The World Wide Web Conference 2019
DOI: 10.1145/3308558.3313489
|View full text |Cite
|
Sign up to set email alerts
|

Hack for Hire: Exploring the Emerging Market for Account Hijacking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Our study of the fraud market for Google services is related to other exploration of fraud markets [55,[74][75][76]. For instance, Dou et al [37] developed a honeypot app and collect data to detect fraudulent bot-generated downloads.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Our study of the fraud market for Google services is related to other exploration of fraud markets [55,[74][75][76]. For instance, Dou et al [37] developed a honeypot app and collect data to detect fraudulent bot-generated downloads.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, Dou et al [37] developed a honeypot app and collect data to detect fraudulent bot-generated downloads. Mirian et al [55] explore the market for Gmail account hijacking by creating synthetic but realistic victim personas and hiring services to hack into such accounts, while DeBlasio et al [36] characterize the search engine fraud ecosystem using ground truth data internal to the Bing search engine. Stringhini et al [74] studied Twitter follower markets by purchasing followers from different merchants and used such ground truth to discover patterns and detect market-controlled accounts in the wild.…”
Section: Related Workmentioning
confidence: 99%
“…Microsoft have been promoting password-less authentication both for business (Windows Hello for Business [23]) and other users (Microsoft Authenticator App [24]) and these can work well in a Microsoft environment. Instead of promoting 2FA based on text messages and one-time passwords, or proprietary solutions, in this paper we discuss how a greater emphasis should be placed on password-less solutions using public key cryptography, which offer far better levels of security (thwarting phishing attacks [26]), usability and reduced management costs [37].…”
Section: Adoption Of Password-less Authenticationmentioning
confidence: 99%
“…I share our key findings here, but more details can be found in the full article. 10 Email lures and phishing. All of the attacks started with an email lure to the victim account.…”
Section: Hack-for-hire Playbookmentioning
confidence: 99%