[liberationtech] Resume sharing, mitigation of risks

Frank Corrigan email at franciscorrigan.com
Fri Nov 12 13:34:12 PST 2010


I am doing a bit of unpaid work on the risks associated with sharing
Resumes online. (known as CVs / Curriculum Vitae in the UK) Such as data
breaches, how to anonymize a Resume, how to prevent phishing attacks and
ID theft via the data gleaned from CVs.

I have done some internet focused research and wanted to ask if anyone
knows of any recommended resources on this topic, due to global
austerity Resume/CV seeking websites are popping up faster than ever and
it could be timely to develop or sign post to handy resources.

Does anyone consider it of any use to have a confidentially/data
protection clause on Resumes?

Thanks in advance.

Frank


----- Original message -----
From: "Masashi Nishihata" <masashi at kmdi.utoronto.ca>
To: liberationtech at mailman.stanford.edu
Date: Fri, 12 Nov 2010 16:17:54 -0500
Subject: [liberationtech] For Immediate Release: IWM Releases Report on
Koobface.

For Immediate Public Release

November 12, 2010

The Information Warfare Monitor http://www.infowar-monitor.net  
(Citizen Lab, Munk School of Global Affairs, University of Toronto and  
the SecDev Group, Ottawa) announce the release of Koobface: Inside a  
Crimeware Network by Nart Villeneuve, with a foreword by Ron Deibert  
and Rafal Rohozinski.

This report documents the inner workings of Koobface—a botnet that  
spreads by compromising the computers of social networking platforms  
and users and placing them under the control of the botnet operators  
for the purpose of monetization.

The full report can be accessed here
(http://www.infowar-monitor.net/koobface 
)

Globe and Mail coverage on the report can be accessed here.
(http://www.theglobeandmail.com/news/national/time-to-lead/internet/ 
)

For press inquiries, please e-mail: info at infowar-monitor.net

Overview

Between April and November 2010, the Information Warfare Monitor  
conducted an investigation into the operations and monetization  
strategies of the Koobface botnet. The researchers discovered archived  
copies of Koobface’s infrastructure on a well-known Koobface command  
and control server. The data revealed a wealth of information about  
the inner workings of the botnet, including information on the  
malware, code, and database used to maintain the botnet as well as its  
monetization strategies. With this data, the Information Warfare  
Monitor was able to gain an in-depth understanding of how Koobface  
worked.

Koobface: Inside a Crimeware Network details Koobface’s propagation  
strategies, counter-security measures, and business model. The report  
contributes to the cybercrime literature by shedding light on the  
malware ecosystem that enables and sustains cybercriminal activity,  
and by demonstrating that it is possible to leverage the mistakes made  
by cybercriminals in order to better understand the scope of their  
operations.

Main Findings:

Koobface relies on a network of compromised servers that are used to  
relay connections from compromised computers to the Koobface command  
and control server. This creates a complex and tiered command and  
control infrastructure.

Koobface maintains a system that uses social networking platforms,  
such as Facebook, to send malicious links. Social networking platforms  
allow Koobface to exploit the trust that humans have in one another in  
order to trick users into installing malware and engaging in click  
fraud.

Koobface exists within a crime-friendly malware ecosystem that  
consists of buyers and sellers of the tools and infrastructure  
required to maintain a botnet. Koobface operators rely on  
relationships with other botnet operators and cybercriminals to  
sustain their operations.

The operators of Koobface have been able to successfully monetize  
their operations. Through the use of pay-per-click and pay-per-install  
affiliate programs and forcing compromised computers to install  
malicious software and engage in click fraud, the Koobface operators  
earned over US$2 million between June 2009 and June 2010.

The operators of Koobface are employing technical countermeasures to  
ensure that the operations of the botnet remain undisrupted. The  
operators regularly monitor their malicious links to ensure that they  
have not been flagged as malicious.

Botnet operators benefit from the fact that their criminal acts spread  
across multiple jurisdictions. Issues of overlapping jurisdictions and  
international politics often complicate investigations and hinder law  
enforcement and takedown efforts. Furthermore, cross-border  
investigations are at times hampered by a lack of priority and  
willingness to respond. This is because criminal activity in any one  
jurisdiction appears minimal, while in fact the sum of Koobface’s  
criminal activities is significant.

About the Information Warfare Monitor

The Information Warfare Monitor is a public-private venture between  
two Canadian institutions: the Citizen Lab at the Munk School of  
Global Affairs, University of Toronto and the SecDev Group, an  
operational think tank based in a Ottawa (Canada). The Information  
Warfare Monitor is an advanced research activity tracking the  
emergence of cyberspace as a strategic domain. We are an independent  
research effort. Our mission is to build and broaden the evidence base  
available to scholars, policy makers, and others. We aim to educate  
and inform. The research of the Citizen Lab and the Information  
Warfare Monitor is supported by the Canada Centre for Global Security  
Studies (University of Toronto), a generous grant from the John D. and  
Catherine T. MacArthur Foundation, in-kind and staff contributions  
from the SecDev Group, and a generous donation of software from  
Palantir Technologies Inc.
_______________________________________________
liberationtech mailing list
liberationtech at lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click "yes" (once you click
above) next to "would you like to receive list mail batched in a daily
digest?"

You will need the user name and password you receive from the list
moderator in monthly reminders.

Should you need immediate assistance, please contact the list moderator.




More information about the liberationtech mailing list