首页 > 最新文献

2021 APWG Symposium on Electronic Crime Research (eCrime)最新文献

英文 中文
Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices 走出黑暗:执法行动对加密货币市场价格的影响
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738787
S. Abramova, Rainer Böhme
The susceptibility of cryptocurrencies to criminal activity is a vigorously debated issue of high policy relevance. Not only the share of cryptocurrency turnover linked to crime is unknown, also the question which of several cryptocurrencies are prevalent on the darknet, and hence should be prioritized in building analytical capability for law enforcement, calls for empirical research. Using the event study methodology, we estimate the market reaction on cryptocurrency exchanges to news about successful law enforcement actions of systemic relevance for the cybercriminal ecosystem. The events studied include seizures of darknet marketplaces and shutdowns of cybercriminal data centers and mixers. Although the number of relevant events is still small, we observe significant cumulative abnormal returns to such news over the past years. We cautiously interpret the obtained results by cryptocurrency and direction of the effect, and derive implications for future research and policy.
加密货币对犯罪活动的敏感性是一个备受争议的高度政策相关性问题。不仅与犯罪有关的加密货币营业额的份额是未知的,而且在暗网上流行的几种加密货币中,哪种加密货币应该优先考虑,因此应该优先考虑建立执法分析能力的问题,需要进行实证研究。使用事件研究方法,我们估计了加密货币交易所对与网络犯罪生态系统相关的成功执法行动的新闻的市场反应。研究的事件包括查封暗网市场,关闭网络犯罪数据中心和混合器。虽然相关事件的数量仍然很少,但我们观察到这些新闻在过去几年中累积了显著的异常回报。我们通过加密货币和效应的方向谨慎地解释所获得的结果,并得出对未来研究和政策的影响。
{"title":"Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices","authors":"S. Abramova, Rainer Böhme","doi":"10.1109/eCrime54498.2021.9738787","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738787","url":null,"abstract":"The susceptibility of cryptocurrencies to criminal activity is a vigorously debated issue of high policy relevance. Not only the share of cryptocurrency turnover linked to crime is unknown, also the question which of several cryptocurrencies are prevalent on the darknet, and hence should be prioritized in building analytical capability for law enforcement, calls for empirical research. Using the event study methodology, we estimate the market reaction on cryptocurrency exchanges to news about successful law enforcement actions of systemic relevance for the cybercriminal ecosystem. The events studied include seizures of darknet marketplaces and shutdowns of cybercriminal data centers and mixers. Although the number of relevant events is still small, we observe significant cumulative abnormal returns to such news over the past years. We cautiously interpret the obtained results by cryptocurrency and direction of the effect, and derive implications for future research and policy.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States 美国移动运营商号码回收的安全和隐私风险
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738792
Kevin Lee, Arvind Narayanan
We examined the security and privacy risks of phone number recycling in the United States. We sampled 259 phone numbers available to new subscribers at two major carriers, and found that 171 of them were tied to existing accounts at popular websites, potentially allowing those accounts to be hijacked. Additionally, a majority of available numbers led to hits on people search services, which provide personally identifiable information on previous owners. Furthermore, a significant fraction (100 of 259) of the numbers were linked to leaked login credentials on the web, which could enable account hijackings that defeat SMS-based multi-factor authentication. We also found design weaknesses in carriers’ online interfaces and number recycling policies that could facilitate attacks involving number recycling. We close by recommending steps carriers, websites, and subscribers can take to reduce risk.
