Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services

B Collier, DR Thomas, R Clayton, A Hutchings… - Policing and …, 2022 - Taylor & Francis
We document and evaluate emerging policing strategies that are reshaping how centralised
law enforcement agencies deal with online cybercrime markets. The first of these we term …

More Amazon than Mafia: analysing a DDoS stresser service as organised cybercrime

R Musotto, DS Wall - Trends in Organized Crime, 2020 - Springer
The internet mafia trope has shaped our knowledge about organised crime groups online,
yet the evidence is largely speculative and the logic often flawed. This paper adds to current …

[HTML][HTML] Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals

ER Leukfeldt, TJ Holt - Computers in Human Behavior, 2022 - Elsevier
Criminologists have frequently debated whether offenders are specialists, in that they
consistently perform either one offense or similar offenses, or versatile by performing any …

[HTML][HTML] Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices

P Nespoli, D Díaz-López, FG Mármol - Journal of Information Security and …, 2021 - Elsevier
Undoubtedly, modern human digital lives are every day more and more connected, and the
revolution of “everything connected” is already becoming a reality. Indeed, humans live in …

How cyber insurance shapes incident response: A mixed methods study

DW Woods, R Böhme - The 20th Annual Workshop on the …, 2021 - research.ed.ac.uk
Cyber insurance policies commonly indemnify the cost of incident response services. This
creates a multi-layered economic problem in that the policyholder hiring external firms incurs …

On the motivations and challenges of affiliates involved in cybercrime

M Paquet-Clouston, S García - Trends in Organized Crime, 2022 - Springer
The cybercrime industry is characterised by work specialisation to the point that it has
become a volume industry with various “as-a-service” offerings. One well-established “as-a …

Money over morals: A business analysis of conti ransomware

IW Gray, J Cable, B Brown, V Cuiujuclu… - … APWG Symposium on …, 2022 - ieeexplore.ieee.org
Ransomware operations have evolved from relatively unsophisticated threat actors into
highly coordinated cybercrime syndicates that regularly extort millions of dollars in a single …

Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service

V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …

Mitigation of cyber security risk threats during the Covid-19 pandemic

K Dai, IL Kawaki, LD Sakti - … Journal of Cyber and IT Service …, 2023 - iiast.iaic-publisher.org
Cyber security mitigation is becoming an increasingly urgent aspect in today's digital era, in
response to the threat of theft and disruption to information systems, software and hardware …

You can tell a cybercriminal by the company they keep: A framework to infer the relevance of underground communities to the threat landscape

M Campobasso, R Rădulescu, S Brons… - arXiv preprint arXiv …, 2023 - arxiv.org
The criminal underground is populated with forum marketplaces where, allegedly,
cybercriminals share and trade knowledge, skills, and cybercrime products. However, it is …