Data Thieves in Action 2016
DOI: 10.1057/978-1-137-58904-0_4
|View full text |Cite
|
Sign up to set email alerts
|

The Social Organization of Actors in Stolen Data Markets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…While not all the contents and goods posted on these forums are illegal, their origin or use may be. Interacting within these communities can be a stepping stone towards more serious online criminal activities [18,20,21]. For example, following the leak of the Mirai source code, DDoS attacks have used this botnet and its variants [2].…”
Section: Scraping Underground Forumsmentioning
confidence: 99%
See 1 more Smart Citation
“…While not all the contents and goods posted on these forums are illegal, their origin or use may be. Interacting within these communities can be a stepping stone towards more serious online criminal activities [18,20,21]. For example, following the leak of the Mirai source code, DDoS attacks have used this botnet and its variants [2].…”
Section: Scraping Underground Forumsmentioning
confidence: 99%
“…converting bitcoin to PayPal) can be used for money laundering [35]. Other illicit activities include trading online stolen accounts [18], hacking Massively Multiplayer Online (MMO) games for profit [13], or advertising booter services, technically offered as "Service Stress Tools", but which are actually used for DDoS attacks [41].…”
Section: Scraping Underground Forumsmentioning
confidence: 99%
“…Stolen data : including data from credit cards, bank accounts, PayPal accounts, and identity documents (Chu, Holt, & Ahn, 2010; Franklin et al, 2007; Holt & Lampke, 2009; Holt & Smirnova, 2014; Holt, Smirnova, Chua, & Copes, 2015; Honeynet Research Alliance, 2003; Leukfeldt, Kleemans, & Stol, 2017a, 2017b, 2017c; Motoyama et al, 2013; Peretti, 2008; Soudijn & Zegers, 2012; Thomas & Martin, 2006; Wehinger, 2011).…”
Section: Prior Research On Cybercriminal Meeting Placesmentioning
confidence: 99%
“…Cybercriminal tools : including phishing kits, malware, hacking tools, and botnets (Chu et al, 2010; Décary-Hétu & Dupont, 2012; Franklin et al, 2007; Herley & Florencio, 2009; Holt & Lampke, 2009; Holt & Smirnova, 2014; Honeynet Research Alliance, 2003; Leukfeldt, 2014; Leukfeldt et al, 2017a, 2017b; Soudijn & Zegers, 2012; Thomas & Martin, 2006).…”
Section: Prior Research On Cybercriminal Meeting Placesmentioning
confidence: 99%
See 1 more Smart Citation