Abstract. Rogue antivirus software has recently received extensive at-tention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of the rogue antivirus threat ecosystem, focusing on the structure and dynamics of this threat and its economics. To that end, we compiled and mined a large dataset of characteristics of rogue antivirus domains and of the servers that host them. The contributions of this paper are threefold. Firstly, we offer the first, to our knowledge, broad analysis of the infrastructure underpinning the distribution of rogue security software by tracking 6,500 malicious do-mains. Secondly, we show how to apply attack attribution methodologies to correlate campaigns likely to be asso...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
Modern unsolicited bulk email, or spam, is ultimately driven by product sales: goods purchased by cu...
Rogue antivirus software has recently received extensive attention, justified by the diffusion and e...
In the past few years, Internet miscreants have developed a number of techniques to defraud and make...
Fake antivirus (AV) programs have been utilized to defraud millions ofcomputer users into paying as ...
a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More...
Nowadays, the rapid development of the Internet has given rise to a global murky underground busines...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser...
© 2017, Springer International Publishing AG. This study extensively scrutinizes 14, months of regis...
Fraud, theft and other abuses are unfortunate realities of the modern Internet. While defenders work...
Much of computer security research today engages a hypothetical adversary: one whose aims and method...
Description The datasets demonstrate the malware economy and the value chain published in our paper...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
Modern unsolicited bulk email, or spam, is ultimately driven by product sales: goods purchased by cu...
Rogue antivirus software has recently received extensive attention, justified by the diffusion and e...
In the past few years, Internet miscreants have developed a number of techniques to defraud and make...
Fake antivirus (AV) programs have been utilized to defraud millions ofcomputer users into paying as ...
a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More...
Nowadays, the rapid development of the Internet has given rise to a global murky underground busines...
Online crime (also known as cybercrime) is becoming more organized, more complex, and therefore, mor...
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser...
© 2017, Springer International Publishing AG. This study extensively scrutinizes 14, months of regis...
Fraud, theft and other abuses are unfortunate realities of the modern Internet. While defenders work...
Much of computer security research today engages a hypothetical adversary: one whose aims and method...
Description The datasets demonstrate the malware economy and the value chain published in our paper...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
The importance of securing the cyberspace is higher than ever along with the evolution of cyber atta...
Modern unsolicited bulk email, or spam, is ultimately driven by product sales: goods purchased by cu...