我们调查了美国电话号码回收的安全和隐私风险。我们对两家主要运营商的259个新用户可用的电话号码进行了抽样调查,发现其中171个与热门网站上的现有账户相关联,这些账户可能会被劫持。此外,大多数可用的号码都导致了对人物搜索服务的点击,该服务提供了以前车主的个人身份信息。此外,相当一部分(259个中的100个)号码与网络上泄露的登录凭证相关联,这可能会导致帐户劫持,从而击败基于短信的多因素身份验证。我们还发现了运营商在线界面和号码回收策略的设计缺陷,这些缺陷可能会促进涉及号码回收的攻击。最后,我们建议运营商、网站和用户可以采取一些措施来降低风险。
{"title":"Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States","authors":"Kevin Lee, Arvind Narayanan","doi":"10.1109/eCrime54498.2021.9738792","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738792","url":null,"abstract":"We examined the security and privacy risks of phone number recycling in the United States. We sampled 259 phone numbers available to new subscribers at two major carriers, and found that 171 of them were tied to existing accounts at popular websites, potentially allowing those accounts to be hijacked. Additionally, a majority of available numbers led to hits on people search services, which provide personally identifiable information on previous owners. Furthermore, a significant fraction (100 of 259) of the numbers were linked to leaked login credentials on the web, which could enable account hijackings that defeat SMS-based multi-factor authentication. We also found design weaknesses in carriers’ online interfaces and number recycling policies that could facilitate attacks involving number recycling. We close by recommending steps carriers, websites, and subscribers can take to reduce risk.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130908943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A qualitative mapping of Darkweb marketplaces 暗网市场的定性映射
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738766
Dimitrios Georgoulias, J. Pedersen, M. Falch, Emmanouil Vasilomanolakis
Darkweb marketplaces have evolved greatly since the rise of the Silk Road in 2011, the first platform of its kind, and have become a highly profitable underground trading ecosystem, which provides anonymity for both buyers and sellers. Law enforcement along with researchers, have been successful in taking down marketplaces over the years. However, the combination of mechanisms implemented by these platforms (e.g. payment mechanisms, cryptocurrencies, trust systems), along with the success of the Tor network’s anonymity properties, have made marketplaces much more enticing to users, while providing ease of access and use, as well as resilience against hostile actions. Through qualitative methods, this paper presents a mapping of darkweb marketplaces. We systematically investigate the operation of 41 marketplaces, along with 35 vendor shops, and gather information about the mechanisms and features implemented. Additionally, to acquire real world information, we explore the marketplaces’ integrated forums, as well as 3 popular independent ones, focusing on discussions between vendors, buyers and marketplace owners, on topics related to illegal trading. We believe that gaining an up-to-date and deep understanding of the framework that marketplaces are built upon, is the first step towards discovering weak spots in the cyber security product and service market, with the disruption of its operation being the ultimate goal.
自2011年丝绸之路(Silk Road)兴起以来,暗网市场已经有了很大的发展,并已成为一个利润丰厚的地下交易生态系统,为买家和卖家提供匿名服务。多年来,执法部门和研究人员已经成功地取缔了这些市场。然而,这些平台实现的机制(例如支付机制、加密货币、信任系统)的组合,以及Tor网络匿名属性的成功,使市场对用户更具吸引力,同时提供了易于访问和使用的功能,以及对敌对行动的抵御能力。通过定性的方法,本文提出了暗网市场的映射。我们系统地调查了41个市场的运营情况,以及35个供应商商店,并收集了有关实施机制和功能的信息。此外,为了获取真实世界的信息,我们探索了市场的综合论坛,以及3个受欢迎的独立论坛,重点关注供应商,买家和市场所有者之间关于非法交易相关主题的讨论。我们相信,深入了解网络市场赖以建立的框架,是发现网络安全产品和服务市场薄弱环节的第一步,而最终目标是破坏其运营。
{"title":"A qualitative mapping of Darkweb marketplaces","authors":"Dimitrios Georgoulias, J. Pedersen, M. Falch, Emmanouil Vasilomanolakis","doi":"10.1109/eCrime54498.2021.9738766","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738766","url":null,"abstract":"Darkweb marketplaces have evolved greatly since the rise of the Silk Road in 2011, the first platform of its kind, and have become a highly profitable underground trading ecosystem, which provides anonymity for both buyers and sellers. Law enforcement along with researchers, have been successful in taking down marketplaces over the years. However, the combination of mechanisms implemented by these platforms (e.g. payment mechanisms, cryptocurrencies, trust systems), along with the success of the Tor network’s anonymity properties, have made marketplaces much more enticing to users, while providing ease of access and use, as well as resilience against hostile actions. Through qualitative methods, this paper presents a mapping of darkweb marketplaces. We systematically investigate the operation of 41 marketplaces, along with 35 vendor shops, and gather information about the mechanisms and features implemented. Additionally, to acquire real world information, we explore the marketplaces’ integrated forums, as well as 3 popular independent ones, focusing on discussions between vendors, buyers and marketplace owners, on topics related to illegal trading. We believe that gaining an up-to-date and deep understanding of the framework that marketplaces are built upon, is the first step towards discovering weak spots in the cyber security product and service market, with the disruption of its operation being the ultimate goal.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The shady economy: Understanding the difference in trading activity from underground forums in different layers of the Web 阴暗经济:了解网络不同层次地下论坛交易活动的差异
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738751
Adrian Bermudez-Villalva, G. Stringhini
Underground forums are discussion outlets where criminal communities exchange knowledge about online malicious activities and trade illegal goods and services that promote an underground economy based on malicious software, stolen personal information, tools for financial fraud, drugs and more. Prior work has investigated the interactions between criminals and the type of assets traded in Surface Web forums. At the same time, research evidence suggests cybercriminals are moving their operations to the Dark Web to avoid getting caught and similar research has been carried out in Dark Web forums from different perspectives. However, there is no empirical evidence on how forum criminal activity related to the underground economy takes place in both Web environments. To address this problem, we conduct a quantitative exploratory analysis about the trading activity taking place in four prominent forums in the Surface Web and four in the Dark Web based on the type of posts found in the forums. Then, we compare the data to find differences in the malicious activity observed. Our results show that trading activity is higher in Dark Web forums compared to the Surface Web. We also find that different types of transactions, products and prices vary according to the Web environment.
