2013 APWG eCrime Researchers Summit 2013
DOI: 10.1109/ecrs.2013.6805781
|View full text |Cite
|
Sign up to set email alerts
|

An exploration of the factors affecting the advertised price for stolen data

Abstract: A growing body of research has developed exploring the ways that data thieves dispose of information acquired through phishing, hacking, and mass data breaches. These studies suggest a range of products are sold in forums and IRC channels at a fraction of its true value. There is also substantial risk for participants as they may be cheated by vendors who may not deliver products or simply provide invalid data. These conditions have led researchers to question the nature of the market, in that the actual price… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
38
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 19 publications
(39 citation statements)
references
References 15 publications
1
38
0
Order By: Relevance
“…Thus, future research should consider both the embeddedness of individuals within the market, as well as market-level variables such as the type of good or service provided by a seller, product price and quality (Décary-Hétu & Leppänen, 2016;Holt et al, 2013Holt et al, , 2017. Similarly, there is a need to include other trust-creating mechanisms such as sample requests in statistical models to better understand the role of second-and third-party trust-creating mechanisms in online markets (see Herley & Florêncio, 2010;Holt et al, 2013). Such research can improve our understanding of the practices of illicit online actors relative to traditional economic models of market behavior.…”
Section: Discussionmentioning
confidence: 99%
“…Thus, future research should consider both the embeddedness of individuals within the market, as well as market-level variables such as the type of good or service provided by a seller, product price and quality (Décary-Hétu & Leppänen, 2016;Holt et al, 2013Holt et al, , 2017. Similarly, there is a need to include other trust-creating mechanisms such as sample requests in statistical models to better understand the role of second-and third-party trust-creating mechanisms in online markets (see Herley & Florêncio, 2010;Holt et al, 2013). Such research can improve our understanding of the practices of illicit online actors relative to traditional economic models of market behavior.…”
Section: Discussionmentioning
confidence: 99%
“…Risk attributes coded specifically relating to platforms were measures aimed at anonymization and preventing rip-offs (Yip, Webber, and Shadbolt 2013). As for posts, to minimise distrust or suspicion, suppliers could state in their posts that they provide customer services, such as replacements for invalid credentials (Holt, Chua, and Smirnova 2013). If potential hijackers would receive invalid credentials, they would not risk having paid for credentials that do not work.…”
Section: Conceptualisation and Coding Schemementioning
confidence: 99%
“…Coding risk attributes was, similar to coding additional information on accounts and account holders, largely a bottom-up process. While reading, we noted customer services such as customer service lines and free replacements (Holt, Chua, and Smirnova 2013). These services are aimed at improving customer satisfaction and could, therefore, affect the perceived risk of doing a transaction.…”
Section: Risksmentioning
confidence: 99%
“…Advertised prices for stolen data may depend on the quantity of items to be purchased, the rarity of the items, the country of origin, the type of data, and further specifics (Holt et al , 2013, Holt & Lampke, 2010). The advertised price may not reflect the final price paid, as sellers offer discounts in order to attract customers and build trust within the market (Herley & Florêncio, 2010, Holt & Lampke, 2010.…”
Section: Online Black Marketsmentioning
confidence: 99%