Digital Laundry: how credit card thieves use free-to-play apps to launder their ill-gotten gains"If you have ever played a free-to-play game you know that most of them require resources of one type or another to play. Whether it be gems, gold, power ups, or other, these resources are required to advance within the game, making them critical to the game play. Manually gathering the free resources is a slow process and one can play a game for months working to move up levels.
This is where the game makers make their money. They sell resources through “In-App Purchases” to help people play the game and speed up the game play. The lure of speeding up your play is a strong incentive to spend money on resources, and many spend to play. This has turned free-to-play games into a multi-billion dollar industry.
The resources even maintain value after purchase, because in many cases, once bought, they can be traded, adding to the game play. The game itself can also be transferred from one account to another. Because of this, resources gathered or bought and games built to advanced levels can also be resold. It is the selling of these on third party markets that holds the door open to the illicit activity that we found taking place.
Alexander Kernishniuk, Communications director, Kromtech:
"Money laundering through the Apple AppStore or Google Play isn’t a new idea and has been done before. In the 2011 the Danish part of the Apple App Store was flooded with expensive suspicious applications. More than 20 out of 25 of the most downloaded applications were from China. The price of the apps ranged from $50-$100. For example, one of them “LettersTeach”, was intended for children who are learning English letters, yet it cost nearly $78. This pointed to money laundering then, however, what we encountered now is much more sophisticated.What did we find?
Following our MongoDB investigations and honey pots deployments from the beginning of this year, we did another round of security audit of unprotected MongoDB instances. In June 2018 we have spotted a strange database publicly exposed to the public internet (no password / login required) along with a large number of credit card numbers and personal information inside.
As we examined the database we rapidly became aware that this was not your ordinary corporate database, this database appeared to belong to credit card thieves (commonly known as carders) and that it was relatively new, only a few months old. So we dug much deeper.
It appeared to be a group of malicious actors with a complex automated system utilizing free-to-play apps, third party game and resource resale websites, and Facebook to launder money from stolen credit cards.In one of the tables we found links to Facebook accounts. From those accounts we found links to a Facebook page in Vietnamese advertising a special “tool” , which was also only a few months old.
We have detailed the evidence of this active, automated system in a report sent to DOJ. According to our estimation, system processed approximately 20,000 stolen credit cards in just 1.5 months (from the end of April 2018 to mid June 2018).(More detailed information @ source)
https://kromtech.com/blog/security-center/digital-laundry ....
I think this illustrates the de facto methodology criminals utilize to launder money.
Terrorists, criminals and drug cartels do not commonly use bitcoin to launder money, as far as I know. Instead they use facebook and the apple store.
This is nothing new. I remember reading many news stories like this one over the last 5-10 years which do not receive much publicity. Creating a fake app and "purchasing/selling" it is the most common and heavily utilized method to launder funds over the internet. This method is much less transparent and difficult to trace than utilizing a crypto currency like bitcoin.