2013
DOI: 10.1016/j.ijcip.2013.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Crimeware-as-a-service—A survey of commoditized crimeware in the underground market

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
52
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(54 citation statements)
references
References 16 publications
1
52
0
1
Order By: Relevance
“…Again, the amount of harm depends on the importance of the victimised computer. However, criminals can use and resell the electricity and network connection of any computer, to either hide more sinister attacks or rent as infrastructure for less technologically capable criminals (Sood and Enbody 2013). Thus, it is important to prevent vulnerabilities such as memory management errors in all computers.…”
Section: Solving a Hard Problemmentioning
confidence: 99%
“…Again, the amount of harm depends on the importance of the victimised computer. However, criminals can use and resell the electricity and network connection of any computer, to either hide more sinister attacks or rent as infrastructure for less technologically capable criminals (Sood and Enbody 2013). Thus, it is important to prevent vulnerabilities such as memory management errors in all computers.…”
Section: Solving a Hard Problemmentioning
confidence: 99%
“…Thus, the regional stability of the cyber-infrastructure is based on the stability of the economic and political relations. The struggling mechanisms at this level should be formed by the international organizations, states, ICT-related stakeholders and others, and should guarantee the management of fighting any global intervention [10,11].…”
Section: Global Fighting Initiativesmentioning
confidence: 99%
“…Furthermore, Kraemer-Mbula et al (2013) have shown the ongoing globalisation based on a growing digital ecosystem, in cybercrime and underground markets, using credit card fraud and identity theft as exemplary cases. Moreover, Sood and Enbody (2013) introduced the model of crimeware-as-a-service, describing and analysing multiple forms of criminal services purchasable on underground markets. These underground markets thus have a vast supply of specific parts of the malware ecosystem (Sood and Enbody 2013).…”
Section: Theoretical Background Economics and Crime Analysismentioning
confidence: 99%
“…Moreover, Sood and Enbody (2013) introduced the model of crimeware-as-a-service, describing and analysing multiple forms of criminal services purchasable on underground markets. These underground markets thus have a vast supply of specific parts of the malware ecosystem (Sood and Enbody 2013). Matched with a continuous demand for these parts to set up a financial malware scheme, this creates an extraordinary (criminal) market structure.…”
Section: Theoretical Background Economics and Crime Analysismentioning
confidence: 99%