Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660321
|View full text |Cite
|
Sign up to set email alerts
|

Dialing Back Abuse on Phone Verified Accounts

Abstract: In the past decade the increase of for-profit cybercrime has given rise to an entire underground ecosystem supporting large-scale abuse, a facet of which encompasses the bulk registration of fraudulent accounts. In this paper, we present a 10 month longitudinal study of the underlying technical and financial capabilities of criminals who register phone verified accounts (PVA). To carry out our study, we purchase 4,695 Google PVA as well as pull a random sample of 300,000 Google PVA that Google disabled for abu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
15
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 15 publications
2
15
0
Order By: Relevance
“…To maximize profits, fraudsters have to share/multiplex different resources (e.g., fake accounts, IP addresses, and device IDs) over multiple frauds. For example, [13] found that many users are associated with a particular group of followers on Twitter; [36] identified that many cases of phone number reuse; [4] observed that the IP addresses of many spam proxies and scam hosts fall into a few uniform ranges; and [38] revealed that fake accounts often conduct fraudulent activities over a short time period.…”
Section: Background 21 Economics Of Fraudstersmentioning
confidence: 99%
“…To maximize profits, fraudsters have to share/multiplex different resources (e.g., fake accounts, IP addresses, and device IDs) over multiple frauds. For example, [13] found that many users are associated with a particular group of followers on Twitter; [36] identified that many cases of phone number reuse; [4] observed that the IP addresses of many spam proxies and scam hosts fall into a few uniform ranges; and [38] revealed that fake accounts often conduct fraudulent activities over a short time period.…”
Section: Background 21 Economics Of Fraudstersmentioning
confidence: 99%
“…We categorize related work into two categories: underground market studies and fraud detection approaches. Underground Markets: Prior works have shown the use of fake accounts for followers in social media [21], phone-verified email accounts [20], Facebook likes [3], etc. These accounts are often used to spread spam [8,7] and misinformation [9,10].…”
Section: Related Workmentioning
confidence: 99%
“…Even though the latest version of Waze app requires SMS verification to register accounts, attackers can use older versions of APIs to create accounts without verification. Alternatively, accounts can be verified through disposable phone/SMS services [44].…”
Section: Factors Limiting Sybil Creationmentioning
confidence: 99%