{"id":11616,"date":"2016-03-21T09:00:05","date_gmt":"2016-03-21T13:00:05","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=11616"},"modified":"2019-11-15T22:54:24","modified_gmt":"2019-11-15T11:54:24","slug":"opgelicht-cooperation","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/opgelicht-cooperation\/11616\/","title":{"rendered":"Real cybercrime fighting on the small screen"},"content":{"rendered":"<p>A few months ago, we were approached by the Dutch TV show Opgelicht?!, which discusses various types of fraud. One of the subjects discussed was the \u201cWe-Cycle\u201d phishing campaign where they asked us to comment on the phishing scheme. Naturally we agreed because we find it important to warn people about the danger of phishing, to educate them on how they can recognize it and what they should do to protect themselves.<\/p>\n<h3>The phishing scheme<\/h3>\n<p>The scheme is quite simple: a potential victim receives a typical phishing e-mail that states that a new debit card will be issued and the old one has to be returned to the bank. There are two options for this. The first is to go to the bank and give back the card, but this will cost you 22 euro; normally this doesn\u2019t happen, but this was something that tripped up some of the targets.<\/p>\n<p>The second option is to click on the link \u2014 which is naturally a phishing link \u2014 fill in a lot of information including the PIN code of the debit card, and send the debit card by mail to the address indicated on the phishing website. The good thing is, as the e-mail stated, this option wouldn\u2019t cost any money!<\/p>\n<p>After the victim sent their debit card in an envelope to the address, the fraudsters were literally just waiting for the mail to arrive. Once the post arrived the criminals literally fished the envelopes with the debit cards inside out of the mailboxes that they had indicated on the website. These criminals did not use post boxes registered for their names, but rather some random boxes they could access easily. They now had all the information to go to the ATM and steal the money from the victims.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">10 Tips to protect yourself from <a href=\"https:\/\/twitter.com\/hashtag\/Phishing?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Phishing<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/ITEducation?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ITEducation<\/a> <a href=\"https:\/\/t.co\/gg888NWSmQ\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/gg888NWSmQ<\/a> <a href=\"https:\/\/t.co\/XxPwFLz8bf\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/XxPwFLz8bf<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/665208665125842944?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 13, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Public private partnership<\/h3>\n<p>Luckily for the victims and potential victims, there is Opgelicht?! TV show (the name can be translated as Scammed?!). Show creators see it as their duty to inform people of various fraud techniques and this particular phishing scheme attracted their attention. The producers contacted Kaspersky Lab and asked for commentary. Obviously, we were glad to help them.<\/p>\n<p>After the episode aired and after seeing my comments on the TV, the fraudsters changed their phishing scheme so that part of the tips that I gave on how to recognize a phishing e-mail, did not work anymore.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">6 habits that up your odds of credit card fraud <a href=\"http:\/\/t.co\/afq0qVUJiO\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/afq0qVUJiO<\/a> via <a href=\"https:\/\/twitter.com\/Bankrate?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Bankrate<\/a> <a href=\"http:\/\/t.co\/ZFyAPfkioY\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/ZFyAPfkioY<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/532149548115066881?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 11, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>So Opgelicht?! decided to take one step further: They went to the addresses where the debit cards were sent to and started filming. Of course they hid themselves so the fraudsters wouldn\u2019t see them and in one case they even hung a Go-Pro camera in a tree. They were lucky enough to catch the criminals on camera and then they aired this footage on TV.<\/p>\n<p>The next step was to warn potential victims again on the updated phishing scheme, so they asked me again to give comments, considering changes in fraudsters\u2019 scheme.<\/p>\n<h3>Cyber bullying<\/h3>\n<p>As you can guess, the fraudsters were not happy with our anti-fraud campaign. In order to get rid of their frustrations they tried to defile me. They registered a domain name containing my name and some nasty words. Of course, I was offended and somewhat worried that some people could draw the wrong conclusions. Some might say that I\u2019m involved in the phishing scheme because the domain is registered on my name, which is clearly nonsense.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Bank?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Bank<\/a> cards: hidden risks. <a href=\"https:\/\/t.co\/6XuStklmOU\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/6XuStklmOU<\/a>  <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/onlinepayments?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#onlinepayments<\/a> <a href=\"http:\/\/t.co\/RiR9nYDd38\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/RiR9nYDd38<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/568214689072746496?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>On the other hand, this was a sign that the tips I gave were useful. Not quite sure how to handle this situation we contacted Opgelicht?! creators who already were in touch with police and proposed to file a report which would be added to the case that the police were investigating.<\/p>\n<h3>The results<\/h3>\n<p>The police are still busy with their investigation and recently <a href=\"http:\/\/www.telegraaf.nl\/dft\/nieuws_dft\/25223440\/__nu_al_minder_phishing__.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">arrested 4 people from Amsterdam<\/a>, aged between 21 and 25. In total the gang was able to steal 1.8 million euro\u2019s from 650 victims in the Netherlands. We are really happy to see that a public private partnership does work well and together we are able to fight crime.<\/p>\n<p>In this case, it was a cooperation of law enforcement, private IT security company and TV journalists \u2014 by working closely and having the same goal in mind we investigated this fraud scheme, helped to keep off potential victims, and finally the police were able to arrest the suspects and prevent further damage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What happens when real cyber experts head to TV to stop cybercrime?<\/p>\n","protected":false},"author":423,"featured_media":11617,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2646],"tags":[94,1497,605,1496,76,726],"class_list":{"0":"post-11616","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-crime","10":"tag-crimefighting","11":"tag-great","12":"tag-opgelicht","13":"tag-phishing","14":"tag-scam"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/opgelicht-cooperation\/11616\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/opgelicht-cooperation\/6891\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/opgelicht-cooperation\/6939\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/opgelicht-cooperation\/6859\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/opgelicht-cooperation\/7975\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/opgelicht-cooperation\/7761\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/opgelicht-cooperation\/11317\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/opgelicht-cooperation\/11616\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/opgelicht-cooperation\/7243\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/opgelicht-cooperation\/10789\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/opgelicht-cooperation\/11317\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/opgelicht-cooperation\/11616\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/crime\/","name":"crime"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/423"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=11616"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11616\/revisions"}],"predecessor-version":[{"id":24591,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/11616\/revisions\/24591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/11617"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=11616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=11616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=11616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}