地下论坛是犯罪团体交流网络恶意活动知识、交易非法商品和服务的讨论场所,这些非法商品和服务促进了基于恶意软件、被盗个人信息、金融欺诈工具、毒品等的地下经济。之前的工作已经调查了犯罪分子与在Surface Web论坛上交易的资产类型之间的相互作用。与此同时,研究证据表明,网络犯罪分子正在将他们的行动转移到暗网,以避免被抓住,在暗网论坛上也从不同的角度进行了类似的研究。然而,没有经验证据表明论坛犯罪活动与地下经济有关,是如何在这两个网络环境中发生的。为了解决这个问题,我们根据论坛上发现的帖子类型,对表面网和暗网中四个突出论坛的交易活动进行了定量探索性分析。然后,我们比较数据以发现所观察到的恶意活动的差异。我们的研究结果表明,暗网论坛的交易活动比表面网要高。我们还发现,不同类型的交易、产品和价格因网络环境而异。
{"title":"The shady economy: Understanding the difference in trading activity from underground forums in different layers of the Web","authors":"Adrian Bermudez-Villalva, G. Stringhini","doi":"10.1109/eCrime54498.2021.9738751","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738751","url":null,"abstract":"Underground forums are discussion outlets where criminal communities exchange knowledge about online malicious activities and trade illegal goods and services that promote an underground economy based on malicious software, stolen personal information, tools for financial fraud, drugs and more. Prior work has investigated the interactions between criminals and the type of assets traded in Surface Web forums. At the same time, research evidence suggests cybercriminals are moving their operations to the Dark Web to avoid getting caught and similar research has been carried out in Dark Web forums from different perspectives. However, there is no empirical evidence on how forum criminal activity related to the underground economy takes place in both Web environments. To address this problem, we conduct a quantitative exploratory analysis about the trading activity taking place in four prominent forums in the Surface Web and four in the Dark Web based on the type of posts found in the forums. Then, we compare the data to find differences in the malicious activity observed. Our results show that trading activity is higher in Dark Web forums compared to the Surface Web. We also find that different types of transactions, products and prices vary according to the Web environment.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"41 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The roles of self-control, need for cognition, impulsivity and viewing time in deception detection using a realistic e-mail phishing task 自我控制、认知需求、冲动性和观察时间在真实电子邮件网络钓鱼欺骗检测中的作用
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738794
Christina Rajagulasingam, Jacqui Taylor
Phishing attacks manipulate people into giving away personal information, which can lead to detrimental consequences for individuals and organizations. This study aimed to understand how viewing time and traits relating to cognition influenced participant’s ability to detect phishing e-mails. One hundred and twenty-two undergraduate students participated in an online survey which collected measures of impulsivity, need for cognition, self-control, time spent viewing e-mails and correct detection of phishing. There were no significant correlations between correct phishing detection and traits relating to cognition. However, viewing time was a significant factor where the more time individuals spent viewing e-mails the greater their accuracy in both perception of phishing e-mails and intention to correctly respond to phishing e-mails. The findings suggest that individual psychological differences have little influence on deception detection, supporting some of the previous research on the lack of effects relating to personality differences. In practical terms, individuals should be advised to spend more time viewing e-mails than they usually would, in order to increase their ability to detect phishing e-mails.
