Honey Sheets: What Happens to Leaked Google Spreadsheets?

نویسندگان

  • Martin Lazarov
  • Jeremiah Onaolapo
  • Gianluca Stringhini
چکیده

Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this paper, we present a system able to monitor user activity on Google spreadsheets. We populated 5 Google spreadsheets with fake bank account details and fake funds transfer links. Each spreadsheet was configured to report details of accesses and clicks on links back to us. To study how people interact with these spreadsheets in case they are leaked, we posted unique links pointing to the spreadsheets on a popular paste site. We then monitored activity in the accounts for 72 days, and observed 165 accesses in total. We were able to observe interesting modifications to these spreadsheets performed by illicit accesses. For instance, we observed deletion of some fake bank account information, in addition to insults and warnings that some visitors entered in some of the spreadsheets. Our preliminary results show that our system can be used to shed light on cybercriminal behavior with regards to leaked online documents.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wikipedia Tools for Google Spreadsheets

In this paper, we introduce the Wikipedia Tools for Google Spreadsheets. Google Spreadsheets is part of a free, Webbased software office suite offered by Google within its Google Docs service. It allows users to create and edit spreadsheets online, while collaborating with other users in realtime. Wikipedia is a free-access, free-content Internet encyclopedia, whose content and data is availabl...

متن کامل

Harvesting Wild Honey from Webmail Beehives

Cybercriminals steal access credentials to online accounts in a bid to derive profit from the valuable content of such accounts. The research community lacks a comprehensive understanding of what these stolen accounts are used for. This is largely because it is hard for researchers to collect data on compromised online accounts. To bridge this gap, we present an infrastructure that is able to m...

متن کامل

Finding High-Level Structures in Spreadsheet Programs

Spreadsheets are a common tool in end-user programming. But even while important decisions are based on spreadsheet computations, spreadsheets are poorly documented software and the differences between simple oneshot computations and large, long-living sheets are not well understood. Like other software, production spreadsheets are subject to repeated maintenance cycles. Consequently, as with c...

متن کامل

Development and Evaluation of Chitosan Honey Hydrogel Sheets as Wound Dressing

Multiplication of antibiotic resistant bacteria complicates the wound healing process nowadays. It has been proved that our ancient medicine honey is a panacea for a lot of diseases and it plays a vital role in wound healing. Hydrogel sheets were developed from chitosan and chitosan-honey in this study to evaluate the required properties for effective wound dressings, such as, folding endurance...

متن کامل

An Analytical Review on the Techniques Opted For The Detection of Cloning In Spread Sheets

Spreadsheets are widely used in industry: it is estimated that end-user programmers outnumber programmers by a facto . However, spreadsheets are error-prone, numerous companies have lost money because of spreadsheet errors. One of the causes for spreadsheet problems is the prevalence of copypasting. This paper focuses on the methods of identifying data clone in spread sheets and their efficienc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1607.00801  شماره 

صفحات  -

تاریخ انتشار 2016