419 research outputs found
That ain’t you: Blocking spearphishing through behavioral modelling
One of the ways in which attackers steal sensitive information from corporations is by sending spearphishing emails. A typical spearphishing email appears to be sent by one of the victim’s coworkers or business partners, but has instead been crafted by the attacker. A particularly insidious type of spearphishing emails are the ones that do not only claim to be written by a certain person, but are also sent by that person’s email account, which has been compromised. Spearphishing emails are very dangerous for companies, because they can be the starting point to a more sophisticated attack or cause intellectual property theft, and lead to high financial losses. Currently, there are no effective systems to protect users against such threats. Existing systems leverage adaptations of anti-spam techniques. However, these techniques are often inadequate to detect spearphishing attacks. The reason is that spearphishing has very different characteristics from spam and even traditional phishing. To fight the spearphishing threat, we propose a change of focus in the techniques that we use for detecting malicious emails: instead of looking for features that are indicative of attack emails, we look for emails that claim to have been written by a certain person within a company, but were actually authored by an attacker. We do this by modelling the email-sending behavior of users over time, and comparing any subsequent email sent by their accounts against this model. Our approach can block advanced email attacks that traditional protection systems are unable to detect, and is an important step towards detecting advanced spearphishing attacks
Permissions Snapshots: Assessing Users' Adaptation to the Android Runtime Permission Model
The Android operating system changed its security and privacy-related permission model recently, offering its users the ability to control resources that applications are allowed to access on their devices. This major change to the traditional coarse-grained permission system was anticipated for a long time by privacy-aware users. This paper presents the first study that analyzes Android users' adaptation to the fine-grained runtime permission model, regarding their security and privacy controls. We gathered anonymous data from 50 participants who downloaded our application and answered questions related to the new permission model. The results indicate that the majority of users prefer the new model. We also collected data that demonstrate users' security controls at the given time. Our analysis shows that individuals make consistent choices regarding the resources they allow to various applications to access
Quit playing games with my heart: Understanding online dating scams
© Springer International Publishing Switzerland 2015. Online dating sites are experiencing a rise in popularity, with one in five relationships in the United States starting on one of these sites. Online dating sites provide a valuable platform not only for single people trying to meet a life partner, but also for cybercriminals, who see in people looking for love easy victims for scams. Such scams span from schemes similar to traditional advertisement of illicit services or goods (i.e., spam) to advanced schemes, in which the victim starts a long-distance relationship with the scammer and is eventually extorted money. In this paper we perform the first large-scale study of online dating scams. We analyze the scam accounts detected on a popular online dating site over a period of eleven months, and provide a taxonomy of the different types of scammers that are active in the online dating landscape. We show that different types of scammers target a different demographics on the site, and therefore set up accounts with different characteristics. Our results shed light on the threats associated to online dating scams, and can help researchers and practitioners in developing effective countermeasures to fight them
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
Most of cyberscam-related studies focus on threats perpetrated against the Western society, with a particular attention to the USA and Europe. Regrettably, no research has been done on scams targeting African countries, especially Nigeria, where the notorious and (in)famous 419 advanced-fee scam, targeted towards other countries, originated. How- ever, as we know, cybercrime is a global problem affecting all parties. In this study, we investigate a form of advance fee fraud scam unique to Nigeria and targeted at Nigerians, but unknown to the Western world. For the study, we rely substantially on almost two years worth of data harvested from an on-line discussion forum used by criminals. We complement this dataset with recent data from three other active forums to consolidate and generalize the research. We apply machine learning to the data to understand the criminals' modus operandi. We show that the criminals exploit the socio-political and economic problems prevalent in the country to craft various fraud schemes to defraud vulnerable groups such as secondary school students and unemployed graduates. The result of our research can help potential victims and policy makers to develop measures to counter the activities of these criminal groups
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild
Cybercriminals steal access credentials to online accounts
and then misuse them for their own profit, release them publicly,
or sell them on the underground market. Despite the
importance of this problem, the research community still
lacks a comprehensive understanding of what these stolen
accounts are used for. In this paper, we aim to shed light
on the modus operandi of miscreants accessing stolen Gmail
accounts. We developed an infrastructure that is able to monitor
the activity performed by users on Gmail accounts, and
leaked credentials to 100 accounts under our control through
various means, such as having information-stealing malware
capture them, leaking them on public paste sites, and posting
them on underground forums. We then monitored the activity
recorded on these accounts over a period of 7 months.
