able to get lots of material dumpster diving. As well as for companies like TD Ameritrade to fail to notice that they'd been haxxored.

    Mostly it's a side effect of the conservative's personal responsibility fetish. Basically make everything the fault of the victim even if it's clearly not their fault.
  • Re:It is simple. (Score:3, Interesting)

    by hedwards ( 940851 ) on Sunday April 25, 2010 @01:20PM (#31975892)
    Probably because unlike in the US, Russia seems to turn a completely blind eye to cyber criminals. Granted we don't do such a good job ourselves, but we do look for them and prosecute them when found. It's rich that a country with a very serious problem with organized crime would even pretend like there's no justification for pointing a finger back at the lack of enforcement.
  • Re:It is simple. (Score:3, Interesting)

    by FuckingNickName ( 1362625 ) on Sunday April 25, 2010 @01:39PM (#31976046) Journal

    Ah, cyber crime, the offence of sending ones and zeros down a wire to produce forbidden tones [].

    To specify, money in a bank is just an entry in a database. Someone fraudulently reduce some entry by $1000 and increase another by $1000? Roll back.

    Banks have a problem with the administrative burden? Luckily, mine is owned substantially by the state now, so shouldn't be much of a problem enforcing this.

  • Re:Great PoE (Score:3, Interesting)

    by Anonymous Coward on Sunday April 25, 2010 @01:51PM (#31976158)
    Yes, but that would make the accounts worthless pretty quickly. The "value" of the account is that both the buyer and the actual account owner know the password. So it looks like a completely legitimate thing when the buyer (pretending to be the actual account owner) sends messages to the account owners "friends" asking them to go to certain sites, run certain "cool" programs, etc. The value goes down pretty quickly if the original owner is locked out by a password change and tells all their "friends" that they can't get in to Facebook anymore and had to make a new account. It makes any messages coming from that old account pretty suspicious even to the average idiot user.
  • Re:Play with fire (Score:3, Interesting)

    by flyingfsck ( 986395 ) on Sunday April 25, 2010 @01:55PM (#31976200)

    Uhmm, you keep going back and keep keying in real personal data?

    Your Geek Card should be revoked.

    I also have a FB account, with nothing in it. Well, nothing that is remotely true anyway.

  • i think he got me (Score:2, Interesting)

    by perryizgr8 ( 1370173 ) on Sunday April 25, 2010 @02:08PM (#31976324)
    facebook today told me: "your account was accessed from an unusual place and has been blocked." then i had to do all sorts of things to prove i'm human and it told me to create a new password. i created such a strong password that i have forgotten it. now will have to change it again.
  • Re:Translation (Score:2, Interesting)

    by capo_dei_capi ( 1794030 ) on Sunday April 25, 2010 @02:09PM (#31976340)
    Some New Zealand guy found his account on a list that was published earlier by the hacker, sure he may be complicit in the fraud, but then that wouldn't explain why the Russian hacker magazine didn't notice anything special about those accounts, such as a lack of messages. Also I would assume that FB has some mechanisms in place for preventing one IP to be used for signing up several hundred times, so he would have to use stuff like a bot net, and a captcha breaker anyway. So creating 1.5M fake accounts wouldn't turn out much easier than just phishing, brute-forcing, or whatever.
  • Re:Translation (Score:2, Interesting)

    by atisss ( 1661313 ) on Sunday April 25, 2010 @02:42PM (#31976622)

    Which has been already broken in OCR farms

  • by Anonymous Coward on Sunday April 25, 2010 @04:18PM (#31977594)

    Here in Finland, banks usually provide you with a list of ~50-100 one-time use codes, so it's basically impossible to figure out the next code unless you manage to find some pattern in the random digit generator that the banks use to generate those one-time codes. To me this seems even more secure than using those keypads that most other european countries seem to be using. The only way I can concieve this to be hacked is to figure out what someone's userid is (random generated string, i.e. basically a traditional password), and then intercept their snail mail when they get their fresh set of one-time codes.

  • Re:Translation (Score:3, Interesting)

    by mirix ( 1649853 ) on Sunday April 25, 2010 @07:07PM (#31978888)

    I'll do you one better, a bank I had an account with wouldn't accept passwords with ~!@#$%^&*()_+/\?|`, etc, in them. Only ([a-zA-Z0-9]*) was allowed!

    In the 21st century. Pretty fucking impressive.

  • by YXdr ( 1396565 ) on Sunday April 25, 2010 @10:34PM (#31980112)

    the only way I can conceive this to be hacked ...
    Always a dangerous statement - just because you can't think of an attack doesn't mean there isn't one.

    You are correct that no one is going to guess the next one-time password. Instead, they are going to attack your machine, and piggyback on your session after you have logged in. This is happening in the wild today, although it's mostly aimed at larger commercial accounts.

    Those keypads are more secure because they can be used to enter unique data for each transaction, like the amount of a transfer. Plus, they aren't connected to a network, so remote hacks are blocked. The keypad's generated code will definitively prove that the holder of the device entered the transaction data(*).

    Obligatory Schneier reading: []

    (*) The most likely attack against devices like this: the key stored on the bank's server. But it's just a single target, so it is easier to harden.

If you want to put yourself on the map, publish your own map.