网络钓鱼攻击操纵人们泄露个人信息,这可能会给个人和组织带来有害的后果。本研究旨在了解观看时间和与认知相关的特征如何影响参与者检测网络钓鱼电子邮件的能力。122名大学生参加了一项在线调查,调查内容包括冲动性、认知需求、自我控制、查看电子邮件的时间和对网络钓鱼的正确检测。正确的网络钓鱼检测与认知相关特征之间没有显著的相关性。然而,查看时间是一个重要的因素,人们花在查看电子邮件上的时间越多,他们对网络钓鱼电子邮件的感知和正确回应网络钓鱼电子邮件的意图的准确性就越高。研究结果表明,个体心理差异对欺骗检测的影响很小,这支持了之前关于人格差异没有影响的一些研究。实际上,应该建议个人比平时花更多的时间查看电子邮件,以提高他们检测网络钓鱼电子邮件的能力。
{"title":"The roles of self-control, need for cognition, impulsivity and viewing time in deception detection using a realistic e-mail phishing task","authors":"Christina Rajagulasingam, Jacqui Taylor","doi":"10.1109/eCrime54498.2021.9738794","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738794","url":null,"abstract":"Phishing attacks manipulate people into giving away personal information, which can lead to detrimental consequences for individuals and organizations. This study aimed to understand how viewing time and traits relating to cognition influenced participant’s ability to detect phishing e-mails. One hundred and twenty-two undergraduate students participated in an online survey which collected measures of impulsivity, need for cognition, self-control, time spent viewing e-mails and correct detection of phishing. There were no significant correlations between correct phishing detection and traits relating to cognition. However, viewing time was a significant factor where the more time individuals spent viewing e-mails the greater their accuracy in both perception of phishing e-mails and intention to correctly respond to phishing e-mails. The findings suggest that individual psychological differences have little influence on deception detection, supporting some of the previous research on the lack of effects relating to personality differences. In practical terms, individuals should be advised to spend more time viewing e-mails than they usually would, in order to increase their ability to detect phishing e-mails.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tokyo, Denver, Helsinki, Lisbon or the Professor? A Framework for Understanding Cybercriminal Roles in Darknet Markets 东京、丹佛、赫尔辛基、里斯本还是教授?理解暗网市场中网络犯罪角色的框架
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738782
Claudia Peersman, Denny Pencheva, A. Rashid
There is comparatively little information about the roles and the separation of these roles within financially-motivated cybercrime online. As Darknet Markets (DNMs) are online fora, roles can often be conflated with membership or user types within such fora, e.g., administrator, new user, etc. The insights presented in this paper are grounded in a Conversation Analysis of underground forum threads in combination with Social Network Analysis of the relationships between actors in these fora and an automated analysis of the thematic scope of their communications using NLP techniques. This results in a more nuanced understanding of roles, and the power relationships between roles, as they emerge through and are defined by linguistic interactions. Based on this mixed methods approach, we developed a dynamic typology of three key roles within DNMs that goes beyond a basic supply-demand logic: entrepreneurs, influencers and gatekeepers. A closer analysis of these roles can contribute to a better understanding of emerging trends in a forum and allow for the identification and prioritisation of high-risk targets.
相对而言,在以经济为动机的网络犯罪中,关于角色和这些角色的分离的信息很少。由于暗网市场(dnm)是在线论坛,角色通常可以与论坛中的成员或用户类型合并,例如,管理员,新用户等。本文提出的见解基于对地下论坛线程的对话分析,结合对这些论坛中参与者之间关系的社会网络分析,以及使用NLP技术对其通信主题范围的自动分析。这导致了对角色和角色之间的权力关系的更细致的理解,因为它们是通过语言互动产生并由语言互动定义的。基于这种混合方法,我们开发了dnm中超越基本供需逻辑的三个关键角色的动态类型:企业家,影响者和看门人。对这些作用进行更密切的分析有助于更好地了解论坛中的新趋势,并有助于确定高风险目标并确定其优先次序。
{"title":"Tokyo, Denver, Helsinki, Lisbon or the Professor? A Framework for Understanding Cybercriminal Roles in Darknet Markets","authors":"Claudia Peersman, Denny Pencheva, A. Rashid","doi":"10.1109/eCrime54498.2021.9738782","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738782","url":null,"abstract":"There is comparatively little information about the roles and the separation of these roles within financially-motivated cybercrime online. As Darknet Markets (DNMs) are online fora, roles can often be conflated with membership or user types within such fora, e.g., administrator, new user, etc. The insights presented in this paper are grounded in a Conversation Analysis of underground forum threads in combination with Social Network Analysis of the relationships between actors in these fora and an automated analysis of the thematic scope of their communications using NLP techniques. This results in a more nuanced understanding of roles, and the power relationships between roles, as they emerge through and are defined by linguistic interactions. Based on this mixed methods approach, we developed a dynamic typology of three key roles within DNMs that goes beyond a basic supply-demand logic: entrepreneurs, influencers and gatekeepers. A closer analysis of these roles can contribute to a better understanding of emerging trends in a forum and allow for the identification and prioritisation of high-risk targets.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123250050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets 洞里蟾蜍还是麻婆豆腐?中英文暗网市场比较分析
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738745
Yichao Wang, B. Arief, J. Castro
