Data Thieves in Action 2016
DOI: 10.1057/978-1-137-58904-0_2
|View full text |Cite
|
Sign up to set email alerts
|

The Marketing and Sales of Stolen Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Most criminological research into stolen data so far has focused on stolen financial data, such as credit card information (e.g., Chua 2016a and2016b). However, account credentials apply to a wide range of different types of accounts instead of only financial accounts.…”
Section: Introductionmentioning
confidence: 99%
“…Most criminological research into stolen data so far has focused on stolen financial data, such as credit card information (e.g., Chua 2016a and2016b). However, account credentials apply to a wide range of different types of accounts instead of only financial accounts.…”
Section: Introductionmentioning
confidence: 99%
“…These studies illustrate the critical role and impact online payment platforms have in the completion of illicit economic exchanges through online markets. Research has documented the unique transitions observed in payment platforms used by cybercriminals over time (Holt et al, 2016; Kruisbergen et al, 2019; Trautman, 2014). Digital currency platforms such as e-gold were initially serviced in the mid-2000s by individuals who sought to open payment accounts and convert traditional currencies into separately valued currency (Holt et al, 2016).…”
mentioning
confidence: 99%
“…Research has documented the unique transitions observed in payment platforms used by cybercriminals over time (Holt et al, 2016; Kruisbergen et al, 2019; Trautman, 2014). Digital currency platforms such as e-gold were initially serviced in the mid-2000s by individuals who sought to open payment accounts and convert traditional currencies into separately valued currency (Holt et al, 2016). This system was eventually supplanted by other platforms such as Liberty Reserve and WebMoney, which were frequently serviced by hackers and other cybercriminals (Holt & Lampke, 2010; Hutchings & Holt, 2015; Trautman, 2014).…”
mentioning
confidence: 99%
“…In the internet age, organizations regularly solicit, process, retain, and analyze data related to financial transactions, communications, personnel, clients, and the like (Newman & Clarke, 2003; Yar & Steinmetz, 2019). While some data retained by organizations is mundane, much can be considered “sensitive”—that it can be abused in the wrong hands—including financial data and personal identifying information (PII) (Hinduja & Kooi, 2013; Holt et al, 2016). Organizations have thus become prime targets for illicit hackers and other unscrupulous actors interested in accessing and abusing sensitive information and computer systems (Holt et al, 2016; Khey & Sainato, 2013; Verizon, 2021).…”
mentioning
confidence: 99%