Crimeware-as-a-service - A survey of commoditized crimeware in the underground market

نویسندگان

  • Aditya K. Sood
  • Richard J. Enbody
چکیده

Crimeware-as-a-service (CaaS) has become a prominent component of the underground economy. CaaS provides a new dimension to cyber crime by making it more organized, automated, and accessible to criminals with limited technical skills. This paper dissects CaaS and explains the essence of the underground economy that has grown around it. The paper also describes the various crimeware services that are provided in the underground

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond

Executive Summary " Crimeware " is software that performs illegal actions unanticipated by a user running the software, which are intended to yield financial benefits to the distributor of the software. Crimeware is a ubiquitous fact of life in modern online interactions. It is distributed via many mechanisms, including: • Social engineering attacks convincing users to open a malicious email at...

متن کامل

Crimeware and Trusted Computing

Trusted Computing technology has been put forward as a potentially revolutionary addition to the field of information security. In this chapter we examine how Trusted Computing may be used to defend against the ever-growing threat posed by crimeware. We also highlight a counterintuitive but important use of Trusted Computing, as a possible facilitator

متن کامل

Forensic Recovery and Analysis of the Artefacts of Crimeware Toolkits

The total cost of cybercrime has been estimated to exceed US$388 billion annually. The availability of crimeware toolkits has lowered the bar for entry to the world of cybercrime. With very little technical knowledge required, cybercriminals can create, deploy and harvest financial data using banking trojans though a point and click graphical user interface that can cost less than US$1000. Tech...

متن کامل

Crimeware Swindling without Virtual Machines

In previous work, we introduced a bait-injection system designed to delude and detect crimeware by forcing it to reveal itself during the exploitation of captured information. Although effective as a technique, our original system was practically limited, as it was implemented in a personal VM environment. In this paper, we investigate how to extend our system by applying it to personal worksta...

متن کامل

Fighting Crimeware: An Architecture for Split-Trust Web Applications

We present an architecture for split-trust browsing: a technique that enables web applications to split their HTML across a pair of browsers—one untrusted browser running on a PC and one trusted browser running on a user’s personal device. Information entered via the personal device’s keypad cannot be read by the PC, thwarting PC-based keyloggers. Similarly, information displayed on the persona...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCIP

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2013