The popularity of online shopping and cryptocurrency has contributed to drive the economy of darknet markets in recent years. These are often perceived to be conducive to (or may even facilitate) cybercrime related activities. It is, therefore, worthwhile to have a deeper understanding of how various darknet markets operate, so that researchers and law enforcement agencies can test and deploy appropriate countermeasures to fight against online crime. Currently, there is a knowledge gap regarding the similarities and differences among darknet markets in different languages. This study aims to compare between darknet markets operating in English and Chinese. Data from three English and two Chinese darknet markets was collected. The gathered data is described, compared, and analysed in six main aspects: operation model and structures, product categories, market policies, payment methods, security mechanisms, and vendors’ characteristics. Our datasets were collected during a seven-week period between 17 July and 30 August 2021, and they contain data from 384 vendors in the English darknet markets and 4,429 in the Chinese ones. The Chinese darknet markets generally seem to have more liberal policies than their English counterparts, as demonstrated by the variety and types of goods and services offered, many of which would have been banned in the English speaking ones. All darknet markets suffer from reputation issues. Cross-market actors are active, but they represent only a small proportion of the vendors observed in our study. In summary, our findings reveal key characteristics of darknet markets in two widely used languages. This information can provide useful insights for security researchers and law enforcement agencies in combating cybercrime.
近年来,网上购物和加密货币的普及推动了暗网市场的经济发展。这些通常被认为有利于(甚至可能促进)网络犯罪相关活动。因此,有必要深入了解各种暗网市场的运作方式,以便研究人员和执法机构可以测试和部署适当的对策来打击网络犯罪。目前,关于不同语言的暗网市场之间的异同存在知识差距。本研究旨在比较英文和中文暗网市场。收集到的数据主要从六个方面进行描述、比较和分析:运营模式和结构、产品类别、市场政策、支付方式、安全机制和供应商特征。我们的数据集是在2021年7月17日至8月30日的7周期间收集的,其中包含来自英国暗网市场的384家供应商和中国暗网市场的4429家供应商的数据。中国的暗网市场通常比英国的暗网市场有更自由的政策,所提供的商品和服务的种类和类型证明了这一点,其中许多商品和服务在英语国家是被禁止的。所有暗网市场都存在声誉问题。跨市场参与者是活跃的,但他们只占我们研究中观察到的供应商的一小部分。总之,我们的研究结果揭示了两种广泛使用语言的暗网市场的关键特征。这些信息可以为安全研究人员和执法机构打击网络犯罪提供有用的见解。
{"title":"Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets","authors":"Yichao Wang, B. Arief, J. Castro","doi":"10.1109/eCrime54498.2021.9738745","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738745","url":null,"abstract":"The popularity of online shopping and cryptocurrency has contributed to drive the economy of darknet markets in recent years. These are often perceived to be conducive to (or may even facilitate) cybercrime related activities. It is, therefore, worthwhile to have a deeper understanding of how various darknet markets operate, so that researchers and law enforcement agencies can test and deploy appropriate countermeasures to fight against online crime. Currently, there is a knowledge gap regarding the similarities and differences among darknet markets in different languages. This study aims to compare between darknet markets operating in English and Chinese. Data from three English and two Chinese darknet markets was collected. The gathered data is described, compared, and analysed in six main aspects: operation model and structures, product categories, market policies, payment methods, security mechanisms, and vendors’ characteristics. Our datasets were collected during a seven-week period between 17 July and 30 August 2021, and they contain data from 384 vendors in the English darknet markets and 4,429 in the Chinese ones. The Chinese darknet markets generally seem to have more liberal policies than their English counterparts, as demonstrated by the variety and types of goods and services offered, many of which would have been banned in the English speaking ones. All darknet markets suffer from reputation issues. Cross-market actors are active, but they represent only a small proportion of the vendors observed in our study. In summary, our findings reveal key characteristics of darknet markets in two widely used languages. This information can provide useful insights for security researchers and law enforcement agencies in combating cybercrime.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"1184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115828290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evolution of IoT Linux Malware: A MITRE ATT&CK TTP Based Approach 物联网Linux恶意软件的演变:基于MITRE攻击和ck http的方法
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738756
Veronica Chierzi, Fernando Mercês
In recent years, attacks against Internet of Things devices have increased by 59% says [1]. In this work, we investigate the evolution of malware that emerged in the last two years by taking advantage of the MITRE ATT&CK framework to deliver an analysis methodology based on this structure. We analyzed 14 distinct malware families that were discovered in the period by major security vendors and our threat intelligence investigations.In this paper, we propose a methodology to keep track of threats capability evolution using the MITRE ATT&CK framework. Our research aims to extend the current knowledge of Linux malware in the IoT domain and deliver a different analysis point of view. The findings presented in this paper about what changed, for example, what techniques are removed from the malware implementation, support the benefit of this analysis and tracking methodology to study the evolution of malware.
