Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Poulsen Kevin

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Poulsen Kevin

Author:Poulsen, Kevin [Poulsen, Kevin]
Language: eng
Format: mobi, epub, pdf
Published: 0101-01-01T00:00:00+00:00


21

Master Splyntr

aking up one oor of a

lime-green o ce building

on the bank of the

Monongahela

River,

the

National Cyber Forensics and

Training Alliance was far

removed from the cloistered

secrecy

of

Washington’s

intelligence community, where

Mularski had cut his teeth.

Here, dozens of security

experts from banks and

technology companies worked

alongside students from nearby

Carnegie Mellon University in

a cluster of neat cubicles,

surrounded by a ring of o ces

that followed the smoked-glass

walls around the building. With

Aeron chairs and dry-erase

boards, the o ce had the feel

of one of the technology

companies that provided the

NCFTA with the bulk of its

funds. The FBI had made a few

changes before moving in,

transforming one o ce into an

electronic

communications

room,

packed

with

government-approved

computer and crypto gear to

securely communicate with

Washington.

In his o ce, Mularski looked

over a “linkchart” Crabb, the

postal inspector, had e-mailed

him—a massive organization

schematic

showing

the

disparate connections among

125 hard targets in the

underground. Mularski realized

he’d been going about it all

wrong by waiting for a crime,

then working to track it back

to the culprit. The criminals

weren’t hiding at all. They

were advertising their services

on the forums. That made them

vulnerable, in the same way

the New York and Chicago

Ma a’s

rituals

and strict

hierarchy had given the FBI a

roadmap to crack down on the

mob decades before.

All he had to do now was

join the carders.

He selected a forum from a

list provided by Crabb and

clicked on the account

registration link. Under Justice

Department

regulations,

Mularski could in ltrate the

forums without approval from

Washington,

provided

he

observed strict limits on his

activities. To maintain his

cover, he could post messages

to the forum bulletin boards,

but he couldn’t engage anyone

directly; he would be permitted

no

more

than

three

“substantive contacts” with any

other

forum

member.

Participating in crimes, or

making controlled buys from a

vendor, was out of the

question. It could be an

intelligence-gathering

operation only; he would be a

sponge,

soaking

up

information

about

his

adversaries.

As soon as he connected, he

was confronted with his rst

important strategic decision:

What would his hacker handle

be? Mularski went with his gut.

Inspired by the Saturday

morning

cartoon Teenage

Mutant Ninja Turtles, the agent

settled on the moniker of the

sewer-dwelling karate champs’

rodent sensei, a biped rat

called Master Splinter. For

uniqueness, and a hackerish

timbre, he spelled his surname

without major vowels.

So in July 2005, Master

Splyntr signed up for his rst

crime forum, CarderPortal,

laughing to himself over the

poetry in assuming the name

of an underground rat.

Mularski was soon playing the

carder

forums

like

a

chessboard, drawing on the

NCFTA’s stream of scam data

for his opening moves.

The center was plugged

directly into the antifraud

e orts at banks and e-

commerce sites, so when a new

criminal innovation showed

up, Mularski knew about it. He

posted about the schemes on

CarderPortal, portraying them

as his own inventions. The

experienced crooks marveled at

the

newcomer

who’d

independently reinvented their

newest tricks. And when the

scams

eventually

became

public in the press, the newbies

remembered they’d heard it

first from Master Splyntr.

In the meantime, the FBI

agent was soaking up the

history of the forums while

honing his prose to a ect the

cynical, profanity-laced style of

the underground.

After a few months, Mularski

faced the rst challenge to his

intelligence-gathering

operation. The initial crop of

forums that grew from the

detritus of Shadowcrew had

been wide open to new

members—spooked

by

Operation Firewall, many

scammers had adopted new

handles,

and

without

reputations to trade on there’d

been no way for carders to vet

one another. Now that was

changing. A new breed of

“vouched”

forums

was

emerging. The only way to get

on them was to win the

sponsorship of two existing

members. Constrained by the

Justice

Department’s

guidelines,

Mularski

had

deliberately avoided forming

direct relationships in the

underground. Who would

vouch for him?

Borrowing a page from a

Robert Ludlum novel, Mularski

decided Master Splyntr needed

a background legend that could

propel him into the new crime

boards.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Deep Learning with Python by François Chollet(12609)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7797)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6431)
Kotlin in Action by Dmitry Jemerov(5078)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3887)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3340)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3095)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2880)
The Art Of Deception by Kevin Mitnick(2618)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2397)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2324)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2145)
DarkMarket by Misha Glenny(2089)
Wireless Hacking 101 by Karina Astudillo(2085)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2034)