What Happens After You Are Pwnd: Understanding The Use Of Leaked Account Credentials In The Wild

نویسندگان

  • Jeremiah Onaolapo
  • Enrico Mariconti
  • Gianluca Stringhini
چکیده

Cybercriminals steal access credentials to webmail accounts and then misuse them for their own profit, release them publicly, or sell them on the underground market. Despite the importance of this problem, the research community still lacks a comprehensive understanding of what these stolen accounts are used for. In this paper, we aim to shed light on the modus operandi of miscreants accessing stolen Gmail accounts. We developed an infrastructure that is able to monitor the activity performed by users on Gmail accounts, and leaked credentials to 100 accounts under our control through various means, such as having information-stealing malware capture them, leaking them on public paste sites, and posting them on underground forums. We then monitored the activity recorded on these accounts over a period of 7 months. Our observations allowed us to devise a taxonomy of malicious activity performed on stolen Gmail accounts, to identify differences in the behavior of cybercriminals that get access to stolen accounts through different means, and to identify systematic attempts to evade the protection systems in place at Gmail and blend in with the legitimate user activity. This paper gives the research community a better understanding of a so far understudied, yet critical aspect of the cybercrime economy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Honey Sheets: What Happens to Leaked Google Spreadsheets?

Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this pap...

متن کامل

Understanding Personal Practical Knowledge; From what teachers must know to what teachers already know

The purpose of this study is understanding the Personal Practical Knowledge (PPK) of teachers which has been done through qualitative method. Understanding PPK helps us to understand why teachers act in a specific way. In this regards, reflecting on their personal and professional narratives also help to improve their practice. This study was conducted along with 13 teachers in a non-profit pri...

متن کامل

Harvesting Wild Honey from Webmail Beehives

Cybercriminals steal access credentials to online accounts in a bid to derive profit from the valuable content of such accounts. The research community lacks a comprehensive understanding of what these stolen accounts are used for. This is largely because it is hard for researchers to collect data on compromised online accounts. To bridge this gap, we present an infrastructure that is able to m...

متن کامل

نگاهی دیگر به بیتی از مثنوی

Some texts, especially mystical and literary, are so intricate and labyrinthine that can be interpreted differently. These various interpretations sometimes result from the interior aspect of the texts, based on semantical understanding, and sometimes arise from their exterior aspect, based on different ways of reading the texts. Accordingly, while in another article along with other interprete...

متن کامل

Post nuclear crisis: what about the mucocutaneous problem?

Health problems after a nuclear crisis are aninteresting issue in medicine. After the recentJapanese nuclear crisis, several health issuesunderwent monitoring. There are few considerationson mucocutaneous diseases. Indeed, there is nodoubt that the skin and mucocutaneous issues arethe main organs affected by leaked radiations. It isimportant to take care of mucocutaneous lesionsin acute radiati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017