Mirian, 2019 - Google Patents
Hack for Hire: Investigating the emerging black market of retail email account hacking servicesMirian, 2019
View PDF- Document ID
- 1966069466841453055
- Author
- Mirian A
- Publication year
- Publication venue
- Queue
External Links
Snippet
Hack-for-hire services charging 100- 400 per contract were found to produce sophisticated, persistent, and personalized attacks that were able to bypass 2FA via phishing. The demand for these services, however, appears to be limited to a niche market, as evidenced by the …
- 230000002085 persistent 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
Alabdan | Phishing attacks survey: Types, vectors, and technical approaches | |
Mirian et al. | Hack for hire: Exploring the emerging market for account hijacking | |
McGuire et al. | Cyber crime: A review of the evidence | |
Hyslip | Cybercrime-as-a-service operations | |
US20130263226A1 (en) | False Banking, Credit Card, and Ecommerce System | |
Pande | Introduction to cyber security | |
US9972013B2 (en) | Internet site authentication with payments authorization data | |
Mirian | Hack for Hire: Investigating the emerging black market of retail email account hacking services | |
Garkava et al. | Stolen data markets on Telegram: a crime script analysis and situational crime prevention measures | |
Al-Daraiseh et al. | Social networks’ benefits, privacy, and identity theft: KSA case study | |
Jakobsson | The death of the internet | |
Ogbanufe et al. | Towards a conceptual typology of darknet risks | |
Ahmed et al. | Impact and significance of human factors in digital information security | |
Stringhini | Adversarial behaviours knowledge area | |
Day | Security in the Digital World: For the home user, parent, consumer and home office | |
Síochána | Cyber Crime | |
Colorossi | Cyber security | |
Gunawardana | An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
Mehendele et al. | Review of Phishing Attacks and Anti Phishing Tools | |
Lewis et al. | Bits and Bytes | |
Wardle | How Long Does It Take To Get Owned | |
Plotkin | Privacy, Security, and Cyberspace | |
Willems | Today’s Threats |