2009
DOI: 10.1145/1515964.1517412
|View full text |Cite
|
Sign up to set email alerts
|

Cybercrime 2.0: When the Cloud Turns Dark

Abstract: joined Google in 2003 and is currently a principal software engineer in the Infrastructure Security Group. His areas of interest include computer and network security, as well as large-scale distributed systems. He serves on the Usenix board of directors. MOHEEB ABU RAJAB

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
22
0
2

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 2 publications
1
22
0
2
Order By: Relevance
“…Emphasis that digital shadow economy activities are profit-driven reveals the general purpose of the phenomenon -financial gain (Holz Moore et al 2009 and others). Inclusion of sophisticated equipment, the requirement for advanced technical skills as well as a high degree of coordination between the offending parties are also pointed out (Dittrich 2009;Provos et al 2009;Vlachos et al 2011). The basic detriment brought about by digital shadow economy is composed of deprivation of the officially registered entities from potential gains (profit, revenues) and lost revenues in the state budget (Vlachos et al 2011;Holz et al 2012;Dobson et al 2015 and others).…”
Section: Concepts Features and Channels Of Digital Shadow Economy: Tmentioning
confidence: 99%
“…Emphasis that digital shadow economy activities are profit-driven reveals the general purpose of the phenomenon -financial gain (Holz Moore et al 2009 and others). Inclusion of sophisticated equipment, the requirement for advanced technical skills as well as a high degree of coordination between the offending parties are also pointed out (Dittrich 2009;Provos et al 2009;Vlachos et al 2011). The basic detriment brought about by digital shadow economy is composed of deprivation of the officially registered entities from potential gains (profit, revenues) and lost revenues in the state budget (Vlachos et al 2011;Holz et al 2012;Dobson et al 2015 and others).…”
Section: Concepts Features and Channels Of Digital Shadow Economy: Tmentioning
confidence: 99%
“…In the same category we can include drive-by download attacks. Once an attacker embeds malicious code in a vulnerable website, the drive-by download runs automatically when a user visits the website [Mavromatis and Monrose 2008;Provos et al 2009]. In general, full automation can help hide the origin of a semantic attack and reduce the effort required to replicate it, but also limits control over the process.…”
Section: Ma: Mode Of Automationmentioning
confidence: 99%
“…via phishing email, social media post etc). The machines of the users are infected when they open the link to the website [Mavromatis and Monrose 2008;Provos et al 2009;Egele et al 2008;Cova et al 2010]. The deception takes advantage of the normal-looking cosmetics and behaviour of the affected website.…”
Section: Ap2 Es1mentioning
confidence: 99%
“…This could mean that they may; Make a misinformed conclusion or decision (this could range from something very small to very large) Unable to find genuine content Spend additional time on a website as they filtering and searching through genuine and spam content Attempt to inform staff of the problem (which of course may redundantly occur many times by many users) Simply give up and no longer visit the site / lose interest Become emotionally frustrated, angry etc Being redirected to another site which may be one that replicates the original, is an advertising page or may even be something illegal and/or offensive. Their computer becomes infected with Malware [11]. The six stages are shown in Fig.…”
Section: F Content Consumermentioning
confidence: 99%