针对荷兰网上银行客户的网络钓鱼和恶意软件攻击:导致受害因素的定性分析

IF 0.7 Q4 CRIMINOLOGY & PENOLOGY International Journal of Cyber Criminology Pub Date : 2016-01-01 DOI:10.5281/ZENODO.58523
J. Jansen, R. Leukfeldt
{"title":"针对荷兰网上银行客户的网络钓鱼和恶意软件攻击:导致受害因素的定性分析","authors":"J. Jansen, R. Leukfeldt","doi":"10.5281/ZENODO.58523","DOIUrl":null,"url":null,"abstract":"IntroductionThis paper describes an in-depth analysis into the behaviour and characteristics of bank customers leading to victimization caused by phishing and malware attacks, the most common crimes involving online banking fraud in the Netherlands (NVB, 2013). Phishing is \"a scalable act of deception whereby impersonation is used to obtain information from a target\" (Lastdrager 2014, 8). Malware is the infection of a computer by malicious software, which includes viruses, worms, Trojan horses and spyware. In both cases, the aim of the fraudsters is to deceive the customer or the system used for online banking in order to obtain user credentials and/or to gain control over customers' devices. Fraudster use user credentials to access a victim's online bank account and to validate money transfers on behalf of the victim. Phishing and malware scams, however, are significant across the world and go beyond the online banking context. The Anti-Phishing Working Group reported in their Phishing Activities Trends Report of Q4 2014 that nearly 200,000 unique phishing reports were submitted to them and that an average of 255,000 new malware threats (including variants) emerged each day (APWG, 2015).A number of recent studies try to shed light on how and why people fall victim to these crimes and others do not (Bossler & Holt, 2009; Ngo & Paternoster, 2011; Vishwanath, Herath, Chen, Wang, & Rao, 2011). Jansen and Leukfeldt (2015), for example, carried out an exploratory study into how customers become victims of online banking fraud and demonstrate that customers have a specific role in their own victimization. Customers provide fraudsters with information, such as credentials, which fraudsters can use to steal money from their bank accounts. A study into phishing victimization shows that everybody is at risk when it comes to this type of crime (Leukfeldt, 2014). Additionally, Leukfeldt (2015) claims that this also largely holds for malware victimization; merely spending more time online, carrying out various kinds of activities, increased the risk of a malware infection.Both of Leukfeldt's studies (2014, 2015) - which are based on an online survey - conclude that in-depth studies are necessary to increase knowledge about why customers are victimized. It is not sufficiently clear if certain individuals are more prone to being at risk for online banking fraud than others, and how it can be explained. Therefore, this study qualitatively explores, by means of interviews, what factors explain online banking fraud victimization. Crossler et al. (2013) mention, that, the interview is a valuable method to better understand the actual motivations and behaviour of individuals.Theoretical backgroundFor this study, two theoretical perspectives are in place. First, we take a routine activity approach (Cohen & Felson, 1979) to study victim characteristics and behaviours that influence victimization. This approach is also central to the studies of Leukfeldt (2014, 2015) making it possible to assess whether our qualitative study has added value to the quantitative studies in this context. The routine activity approach holds that victimization is influenced by a combination of a motivated offender, a suitable target and the absence of a capable guardian in a convergence of time and space. We study the two latter aspects of routine activity approach, namely the suitability of targets and the capability of their guardians. Guardians can, for example, be technical security measures such as anti-virus software.Over time, elements regarding suitability have been added to the routine activity approach. Two acronyms that often emerge are CRAVED, which stands for concealable, removable, available, valuable, enjoyable and disposable and VIVA, which stands for value, inertia, visibility and accessibility. Sutton (2009) compared the two acronyms and concluded that they deal with identical attributes. Furthermore, he argues that VIVA elements relate to characteristics that attract attention, while the additional elements of CRAVED are related to characteristics that make an object attractive for criminals. …","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"26 1","pages":"79"},"PeriodicalIF":0.7000,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"52","resultStr":"{\"title\":\"Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization\",\"authors\":\"J. Jansen, R. Leukfeldt\",\"doi\":\"10.5281/ZENODO.58523\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IntroductionThis paper describes an in-depth analysis into the behaviour and characteristics of bank customers leading to victimization caused by phishing and malware attacks, the most common crimes involving online banking fraud in the Netherlands (NVB, 2013). Phishing is \\\"a scalable act of deception whereby impersonation is used to obtain information from a target\\\" (Lastdrager 2014, 8). Malware is the infection of a computer by malicious software, which