[go: up one dir, main page]

Mirian, 2019 - Google Patents

Hack for Hire: Investigating the emerging black market of retail email account hacking services

Mirian, 2019

View PDF
Document ID
1966069466841453055
Author
Mirian A
Publication year
Publication venue
Queue

External Links

Snippet

Hack-for-hire services charging 100- 400 per contract were found to produce sophisticated, persistent, and personalized attacks that were able to bypass 2FA via phishing. The demand for these services, however, appears to be limited to a niche market, as evidenced by the …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Jain et al. A survey of phishing attack techniques, defence mechanisms and open research challenges
Alabdan Phishing attacks survey: Types, vectors, and technical approaches
Mirian et al. Hack for hire: Exploring the emerging market for account hijacking
McGuire et al. Cyber crime: A review of the evidence
Hyslip Cybercrime-as-a-service operations
US20130263226A1 (en) False Banking, Credit Card, and Ecommerce System
Pande Introduction to cyber security
US9972013B2 (en) Internet site authentication with payments authorization data
Mirian Hack for Hire: Investigating the emerging black market of retail email account hacking services
Garkava et al. Stolen data markets on Telegram: a crime script analysis and situational crime prevention measures
Al-Daraiseh et al. Social networks’ benefits, privacy, and identity theft: KSA case study
Jakobsson The death of the internet
Ogbanufe et al. Towards a conceptual typology of darknet risks
Ahmed et al. Impact and significance of human factors in digital information security
Stringhini Adversarial behaviours knowledge area
Day Security in the Digital World: For the home user, parent, consumer and home office
Síochána Cyber Crime
Colorossi Cyber security
Gunawardana An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
Mehendele et al. Review of Phishing Attacks and Anti Phishing Tools
Lewis et al. Bits and Bytes
Wardle How Long Does It Take To Get Owned
Plotkin Privacy, Security, and Cyberspace
Willems Today’s Threats