Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23163
|View full text |Cite
|
Sign up to set email alerts
|

Dial One for Scam: A Large-Scale Analysis of Technical Support Scams

Abstract: Abstract-In technical support scams, cybercriminals attempt to convince users that their machines are infected with malware and are in need of their technical support. In this process, the victims are asked to provide scammers with remote access to their machines, who will then "diagnose the problem", before offering their support services which typically cost hundreds of dollars. Despite their conceptual simplicity, technical support scams are responsible for yearly losses of tens of millions of dollars from … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
68
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 57 publications
(70 citation statements)
references
References 19 publications
0
68
2
Order By: Relevance
“…The labeling was performed by the authors where each one chose among the following labels: social engineering (surveys, scams such as tech support scam [62], malicious downloads), trademark abuse (websites capitalizing on the brand of the squatted trademarks), unrelated (seemingly benign and unrelated websites), and error/under construction. Finally, the resulting labels are then used to label the entire clusters in which each sampled screenshot belongs.…”
Section: Exploring and Labeling Combosquatting Domainsmentioning
confidence: 99%
“…The labeling was performed by the authors where each one chose among the following labels: social engineering (surveys, scams such as tech support scam [62], malicious downloads), trademark abuse (websites capitalizing on the brand of the squatted trademarks), unrelated (seemingly benign and unrelated websites), and error/under construction. Finally, the resulting labels are then used to label the entire clusters in which each sampled screenshot belongs.…”
Section: Exploring and Labeling Combosquatting Domainsmentioning
confidence: 99%
“…Pop-up scam has not been researched in much detail yet. Miramirkhani et al [13] performed a large-scale analysis of one particular type of pop-up scams, namely technical support scams. Their methodology included a check for JavaScript alert boxes.…”
Section: Related Workmentioning
confidence: 99%
“…The incoming calls to these phone numbers are treated as malicious calls and analyzed. For more targeted scam calls, such as technical support scams, existing work [22] does a systematic study of both the scams and the call centers behind them. These works typically require recording and analyzing the voice content of the incoming calls, which may break user privacy.…”
Section: B Telephony Malicious Call Analysismentioning
confidence: 99%