Online accounts are inherently valuable resources—both for the data they contain and the reputation they accrue over time. Unsurpris-ingly, this value drives criminals to steal, or hijack, such accounts. In this paper we focus on manual account hijacking—account hi-jacking performed manually by humans instead of botnets. We describe the details of the hijacking workflow: the attack vectors, the exploitation phase, and post-hijacking remediation. Finally we share, as a large online company, which defense strategies we found effective to curb manual hijacking. 1
Request forgery attacks are among the oldest threats to Web applications, traditionally caused by se...
<div>3MT presented at the 2017 Defence and Security Doctoral Symposium.</div><div><br></div><div>Acc...
Crime is undergoing a metamorphosis. The online technological revolution has created new opportuniti...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the r...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the r...
With so much of our lives digital, online, and not entirely under our control, we risk losing access...
Cloud computing is a technological breakthrough in computing. It has affected each and every part of...
With the advent of online banking more and more users are willing to make purchases online and doing...
Internet resources form the basic fabric of the digital society. They provide the fundamental platfo...
We present a large-scale characterization of attacker activity across 111 real-world enterprise orga...
There is a developing number of individuals who hold accounts via web-based networking media stages ...
Cyber-security is a rapidly growing concern for all organizations. Ransomware and Botnets are becomi...
Part 2: WorkshopInternational audienceFor over 15 years auction services have grown rapidly, constit...
Fraud, theft and other abuses are unfortunate realities of the modern Internet. While defenders work...
Nowadays, the rapid development of the Internet has given rise to a global murky underground busines...
Request forgery attacks are among the oldest threats to Web applications, traditionally caused by se...
<div>3MT presented at the 2017 Defence and Security Doctoral Symposium.</div><div><br></div><div>Acc...
Crime is undergoing a metamorphosis. The online technological revolution has created new opportuniti...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the r...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the r...
With so much of our lives digital, online, and not entirely under our control, we risk losing access...
Cloud computing is a technological breakthrough in computing. It has affected each and every part of...
With the advent of online banking more and more users are willing to make purchases online and doing...
Internet resources form the basic fabric of the digital society. They provide the fundamental platfo...
We present a large-scale characterization of attacker activity across 111 real-world enterprise orga...
There is a developing number of individuals who hold accounts via web-based networking media stages ...
Cyber-security is a rapidly growing concern for all organizations. Ransomware and Botnets are becomi...
Part 2: WorkshopInternational audienceFor over 15 years auction services have grown rapidly, constit...
Fraud, theft and other abuses are unfortunate realities of the modern Internet. While defenders work...
Nowadays, the rapid development of the Internet has given rise to a global murky underground busines...
Request forgery attacks are among the oldest threats to Web applications, traditionally caused by se...
<div>3MT presented at the 2017 Defence and Security Doctoral Symposium.</div><div><br></div><div>Acc...
Crime is undergoing a metamorphosis. The online technological revolution has created new opportuniti...