b[1]表示,近年来,针对物联网设备的攻击增加了59%。在这项工作中,我们通过利用MITRE ATT&CK框架来提供基于该结构的分析方法,调查了过去两年中出现的恶意软件的演变。我们分析了主要安全供应商和我们的威胁情报调查期间发现的14个不同的恶意软件家族。在本文中,我们提出了一种使用MITRE ATT&CK框架跟踪威胁能力演变的方法。我们的研究旨在扩展物联网领域Linux恶意软件的现有知识,并提供不同的分析观点。本文中提出的关于什么发生了变化的发现,例如,从恶意软件实现中删除了哪些技术,支持这种分析和跟踪方法的好处,以研究恶意软件的演变。
{"title":"Evolution of IoT Linux Malware: A MITRE ATT&CK TTP Based Approach","authors":"Veronica Chierzi, Fernando Mercês","doi":"10.1109/eCrime54498.2021.9738756","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738756","url":null,"abstract":"In recent years, attacks against Internet of Things devices have increased by 59% says [1]. In this work, we investigate the evolution of malware that emerged in the last two years by taking advantage of the MITRE ATT&CK framework to deliver an analysis methodology based on this structure. We analyzed 14 distinct malware families that were discovered in the period by major security vendors and our threat intelligence investigations.In this paper, we propose a methodology to keep track of threats capability evolution using the MITRE ATT&CK framework. Our research aims to extend the current knowledge of Linux malware in the IoT domain and deliver a different analysis point of view. The findings presented in this paper about what changed, for example, what techniques are removed from the malware implementation, support the benefit of this analysis and tracking methodology to study the evolution of malware.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134315638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
eCrime 2021 Cover Page 《犯罪2021》封面
Pub Date : 2021-12-01 DOI: 10.1109/ecrime54498.2021.9738748
{"title":"eCrime 2021 Cover Page","authors":"","doi":"10.1109/ecrime54498.2021.9738748","DOIUrl":"https://doi.org/10.1109/ecrime54498.2021.9738748","url":null,"abstract":"","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"124 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129628467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Diversity Meets Hostility: A Study of Domain Squatting Abuse in Online Banking 当多样性遭遇敌意:网上银行域名抢注滥用研究
Pub Date : 2021-12-01 DOI: 10.1109/eCrime54498.2021.9738769
Neeraj Kumar, Sukhada Ghewari, Harshal Tupsamudre, Manish Shukla, S. Lodha
In today’s digital era, a large number of users rely on banking websites to perform financial transactions. The widespread adoption of online banking and the monetary value associated with each user account make banking websites a potential target for domain squatting. Domain squatting is a common practice in which malicious actors register internet domain names which are similar to popular domains. In this work, we study the prevalence of domain squatting abuse that exploits inconsistent internet domain names used by popular banks across several countries including US, UK, Australia, Germany, China and India. An attacker exploits the inconsistencies present in the domain names to generate similar looking domains and use them for malicious purposes such as domain takeover, malware propagation, click fraud, phishing, stealing traffic, distribution of ads and malware.In this paper, we present the first context-free grammar (CFG) based algorithm that models inconsistencies in domain names of banking websites and use it to generate candidate domains. We also provide a comprehensive categorization technique to classify candidate domains into four different categories: defensive, malicious, suspicious and unrelated. Our study reveals that more than 3,000 domains that are either malicious or suspicious, targeting popular banks across different countries around the world. Further, we noticed prevalence of three forms of domain squatting, namely comboTLDsquatting, full-name squatting and brandname squatting. We found that most of the malicious and suspicious domains are instances of comboTLDsquatting. Our work shows that only few organizations are protecting their brands against domain squatting abuse by performing defensive registration. Further, our study identified different strategies used by malicious actors during domain registration in order to evade detection from security researchers and trick victims into disclosing their credentials. In particular, we discover that malicious actors use similar words, same TLDs, grammar rules and registrar for registering domains which are used in benign domains.
