<p>A variety of botnets are used in attacks on financial services. Banks and security firms invest a lot of effort in detecting and combating malware-assisted takeover of customer accounts. A critical resource of these botnets is their command-and-control (C&C) infrastructure. Attackers rent or compromise servers to operate their C&C infrastructure. Hosting providers routinely take down C&C servers, but the effectiveness of this mitigation strategy depends on understanding how attackers select the hosting providers to host their servers. Do they prefer, for example, providers who are slow or unwilling in taking down C&Cs? In this paper, we analyze 7 years of data on the C&C servers of botnets that have engaged in attacks...
An analysis of real-world botnets1 indicates the increasing sophistication of bot2 malware and its t...
In this paper we investigate the way cyber-criminals abuse public cloud services to host part of the...
This chapter focuses on attack strategies that can be (and have been) used against financial IT infr...
A variety of botnets are used in attacks on financial services. Banks and security firms invest a lo...
In theory, hosting providers can play an important role in fighting cybercrime and misuse. This is b...
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is ...
Hosting providers are theoretically in a key position to combat cybercrime as they are often the ent...
Compromised websites are often used by attackers to deliver ma-licious content or to host phishing p...
This paper presents the first empirical study based on ground-truth data of a major Bullet-Proof Hos...
How did Avalanche, a botnet with an active lifetime of 8 years while serving 20+ malware families, e...
The ability of cyber criminals to compromise networked computer systems through the spread of malwar...
Botnet is most widespread and occurs commonly in today‘s cyber attacks, resulting in serious threats...
Botnets are a well-recognized and persistent threat to all users of the Internet. Since the first sp...
Currently, DDoS attacks have become inevitable for financial services and their threat keeps rising....
Abstract: We explain botnets and the motivation of attackers utilizing botnets with a focus on SSH b...
An analysis of real-world botnets1 indicates the increasing sophistication of bot2 malware and its t...
In this paper we investigate the way cyber-criminals abuse public cloud services to host part of the...
This chapter focuses on attack strategies that can be (and have been) used against financial IT infr...
A variety of botnets are used in attacks on financial services. Banks and security firms invest a lo...
In theory, hosting providers can play an important role in fighting cybercrime and misuse. This is b...
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is ...
Hosting providers are theoretically in a key position to combat cybercrime as they are often the ent...
Compromised websites are often used by attackers to deliver ma-licious content or to host phishing p...
This paper presents the first empirical study based on ground-truth data of a major Bullet-Proof Hos...
How did Avalanche, a botnet with an active lifetime of 8 years while serving 20+ malware families, e...
The ability of cyber criminals to compromise networked computer systems through the spread of malwar...
Botnet is most widespread and occurs commonly in today‘s cyber attacks, resulting in serious threats...
Botnets are a well-recognized and persistent threat to all users of the Internet. Since the first sp...
Currently, DDoS attacks have become inevitable for financial services and their threat keeps rising....
Abstract: We explain botnets and the motivation of attackers utilizing botnets with a focus on SSH b...
An analysis of real-world botnets1 indicates the increasing sophistication of bot2 malware and its t...
In this paper we investigate the way cyber-criminals abuse public cloud services to host part of the...
This chapter focuses on attack strategies that can be (and have been) used against financial IT infr...