One of the many facets of cybercrime consists in transactions of malicious software, fraudulent information, and other potentially harmful goods and services via underground marketplaces. A portion of these goods comprises the illegal trading of consumer products such as vouchers, coupons, and loyalty program accounts that are later used to commit business fraud. Despite its well-known existence, the impact of this type of business fraud has not been analyzed in depth before. By leveraging longitudinal data from 8 major underground markets from 2011-2017, we identify, classify and quantify different types of business fraud to then analyze the characteristics of the companies who suffered from them. Moreover, we investigate factors that infl...
Nowadays, the rapid development of the Internet has given rise to a global murky underground busines...
Often overlooked in the measurement of crime is the underlying size of offender populations. This ho...
We study an active underground economy that trades stolen digital credentials.We present a method wi...
A portion of the digital fraud occurring on the dark web comprises the illegal exchange of vouchers,...
Cybercriminal entrepreneurs on online anonymous markets rely on security mechanisms to thwart invest...
As web services such as Twitter, Facebook, Google, and Yahoo now dominate the daily activities of In...
This paper studies an active underground economy which specializes in the commoditization of activit...
Fraud with online payment services is an ongoing problem, with significant financial-economic and so...
Researchers have observed the increasing commoditization of cybercrime, that is, the offering of cap...
Cybercrime thrives and online anonymous markets, or darknet markets, play an important role in the c...
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly af...
The infamous darknet hosts an underground economy for illegal goods and services, some of which can ...
Many cybercriminal entrepreneurs lack the skills and techniques to provision certain parts of their ...
The tremendous growth of e-commerce on the Internet has allowed criminals to bring all of their pre-...
Fake antivirus (AV) programs have been utilized to defraud millions ofcomputer users into paying as ...
Nowadays, the rapid development of the Internet has given rise to a global murky underground busines...
Often overlooked in the measurement of crime is the underlying size of offender populations. This ho...
We study an active underground economy that trades stolen digital credentials.We present a method wi...
A portion of the digital fraud occurring on the dark web comprises the illegal exchange of vouchers,...
Cybercriminal entrepreneurs on online anonymous markets rely on security mechanisms to thwart invest...
As web services such as Twitter, Facebook, Google, and Yahoo now dominate the daily activities of In...
This paper studies an active underground economy which specializes in the commoditization of activit...
Fraud with online payment services is an ongoing problem, with significant financial-economic and so...
Researchers have observed the increasing commoditization of cybercrime, that is, the offering of cap...
Cybercrime thrives and online anonymous markets, or darknet markets, play an important role in the c...
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly af...
The infamous darknet hosts an underground economy for illegal goods and services, some of which can ...
Many cybercriminal entrepreneurs lack the skills and techniques to provision certain parts of their ...
The tremendous growth of e-commerce on the Internet has allowed criminals to bring all of their pre-...
Fake antivirus (AV) programs have been utilized to defraud millions ofcomputer users into paying as ...
Nowadays, the rapid development of the Internet has given rise to a global murky underground busines...
Often overlooked in the measurement of crime is the underlying size of offender populations. This ho...
We study an active underground economy that trades stolen digital credentials.We present a method wi...