Crimeware-as-a-service - A survey of commoditized crimeware in the underground market
نویسندگان
چکیده
Crimeware-as-a-service (CaaS) has become a prominent component of the underground economy. CaaS provides a new dimension to cyber crime by making it more organized, automated, and accessible to criminals with limited technical skills. This paper dissects CaaS and explains the essence of the underground economy that has grown around it. The paper also describes the various crimeware services that are provided in the underground
منابع مشابه
The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond
Executive Summary " Crimeware " is software that performs illegal actions unanticipated by a user running the software, which are intended to yield financial benefits to the distributor of the software. Crimeware is a ubiquitous fact of life in modern online interactions. It is distributed via many mechanisms, including: • Social engineering attacks convincing users to open a malicious email at...
متن کاملCrimeware and Trusted Computing
Trusted Computing technology has been put forward as a potentially revolutionary addition to the field of information security. In this chapter we examine how Trusted Computing may be used to defend against the ever-growing threat posed by crimeware. We also highlight a counterintuitive but important use of Trusted Computing, as a possible facilitator
متن کاملForensic Recovery and Analysis of the Artefacts of Crimeware Toolkits
The total cost of cybercrime has been estimated to exceed US$388 billion annually. The availability of crimeware toolkits has lowered the bar for entry to the world of cybercrime. With very little technical knowledge required, cybercriminals can create, deploy and harvest financial data using banking trojans though a point and click graphical user interface that can cost less than US$1000. Tech...
متن کاملCrimeware Swindling without Virtual Machines
In previous work, we introduced a bait-injection system designed to delude and detect crimeware by forcing it to reveal itself during the exploitation of captured information. Although effective as a technique, our original system was practically limited, as it was implemented in a personal VM environment. In this paper, we investigate how to extend our system by applying it to personal worksta...
متن کاملFighting Crimeware: An Architecture for Split-Trust Web Applications
We present an architecture for split-trust browsing: a technique that enables web applications to split their HTML across a pair of browsers—one untrusted browser running on a PC and one trusted browser running on a user’s personal device. Information entered via the personal device’s keypad cannot be read by the PC, thwarting PC-based keyloggers. Similarly, information displayed on the persona...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCIP
دوره 6 شماره
صفحات -
تاریخ انتشار 2013