Our observations allowed us to devise a taxonomy of malicious
activity performed on stolen Gmail accounts, to identify
differences in the behavior of cybercriminals that get access
to stolen accounts through different means, and to identify
systematic attempts to evade the protection systems in
place at Gmail and blend in with the legitimate user activity.
This paper gives the research community a better understanding
of a so far understudied, yet critical aspect of the
cybercrime economy
Towards Detecting Compromised Accounts on Social Networks
Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts of these incidents range from a tarnished reputation to multi-billion dollar monetary losses on financial markets. In our previous work, we demonstrated how we can detect large-scale compromises (i.e., so-called campaigns) of regular online social network users. In this work, we show how we can use similar techniques to identify compromises of individual high-profile accounts. High-profile accounts frequently have one characteristic that makes this detection reliable -- they show consistent behavior over time. We show that our system, were it deployed, would have been able to detect and prevent three real-world attacks against popular companies and news agencies. Furthermore, our system, in contrast to popular media, would not have fallen for a staged compromise instigated by a US restaurant chain for publicity reasons
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts
We set out to understand the effects of differing language on the
ability of cybercriminals to navigate webmail accounts and locate
sensitive information in them. To this end, we configured thirty
Gmail honeypot accounts with English, Romanian, and Greek language
settings. We populated the accounts with email messages in
those languages by subscribing them to selected online newsletters.
We also hid email messages about fake bank accounts in fifteen
of the accounts to mimic real-world webmail users that sometimes
store sensitive information in their accounts. We then leaked credentials
to the honey accounts via paste sites on the Surface Web
and the Dark Web, and collected data for fifteen days. Our statistical
analyses on the data show that cybercriminals are more likely to
discover sensitive information (bank account information) in the
Greek accounts than the remaining accounts, contrary to the expectation
that Greek ought to constitute a barrier to the understanding
of non-Greek visitors to the Greek accounts. We also extracted the
important words among the emails that cybercriminals accessed (as
an approximation of the keywords that they possibly searched for
within the honey accounts), and found that financial terms featured
among the top words. In summary, we show that language plays a
significant role in the ability of cybercriminals to access sensitive
information hidden in compromised webmail accounts
What's in a Name? Understanding Profile Name Reuse on Twitter
Users on Twitter are commonly identified by their profile names. These names are used when directly addressing users on Twitter, are part of their profile page URLs, and can become a trademark for popular accounts, with people referring to celebrities by their real name and their profile name, interchangeably. Twitter, however, has chosen to not permanently link profile names to their corresponding user accounts. In fact, Twitter allows users to change their profile name, and afterwards makes the old profile names available for other users to take.
In this paper, we provide a large-scale study of the phenomenon of profile name reuse on Twitter. We show that this phenomenon is not uncommon, investigate the dynamics of profile name reuse, and characterize the accounts that are involved in it. We find that many of these accounts adopt abandoned profile names for questionable purposes, such as spreading malicious content, and using the profile name's popularity for search engine optimization. Finally, we show that this problem is not unique to Twitter (as other popular online social networks also release profile names) and argue that the risks involved with profile-name reuse outnumber the advantages provided by this feature
Detecting Aggressors and Bullies on Twitter
Online social networks constitute an integral part of people's every day social activity and the existence of aggressive and bullying phenomena in such spaces is inevitable. In this work, we analyze user behavior on Twitter in an effort to detect cyberbullies and cuber-aggressors by considering specific attributes of their online activity using machine learning classifiers
- …
