{"id":22483,"date":"2023-07-17T05:30:05","date_gmt":"2023-07-17T13:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/07\/17\/news-16213\/"},"modified":"2023-07-17T05:30:05","modified_gmt":"2023-07-17T13:30:05","slug":"news-16213","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/17\/news-16213\/","title":{"rendered":"Identity theft in 1915 | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/07\/17092420\/les-vampires-1915-identity-Featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Roman Dedenok| Date: Mon, 17 Jul 2023 13:29:00 +0000<\/strong><\/p>\n<p>Cyberthreat researchers have of late been sounding the alarm about the rising danger of deepfakes. In particular, they <a href=\"https:\/\/www.kaspersky.com\/blog\/audio-deepfake-technology\/48586\/\" target=\"_blank\" rel=\"noopener\">advise<\/a> to not trust your ears: in the digital age of artificial intelligence the voice at the other end of the line may not belong to whom you think. Speaking of which, any guesses what people were afraid of more than a hundred years ago? In that mechanical age of scientific discovery, they were wary of, yes \u2014 trusting their ears. After all, the voice at the other end of the line \u2014 was it really whom they thought? Don&#8217;t believe it? Then just take a look at a case of identity theft using then-sophisticated technology to steal money from a bank account depicted in a film shot back in 1915! Welcome to the world of the French silent movie series <a href=\"https:\/\/en.wikipedia.org\/wiki\/Les_Vampires\" target=\"_blank\" rel=\"nofollow noopener\">Les Vampires<\/a>.<\/p>\n<h2>Les Vampires<\/h2>\n<p>A quick spoiler: anyone looking for supernatural blood-sucking monsters will be disappointed. The main character, journalist Philippe Gu\u00e9rande, confronts a daring criminal gang that calls itself the Vampires. Despite its venerable age, the film has a lot to offer in terms of information security. Take just the first scene, which illustrates why outsider access to work documents is a no-no.<\/p>\n<p>The Vampires themselves are of interest for their use of what were then hi-tech methods. A large chunk of episode three (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Les_Vampires#Episode_3_%E2%80%93_%22The_Red_Codebook%22\" target=\"_blank\" rel=\"nofollow noopener\">The Red Codebook<\/a>) is given over to cryptanalysis: Gu\u00e9rande looks for patterns in the villains&#8217; encrypted notes. And episode 7 (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Les_Vampires#Episode_7_%E2%80%93_%22Satanas%22\" target=\"_blank\" rel=\"nofollow noopener\">Satanas<\/a>) is built around an attempt to copy another&#8217;s identity. But how does anyone pull off identity theft armed only with early 20<sup>th<\/sup>-century tech?<\/p>\n<h2>Identity theft in 1915<\/h2>\n<p>In a nutshell, the criminal scheme goes as follows. The Vampires learn that US tycoon George Baldwin is on a trip to Paris, where they decide to relieve him of some of his money. To do so, they devise a multistage attack. First, they arrange for the millionaire to be interviewed by one of their own, Lily Flower, posing as a journalist for <em>Modern Woman<\/em> magazine. She tells Baldwin that her magazine publishes a celebrity quote every month, and asks him to write a few words in a notebook, then date and sign them.<\/p>\n<p>Next, a saleswoman claiming to be from the Universal Phonograph Company visits the millionaire with a new piece of tech wizardry: an actual phonograph \u2014 the first device for recording and reproducing sound. She explains to Baldwin that it&#8217;s her company&#8217;s policy to record the voices of famous people visiting Paris. Falling for the ruse, he dictates the only phrase he can pronounce in French: &#8220;Parisian women are the most charming I&#8217;ve ever seen,&#8221; adding &#8220;All right!&#8221; in English at the end.<\/p>\n<p>The full nature of the scam is then revealed to the viewer. The purpose of the first stage was, of course, to steal the tycoon&#8217;s signature. Under the sheet on which Baldwin left his autograph was some sort of carbon paper, which duly captured the signature and date. Above this, the criminals write out a fake order obliging New American Bank to pay Lily (the journalist) the sum of US$100\u00a0000 (a princely sum today; imagine its value a century ago!).<\/p>\n<p>Next, they kidnap the telephone operator of Baldwin&#8217;s hotel, and send another accomplice in her place with a note: &#8220;I&#8217;m sick, sending my cousin as a replacement.&#8221; The hotel management swallows this primitive trick and puts the total stranger in charge of the phone.<\/p>\n<p>Meanwhile, Lily goes to the bank with the fake payment order. The cashier decides to check the legitimacy of the transaction and calls the hotel where Baldwin is staying. There, the bogus telephone operator plays the recording of the millionaire uttering his catchphrase, which convinces the cashier to pay out.<\/p>\n<h2>How feasible is this scheme?<\/h2>\n<p>Most of it is utter twaddle, of course. How on earth would a Parisian cashier at a U.S. bank in 1915 know the signature, let alone the voice, of some American millionaire? Not to mention the fact that the phone lines back then would likely have distorted that voice beyond recognition. That said, the scheme itself is a classic implementation of a man-in-the-middle (MitM) attack \u2014 the cashier is sure the voice belonged to Baldwin, who in turn thinks that he, earlier, provided it to the &#8220;phonograph company&#8221;.<\/p>\n<p>What&#8217;s more, the movie features a 2FA bypass: signature theft and fake voice confirmation. Sure, all this is now done using digital technologies, but the core attack scenario remains the same. As such, the main countermeasures could have been formulated over a century ago:<\/p>\n<ul>\n<li>Don&#8217;t give outsiders access to communication channels (bogus telephone operator).<\/li>\n<li>Do not share confidential personal data with anyone \u2014 ever (signature and voice biometrics).<\/li>\n<li>If in doubt, carefully double-check the legitimacy of the instruction (the phrase &#8220;Parisian women are the most charming I&#8217;ve ever seen&#8221; is not the most cast-iron verification).<\/li>\n<\/ul>\n<p>Today, you can check out this wonderful movie series for yourself on <a href=\"https:\/\/en.wikipedia.org\/wiki\/Les_Vampires\" target=\"_blank\" rel=\"nofollow noopener\">Wikipedia<\/a>. If, however, your employees aren&#8217;t ready to take cybersecurity tips from silent cinema, we recommend using our interactive <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\"> Kaspersky Automated Security Awareness Platform<\/a> instead.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/les-vampires-1915-identity\/48643\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/07\/17092420\/les-vampires-1915-identity-Featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Roman Dedenok| Date: Mon, 17 Jul 2023 13:29:00 +0000<\/strong><\/p>\n<p>Identity theft in the 1915 movie serial Les Vampires: MitM, bypassing 2FA, social engineering<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[1001,3090,12177,3921,16785,1439,12321,21096],"class_list":["post-22483","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-business","tag-cinema","tag-enterprise","tag-identity-theft","tag-mitm","tag-movies","tag-smb","tag-truth"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22483"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22483\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22483"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}