includes viruses, worms, Trojan horses and spyware. In both cases, the aim of the fraudsters is to deceive the customer or the system used for online banking in order to obtain user credentials and/or to gain control over customers' devices. Fraudster use user credentials to access a victim's online bank account and to validate money transfers on behalf of the victim. Phishing and malware scams, however, are significant across the world and go beyond the online banking context. The Anti-Phishing Working Group reported in their Phishing Activities Trends Report of Q4 2014 that nearly 200,000 unique phishing reports were submitted to them and that an average of 255,000 new malware threats (including variants) emerged each day (APWG, 2015).A number of recent studies try to shed light on how and why people fall victim to these crimes and others do not (Bossler & Holt, 2009; Ngo & Paternoster, 2011; Vishwanath, Herath, Chen, Wang, & Rao, 2011). Jansen and Leukfeldt (2015), for example, carried out an exploratory study into how customers become victims of online banking fraud and demonstrate that customers have a specific role in their own victimization. Customers provide fraudsters with information, such as credentials, which fraudsters can use to steal money from their bank accounts. A study into phishing victimization shows that everybody is at risk when it comes to this type of crime (Leukfeldt, 2014). Additionally, Leukfeldt (2015) claims that this also largely holds for malware victimization; merely spending more time online, carrying out various kinds of activities, increased the risk of a malware infection.Both of Leukfeldt's studies (2014, 2015) - which are based on an online survey - conclude that in-depth studies are necessary to increase knowledge about why customers are victimized. It is not sufficiently clear if certain individuals are more prone to being at risk for online banking fraud than others, and how it can be explained. Therefore, this study qualitatively explores, by means of interviews, what factors explain online banking fraud victimization. Crossler et al. (2013) mention, that, the interview is a valuable method to better understand the actual motivations and behaviour of individuals.Theoretical backgroundFor this study, two theoretical perspectives are in place. First, we take a routine activity approach (Cohen & Felson, 1979) to study victim characteristics and behaviours that influence victimization. This approach is also central to the studies of Leukfeldt (2014, 2015) making it possible to assess whether our qualitative study has added value to the quantitative studies in this context. The routine activity approach holds that victimization is influenced by a combination of a motivated offender, a suitable target and the absence of a capable guardian in a convergence of time and space. We study the two latter aspects of routine activity approach, namely the suitability of targets and the capability of their guardians. Guardians can, for example, be technical security measures such as anti-virus software.Over time, elements regarding suitability have been added to the routine activity approach. Two acronyms that often emerge are CRAVED, which stands for concealable, removable, available, valuable, enjoyable and disposable and VIVA, which stands for value, inertia, visibility and accessibility. Sutton (2009) compared the two acronyms and concluded that they deal with identical attributes. Furthermore, he argues that VIVA elements relate to characteristics that attract attention, while the additional elements of CRAVED are related to characteristics that make an object attractive for criminals. …\",\"PeriodicalId\":46103,\"journal\":{\"name\":\"International Journal of Cyber Criminology\",\"volume\":\"26 1\",\"pages\":\"79\"},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2016-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"52\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Criminology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5281/ZENODO.58523\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.58523","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 52

摘要

本文深入分析了银行客户的行为和特征,导致网络钓鱼和恶意软件攻击造成的受害,这是荷兰最常见的涉及网上银行欺诈的犯罪(NVB, 2013)。网络钓鱼是“一种可扩展的欺骗行为,通过模仿从目标获取信息”(Lastdrager 2014, 8)。恶意软件是由恶意软件感染计算机,包括病毒、蠕虫、特洛伊木马和间谍软件。在这两种情况下,欺诈者的目的都是欺骗客户或用于网上银行的系统,以获得用户凭证和/或控制客户的设备。欺诈者使用用户凭证访问受害者的在线银行账户,并代表受害者验证汇款。然而,网络钓鱼和恶意软件诈骗在全球范围内都很严重,并且超出了网上银行的范围。反网络钓鱼工作组在其2014年第四季度网络钓鱼活动趋势报告中报告称,他们收到了近20万份独特的网络钓鱼报告,平均每天出现25.5万个新的恶意软件威胁(包括变种)(APWG, 2015)。最近的一些研究试图揭示人们如何以及为什么会成为这些犯罪的受害者,而其他人却不会(Bossler & Holt, 2009;Ngo & Paternoster, 2011;Vishwanath, Herath, Chen, Wang, & Rao, 2011)。例如,Jansen和Leukfeldt(2015)对客户如何成为网上银行欺诈的受害者进行了探索性研究,并证明客户在自己的受害过程中起着特定的作用。客户向欺诈者提供证件等信息,欺诈者可以利用这些信息从他们的银行账户中窃取资金。一项关于网络钓鱼受害的研究表明,当涉及到这种类型的犯罪时,每个人都处于危险之中(Leukfeldt, 2014)。此外,Leukfeldt(2015)声称,这在很大程度上也适用于恶意软件受害;仅仅是花更多的时间上网,进行各种各样的活动,就增加了感染恶意软件的风险。这两个Leukfeldt的研究(2014年,2015年)-这是基于在线调查-得出结论,深入的研究是必要的,以增加了解为什么客户受害。目前尚不清楚是否某些个人比其他人更容易面临网上银行欺诈的风险,以及如何解释这一点。因此,本研究通过访谈的方式定性地探讨了哪些因素解释了网上银行欺诈受害。Crossler等人(2013)提到,访谈是更好地了解个人实际动机和行为的一种有价值的方法。对于本研究,有两个理论视角。首先,我们采用常规活动方法(Cohen & Felson, 1979)来研究受害者的特征和影响受害的行为。这种方法也是Leukfeldt(2014, 2015)研究的核心,使我们有可能评估我们的定性研究是否为这种情况下的定量研究增加了价值。常规活动方法认为,受害行为受到有动机的犯罪者、合适的目标和缺乏有能力的监护人在时间和空间趋同的综合影响。我们研究了常规活动方法的后两个方面,即目标的适宜性和其监护人的能力。例如,监护人可以是防病毒软件等技术安全措施。随着时间的推移,关于适用性的元素被添加到日常活动方法中。经常出现的两个缩写词是:crave,代表可隐藏的、可移动的、可用的、有价值的、愉快的和一次性的;VIVA,代表价值、惯性、可见性和可访问性。Sutton(2009)比较了这两个缩略词,并得出结论,它们处理相同的属性。此外,他认为VIVA元素与吸引注意力的特征有关,而crave的附加元素与使物体对罪犯具有吸引力的特征有关。…
