Second International Conference on Internet Monitoring and Protection (ICIMP 2007) 2007
DOI: 10.1109/icimp.2007.33
|View full text |Cite
|
Sign up to set email alerts
|

Phishing Phishers - Observing and Tracing Organized Cybercrime

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 12 publications
0
13
0
1
Order By: Relevance
“…Regarding financial cybercrimes specifically, Birk et al (2007) referred to organised cybercrime in cases of identity theft through phishing, but organisational structures are not analysed in their study. More recently, Hutchings' study on computer crimes compromising data and financial security (Hutchings 2014) suggested that many cyber offenders are highly networked, cooperate with each other to commit offences, and learn their behaviour from others.…”
Section: Cyber Oc: Success and Criticism Of A Conceptmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding financial cybercrimes specifically, Birk et al (2007) referred to organised cybercrime in cases of identity theft through phishing, but organisational structures are not analysed in their study. More recently, Hutchings' study on computer crimes compromising data and financial security (Hutchings 2014) suggested that many cyber offenders are highly networked, cooperate with each other to commit offences, and learn their behaviour from others.…”
Section: Cyber Oc: Success and Criticism Of A Conceptmentioning
confidence: 99%
“…Some publications suggested that organised crime (hereafter, OC) is or might be involved in financial cybercrimes (to name a few, Williams 2001;Birk et al 2007;Grabosky 2015), which would have important policing implications, but evidence-based research on this point is still scarce and inconclusive. When it comes to criminal networks active in cyberspace, in fact, some researchers are increasingly adopting the OC narrative to describe a broad range of offenders (for instance, McGuire 2012).…”
mentioning
confidence: 99%
“…However, their solution takes effect only after a certain number of users become victims of a phishing attack. Birk et al [15] proposed a technique to inject fingerprinted credentials to phishing sites in order to trace those stolen credentials and reveal the phisher's identity.…”
Section: Related Workmentioning
confidence: 99%
“…A smurf, or more commonly termed money mule, is recruited by fraudsters as a financial intermediary who accepts money from one fraudster and forwards it to another fraudster for a fee. Mules are often engaged through the use of phishing strategies, such as bogus jobs, and not aware that they are dragged into illegal activities [9].…”
Section: Introductionmentioning
confidence: 99%