在当今的数字时代,大量用户依靠银行网站进行金融交易。网上银行的广泛采用以及与每个用户账户相关的货币价值使银行网站成为域名抢注的潜在目标。域名抢注是恶意行为者注册与常用域名相似的互联网域名的一种常见做法。在这项工作中,我们研究了域名抢注滥用的流行程度,这种滥用利用了包括美国、英国、澳大利亚、德国、中国和印度在内的几个国家的热门银行使用的不一致的互联网域名。攻击者利用域名中的不一致性来生成相似的域名,并将其用于恶意目的,例如域名接管,恶意软件传播,点击欺诈,网络钓鱼,窃取流量,广告和恶意软件的分发。在本文中,我们提出了第一个基于上下文无关语法(CFG)的算法,该算法对银行网站域名的不一致性进行建模,并使用它来生成候选域名。我们还提供了一种全面的分类技术,将候选域分为四种不同的类别:防御性、恶意、可疑和不相关。我们的研究显示,有超过3000个恶意或可疑的域名,目标是全球不同国家的热门银行。此外,我们注意到三种形式的域名抢注盛行,即组合域名抢注、全称抢注和品牌抢注。我们发现大多数恶意和可疑域名都是comboTLDsquatting的实例。我们的工作表明,只有少数组织通过执行防御性注册来保护其品牌免受域名抢注的滥用。此外,我们的研究确定了恶意行为者在域名注册期间使用的不同策略,以逃避安全研究人员的检测并欺骗受害者披露其凭据。特别是,我们发现恶意行为者使用类似的单词,相同的tld,语法规则和注册商来注册良性域名中使用的域名。
{"title":"When Diversity Meets Hostility: A Study of Domain Squatting Abuse in Online Banking","authors":"Neeraj Kumar, Sukhada Ghewari, Harshal Tupsamudre, Manish Shukla, S. Lodha","doi":"10.1109/eCrime54498.2021.9738769","DOIUrl":"https://doi.org/10.1109/eCrime54498.2021.9738769","url":null,"abstract":"In today’s digital era, a large number of users rely on banking websites to perform financial transactions. The widespread adoption of online banking and the monetary value associated with each user account make banking websites a potential target for domain squatting. Domain squatting is a common practice in which malicious actors register internet domain names which are similar to popular domains. In this work, we study the prevalence of domain squatting abuse that exploits inconsistent internet domain names used by popular banks across several countries including US, UK, Australia, Germany, China and India. An attacker exploits the inconsistencies present in the domain names to generate similar looking domains and use them for malicious purposes such as domain takeover, malware propagation, click fraud, phishing, stealing traffic, distribution of ads and malware.In this paper, we present the first context-free grammar (CFG) based algorithm that models inconsistencies in domain names of banking websites and use it to generate candidate domains. We also provide a comprehensive categorization technique to classify candidate domains into four different categories: defensive, malicious, suspicious and unrelated. Our study reveals that more than 3,000 domains that are either malicious or suspicious, targeting popular banks across different countries around the world. Further, we noticed prevalence of three forms of domain squatting, namely comboTLDsquatting, full-name squatting and brandname squatting. We found that most of the malicious and suspicious domains are instances of comboTLDsquatting. Our work shows that only few organizations are protecting their brands against domain squatting abuse by performing defensive registration. Further, our study identified different strategies used by malicious actors during domain registration in order to evade detection from security researchers and trick victims into disclosing their credentials. In particular, we discover that malicious actors use similar words, same TLDs, grammar rules and registrar for registering domains which are used in benign domains.","PeriodicalId":228129,"journal":{"name":"2021 APWG Symposium on Electronic Crime Research (eCrime)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131950133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 APWG Symposium on Electronic Crime Research (eCrime)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1