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization
IntroductionThis paper describes an in-depth analysis into the behaviour and characteristics of bank customers leading to victimization caused by phishing and malware attacks, the most common crimes involving online banking fraud in the Netherlands (NVB, 2013). Phishing is "a scalable act of deception whereby impersonation is used to obtain information from a target" (Lastdrager 2014, 8). Malware is the infection of a computer by malicious software, which includes viruses, worms, Trojan horses and spyware. In both cases, the aim of the fraudsters is to deceive the customer or the system used for online banking in order to obtain user credentials and/or to gain control over customers' devices. Fraudster use user credentials to access a victim's online bank account and to validate money transfers on behalf of the victim. Phishing and malware scams, however, are significant across the world and go beyond the online banking context. The Anti-Phishing Working Group reported in their Phishing Activities Trends Report of Q4 2014 that nearly 200,000 unique phishing reports were submitted to them and that an average of 255,000 new malware threats (including variants) emerged each day (APWG, 2015).A number of recent studies try to shed light on how and why people fall victim to these crimes and others do not (Bossler & Holt, 2009; Ngo & Paternoster, 2011; Vishwanath, Herath, Chen, Wang, & Rao, 2011). Jansen and Leukfeldt (2015), for example, carried out an exploratory study into how customers become victims of online banking fraud and demonstrate that customers have a specific role in their own victimization. Customers provide fraudsters with information, such as credentials, which fraudsters can use to steal money from their bank accounts. A study into phishing victimization shows that everybody is at risk when it comes to this type of crime (Leukfeldt, 2014). Additionally, Leukfeldt (2015) claims that this also largely holds for malware victimization; merely spending more time online, carrying out various kinds of activities, increased the risk of a malware infection.Both of Leukfeldt's studies (2014, 2015) - which are based on an online survey - conclude that in-depth studies are necessary to increase knowledge about why customers are victimized. It is not sufficiently clear if certain individuals are more prone to being at risk for online banking fraud than others, and how it can be explained. Therefore, this study qualitatively explores, by means of interviews, what factors explain online banking fraud victimization. Crossler et al. (2013) mention, that, the interview is a valuable method to better understand the actual motivations and behaviour of individuals.Theoretical backgroundFor this study, two theoretical perspectives are in place. First, we take a routine activity approach (Cohen & Felson, 1979) to study victim characteristics and behaviours that influence victimization. This approach is also central to the studies of Leukfeldt (2014, 2015) making it possible to assess whether our qualitative study has added value to the quantitative studies in this context. The routine activity approach holds that victimization is influenced by a combination of a motivated offender, a suitable target and the absence of a capable guardian in a convergence of time and space. We study the two latter aspects of routine activity approach, namely the suitability of targets and the capability of their guardians. Guardians can, for example, be technical security measures such as anti-virus software.Over time, elements regarding suitability have been added to the routine activity approach. Two acronyms that often emerge are CRAVED, which stands for concealable, removable, available, valuable, enjoyable and disposable and VIVA, which stands for value, inertia, visibility and accessibility. Sutton (2009) compared the two acronyms and concluded that they deal with identical attributes. Furthermore, he argues that VIVA elements relate to characteristics that attract attention, while the additional elements of CRAVED are related to characteristics that make an object attractive for criminals. …
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
2.60
自引率
40.00%
发文量
0
审稿时长
16 weeks
期刊介绍: International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. IJCC is an unique Diamond open access, not for profit international journal, where the author(s) need not pay article processing charges / page charges and it is totally free for both the authors and the audience. IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Security and Policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes primarily from a social science perspective to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
期刊最新文献
Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud Harmful discourse on social triggering factors of persecution truth era Project Leaked: research on non-consensual sharing of intimate images in Brazil
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1