The Underground Economy of Fake Antivirus Software

نویسندگان

  • Brett Stone-Gross
  • Ryan Abman
  • Richard A. Kemmerer
  • Christopher Krügel
  • Douglas G. Steigerwald
چکیده

Fake antivirus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars for a phony software license. As a result, fake AV software has evolved into one of the most lucrative criminal operations on the Internet. In this paper, we examine the operations of three large-scale fake AV businesses, lasting from three months to more than two years. More precisely, we present the results of our analysis on a trove of data obtained from several backend servers that the cybercriminals used to drive their scam operations. Our investigations reveal that these three fake AV businesses had earned a combined revenue of more than $130 million dollars. A particular focus of our analysis is on the financial and economic aspects of the scam, which involves legitimate credit card networks as well as more dubious payment processors. In particular, we present an economic model that demonstrates that fake AV companies are actively monitoring the refunds (chargebacks) that customers demand from their credit card providers. When the number of chargebacks increases in a short interval, the fake AV companies react to customer complaints by granting more refunds. This lowers the rate of chargebacks and ensures that a fake AV company can stay in business for a longer period of time. However, this behavior also leads to unusual patterns in chargebacks, which can potentially be leveraged by vigilant payment processors and credit card companies to identify and ban fraudulent firms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Putting Out a HIT: Crowdsourcing Malware Installs

Today, several actors within the Internet’s burgeoning underground economy specialize in providing services to like-minded criminals. At the same time, gray and white markets exist for services on the Internet providing reasonably similar products. In this paper we explore a hypothetical arbitrage between these two markets by purchasing “Human Intelligence” on Amazon’s Mechanical Turk service, ...

متن کامل

Estimating the Underground Economy in Iran (1965-2005): A MIMIC Approach

This study uses " Multiple Indicators – Multiple Causes" (MIMIC) approach to model the causal relations between main variables, which determine the underground economy in Iran. we Basically, it examines the relationship between underground and official GDP in Iran, using annual time-series data for Iran during 1965 – 2005. Accordingly, it is found that the estimated size of the underground ...

متن کامل

Modeling Iran`s Underground Economy: A Fuzzy Logic Approach

The underground economy has long been of interest to economists and has devoted extensive studies to itself in economic literature. Through fuzzy logic approach in present research, we estimated the size of underground economy of Iran over the period of 1978-2010. For this purpose and according to theoretical bases and previous studies, variables such as GDP per capita, ratio of direct taxes to...

متن کامل

اقتصاد زیرزمینی و تأثیر آن بر

Hidden nature of underground economy makes it difficult to measure and carry out a direct study on it . Thus, most of the common measurement methods are the ones that indirectly estimate the extent of these activities and suffer from restrictive assumptions. In the past two decades, economists began to pay attention to measurement of underground economy volume and its causes and effects more t...

متن کامل

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

The underground commoditization of compromised hosts suggests a tacit capability where miscreants leverage the same machine—subscribed by multiple criminal ventures—to simultaneously profit from spam, fake account registration, malicious hosting, and other forms of automated abuse. To expedite the detection of these commonly abusive hosts, there are now multiple industrywide efforts that aggreg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011