Living in a Spamster's Paradise: Deceit and Threats in Phishing Emails

Kristjan Kikerpill, A. Siibak
{"title":"Living in a Spamster's Paradise: Deceit and Threats in Phishing Emails","authors":"Kristjan Kikerpill, A. Siibak","doi":"10.5817/MUJLT2019-1-3","DOIUrl":null,"url":null,"abstract":"The prevalence of using email as a communication tool for personal and professional purposes makes it a significant attack vector for cybercriminals. Consensus exists that phishing, i.e. use of socially engineered messages to convince recipients into performing actions that benefit the sender, is widespread as a negative phenomenon. However, little is known about its true extent from a criminal law perspective. Similar to how the treatment of phishing in a generic manner does not adequately inform the relevant law, a case-by-case legal analysis of seemingly independent offences would not reveal the true scale and extent of phishing as a social phenomenon. The current research addresses this significant gap in the literature. To study this issue, a qualitative text analysis was performed on (N=42) emails collected over a 30-day period from two email accounts. Secondly, the phishing emails were analysed from an Estonian criminal law perspective. The legal analysis shows that in the period of only one month, the accounts received what amounts to 3 instances of extortion, 29 fraud attempts and 10 cases of personal data processing related misdemeanour offences.","PeriodicalId":38294,"journal":{"name":"Masaryk University Journal of Law and Technology","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Masaryk University Journal of Law and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5817/MUJLT2019-1-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

The prevalence of using email as a communication tool for personal and professional purposes makes it a significant attack vector for cybercriminals. Consensus exists that phishing, i.e. use of socially engineered messages to convince recipients into performing actions that benefit the sender, is widespread as a negative phenomenon. However, little is known about its true extent from a criminal law perspective. Similar to how the treatment of phishing in a generic manner does not adequately inform the relevant law, a case-by-case legal analysis of seemingly independent offences would not reveal the true scale and extent of phishing as a social phenomenon. The current research addresses this significant gap in the literature. To study this issue, a qualitative text analysis was performed on (N=42) emails collected over a 30-day period from two email accounts. Secondly, the phishing emails were analysed from an Estonian criminal law perspective. The legal analysis shows that in the period of only one month, the accounts received what amounts to 3 instances of extortion, 29 fraud attempts and 10 cases of personal data processing related misdemeanour offences.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
生活在垃圾邮件发送者的天堂:网络钓鱼邮件中的欺骗和威胁
使用电子邮件作为个人和专业目的的通信工具的流行使其成为网络罪犯的重要攻击媒介。网络钓鱼是一种普遍存在的负面现象,即利用社会工程信息来说服收件人采取有利于发件人的行动。然而,从刑法的角度来看,其真实程度却鲜为人知。就像笼统地对待网络钓鱼并不能充分告知相关法律一样,对看似独立的违法行为进行个案法律分析也无法揭示网络钓鱼作为一种社会现象的真正规模和程度。目前的研究解决了这一文献中的重大空白。为了研究这个问题,我们对从两个电子邮件帐户收集的30天内的(N=42)封电子邮件进行了定性文本分析。其次,从爱沙尼亚刑法的角度对网络钓鱼邮件进行分析。法律分析显示,在短短一个月的时间内,这些账户收到了3起勒索案件、29起欺诈企图和10起与个人资料处理有关的轻罪案件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
1.00
自引率
0.00%
发文量
9
期刊最新文献
Addressing Evolving Digital Piracy Through Contributory Liability for Copyright Infringement: The Mobdro Case Study (Un)lock and (Un)loaded: Regulating 3D-Printed Firearms in the Open-source Era after the 2013 Hysteria Patent-Eligible Invention Requirement Under the European Patent Convention and its Implications on Creations Involving Artificial Intelligence Cybersecurity: Notorious, but Often Misused and Confused Terms How the Two Child Abuse Cases Helped to Shape the Test of Originality of Photographic Works
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1