[Infowarrior] - Cybercrime Supersite 'DarkMarket' Was FBI Sting

Richard Forno rforno at infowarrior.org
Tue Oct 14 11:35:47 UTC 2008


Cybercrime Supersite 'DarkMarket' Was FBI Sting, Documents Confirm
By Kevin Poulsen EmailOctober 13, 2008 | 4:20:08 PMCategories: Crime

http://blog.wired.com/27bstroke6/2008/10/darkmarket-post.html


DarkMarket.ws, an online watering hole for thousands of identify  
thieves, hackers and credit card swindlers, has been secretly run by  
an FBI cybercrime agent for the last two years, until its voluntary  
shutdown earlier this month, according to documents unearthed by a  
German radio network.

Reports from the German national police obtained by the  
Südwestrundfunk, Southwest Germany public radio, blow the lid off the  
long running sting by revealing its role in nabbing a German credit  
card forger active on DarkMarket. The FBI agent is identified in the  
documents as J. Keith Mularski, a senior cybercrime agent based at the  
National Cyber Forensics Training Alliance in Pittsburgh, who ran the  
site under the hacker handle Master Splynter.

The NCFTA is a non-profit information sharing alliance funded by  
financial firms, internet companies and the federal government. It's  
also home to a seven-agent FBI headquarters unit called the Cyber  
Initiative and Resource Fusion Unit, which evidently ran the  
DarkMarket sting.

The FBI didn't return a phone call Monday.

Like earlier crime sites, DarkMarket allowed buyers and sellers of  
stolen identities and credit card data to meet and do business in an  
entrepreneurial, peer-reviewed environment. Products for sale ran the  
gamut from specialized hardware, to electronic banking logins  
collected from phishing attacks, stolen personal data needed to assume  
a consumer's identity ("full infos") and credit card magstripe swipes  
("dumps), which are used to produce counterfeit cards. Vendors were  
encouraged to submit their goods for review before offering them for  
sale.

The unearthed documents, seen by Threat Level, show the FBI sting had  
begun by November, 2006. An FBI memo sent to the German national  
police regarding a forum member in that country boasts, "Currently,  
the FBI has been successful in penetrating the inner 'family' of the  
carding forum, DarkMarket." A March 2007 e-mail from Mularski's FBI  
address to his German counterpart puts it bluntly. "Master Splynter is  
me."

The documents indicate the FBI used DarkMarket to build "intelligence  
briefs" on its members, complete with their internet IP addresses and  
details of their activities on the site. In at least some cases, the  
bureau matched the information with transaction records provided by  
the electronic currency service E-Gold.

Last month, Master Splyntr -- now identified as Mularski -- announced  
he was shuttering the site as of October 4th, citing unwanted  
attention garnered by a fellow administrator, known as Cha0. From his  
home in Turkey, Cha0 had aggressively marketed  a high-quality ATM  
skimmer and PIN pad that fraudsters could covertly affix to certain  
models of cash machines, capturing consumers account numbers and  
secret codes. But he began drawing heat this year after reportedly  
kidnapping and torturing a police informant. He was arrested in Turkey  
last month, where police identified him as one Cagatay Evyapan.

That's why it was time to close DarkMarket, Master Splynter explained,  
in a message that now rings with irony.

"It is apparent that this forum … is attracting too much attention  
from a lot of the world services (agents of FBI, SS, and Interpol). I  
guess it was only time before this would happen. It is very  
unfortunate that we have come to this situation, because ... we have  
established DM as the premier English speaking forum for conducting  
business. Such is life. When you are on top, people try to bring you  
down."

Darkmarket

The German report confirm rumors that have swirled around DarkMarket  
since late 2006, when uber-hacker Max Ray Butler cracked the site's  
server and announced to the underground that he'd caught Master  
Splynter logging in from the NCFTA's office on the banks of the  
Monongahela River. Butler ran a site of his own, and the warning was  
generally dismissed as inter-forum rivalry, even when Butler was  
arrested in San Francisco last year on credit card fraud charges, and  
shipped to Pittsburgh for prosecution.

Until this afternoon, SpamHaus listed Master Splynter as an Eastern  
European spammer named Pavel Kaminski, who was active as recently as  
2005. It's possible the FBI took over the handle sometime thereafter.  
In 2004, the Secret Service ran a similar scheme on the crime board  
ShadowCrew, but that agency used an informant, who went on to commit  
more crimes -- a risk not likely present with agent Mularski.

Lord Cyric, another former DarkMarket administrator, says Master  
Splynter was invited onto DarkMarket as an admin about two years ago,  
and was still known as a spammer. Based in Canada, Lord Cyric has sold  
fake IDs and checks in the underground, but he's convinced he's out of  
reach of any sting operation.

"Worry? Me? Nah," he wrote in an IM interview. "It's a long, slow hard  
process for them to interest Canadian [law enforcement] to go after  
someone who doesn't touch drugs nor deals with skimmers. ... It's all  
about U.S. busts, unless there's a big drug deal and DEA gets involved."

Threat Level admires Lord Cyric's bluster, but thinks his days in the  
underground are numbered.  The FBI almost certainly closed DarkMarket  
in preparation for a global wave of arrests that will unfold in the  
next month or so. The site was likely shuttered to avoid an Agatha  
Christie scenario in which a diminishing pool of cybercrooks are free  
to speculate about why they're disappearing one-by-one like the  
hapless dinner guests in Ten Little Indians.

Kudos to Südwestrundfunk reporter Kai Laufen, who discovered the  
operation. I'm sending him the "I Spotted the Fed" tee-shirt I took  
home from DefCon 7.


More information about the Infowarrior mailing list