Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services
We document and evaluate emerging policing strategies that are reshaping how centralised
law enforcement agencies deal with online cybercrime markets. The first of these we term …
law enforcement agencies deal with online cybercrime markets. The first of these we term …
More Amazon than Mafia: analysing a DDoS stresser service as organised cybercrime
The internet mafia trope has shaped our knowledge about organised crime groups online,
yet the evidence is largely speculative and the logic often flawed. This paper adds to current …
yet the evidence is largely speculative and the logic often flawed. This paper adds to current …
[HTML][HTML] Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals
ER Leukfeldt, TJ Holt - Computers in Human Behavior, 2022 - Elsevier
Criminologists have frequently debated whether offenders are specialists, in that they
consistently perform either one offense or similar offenses, or versatile by performing any …
consistently perform either one offense or similar offenses, or versatile by performing any …
[HTML][HTML] Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices
Undoubtedly, modern human digital lives are every day more and more connected, and the
revolution of “everything connected” is already becoming a reality. Indeed, humans live in …
revolution of “everything connected” is already becoming a reality. Indeed, humans live in …
How cyber insurance shapes incident response: A mixed methods study
Cyber insurance policies commonly indemnify the cost of incident response services. This
creates a multi-layered economic problem in that the policyholder hiring external firms incurs …
creates a multi-layered economic problem in that the policyholder hiring external firms incurs …
On the motivations and challenges of affiliates involved in cybercrime
M Paquet-Clouston, S García - Trends in Organized Crime, 2022 - Springer
The cybercrime industry is characterised by work specialisation to the point that it has
become a volume industry with various “as-a-service” offerings. One well-established “as-a …
become a volume industry with various “as-a-service” offerings. One well-established “as-a …
Money over morals: A business analysis of conti ransomware
Ransomware operations have evolved from relatively unsophisticated threat actors into
highly coordinated cybercrime syndicates that regularly extort millions of dollars in a single …
highly coordinated cybercrime syndicates that regularly extort millions of dollars in a single …
Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service
V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …
Mitigation of cyber security risk threats during the Covid-19 pandemic
K Dai, IL Kawaki, LD Sakti - … Journal of Cyber and IT Service …, 2023 - iiast.iaic-publisher.org
Cyber security mitigation is becoming an increasingly urgent aspect in today's digital era, in
response to the threat of theft and disruption to information systems, software and hardware …
response to the threat of theft and disruption to information systems, software and hardware …
You can tell a cybercriminal by the company they keep: A framework to infer the relevance of underground communities to the threat landscape
M Campobasso, R Rădulescu, S Brons… - arXiv preprint arXiv …, 2023 - arxiv.org
The criminal underground is populated with forum marketplaces where, allegedly,
cybercriminals share and trade knowledge, skills, and cybercrime products. However, it is …
cybercriminals share and trade knowledge, skills, and cybercrime products. However, it is …