Honey Sheets: What Happens to Leaked Google Spreadsheets?
نویسندگان
چکیده
Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this paper, we present a system able to monitor user activity on Google spreadsheets. We populated 5 Google spreadsheets with fake bank account details and fake funds transfer links. Each spreadsheet was configured to report details of accesses and clicks on links back to us. To study how people interact with these spreadsheets in case they are leaked, we posted unique links pointing to the spreadsheets on a popular paste site. We then monitored activity in the accounts for 72 days, and observed 165 accesses in total. We were able to observe interesting modifications to these spreadsheets performed by illicit accesses. For instance, we observed deletion of some fake bank account information, in addition to insults and warnings that some visitors entered in some of the spreadsheets. Our preliminary results show that our system can be used to shed light on cybercriminal behavior with regards to leaked online documents.
منابع مشابه
Wikipedia Tools for Google Spreadsheets
In this paper, we introduce the Wikipedia Tools for Google Spreadsheets. Google Spreadsheets is part of a free, Webbased software office suite offered by Google within its Google Docs service. It allows users to create and edit spreadsheets online, while collaborating with other users in realtime. Wikipedia is a free-access, free-content Internet encyclopedia, whose content and data is availabl...
متن کاملHarvesting Wild Honey from Webmail Beehives
Cybercriminals steal access credentials to online accounts in a bid to derive profit from the valuable content of such accounts. The research community lacks a comprehensive understanding of what these stolen accounts are used for. This is largely because it is hard for researchers to collect data on compromised online accounts. To bridge this gap, we present an infrastructure that is able to m...
متن کاملFinding High-Level Structures in Spreadsheet Programs
Spreadsheets are a common tool in end-user programming. But even while important decisions are based on spreadsheet computations, spreadsheets are poorly documented software and the differences between simple oneshot computations and large, long-living sheets are not well understood. Like other software, production spreadsheets are subject to repeated maintenance cycles. Consequently, as with c...
متن کاملDevelopment and Evaluation of Chitosan Honey Hydrogel Sheets as Wound Dressing
Multiplication of antibiotic resistant bacteria complicates the wound healing process nowadays. It has been proved that our ancient medicine honey is a panacea for a lot of diseases and it plays a vital role in wound healing. Hydrogel sheets were developed from chitosan and chitosan-honey in this study to evaluate the required properties for effective wound dressings, such as, folding endurance...
متن کاملAn Analytical Review on the Techniques Opted For The Detection of Cloning In Spread Sheets
Spreadsheets are widely used in industry: it is estimated that end-user programmers outnumber programmers by a facto . However, spreadsheets are error-prone, numerous companies have lost money because of spreadsheet errors. One of the causes for spreadsheet problems is the prevalence of copypasting. This paper focuses on the methods of identifying data clone in spread sheets and their efficienc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1607.00801 شماره
صفحات -
تاریخ انتشار 2016