Searched for: subject%3A%22Cybercrime%22
(1 - 20 of 24)

Pages

document
Oosthoek, K. (author)
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly affected individuals, companies, governments and critical infrastructure. It has led to significant financial damage, impeded critical infrastructure and harmed human lives. Defending against cybercrime is difficult, as persistent actors perpetually...
doctoral thesis 2023
document
Beudeker, Steffen (author)
Money laundering has been in existence for a long time, but with recent developments in cryptocurrency technologies, using them as a new method of laundering criminal proceeds has become available to a wider audience of criminals due to mixer services. Bitcoin can be considered pseudonymous, and Mixer services attempt to obfuscate the money...
master thesis 2022
document
Veelers, Rozemarijn (author)
Mixing services try to distort cash flow tracking of cryptocurrencies and obfuscate the origin of customers’ earnings by substituting customers’ cryptocurrency funds with the funds of other customers or the mixers’ private assets. This quality makes mixing services interesting for money laundering, and they are therefore often used by criminals....
master thesis 2022
document
Hartel, P.H. (author), van Wegberg, R.S. (author), van Staalduinen, Mark (author)
Open data promotes transparency and accountability as everyone can analyse it. Law enforcement and the judiciary are increasingly making data available, to increase trust and confidence in the criminal justice system. Due to privacy legislation, judicial open data — like court judgements — in Europe is usually anonymized. And even if the...
journal article 2022
document
Wieffering, Tristan (author)
We propose a novel, dynamic analysis-based detection solution for formjackers. The operating principle of these formjackers, or card skimmers on the web, is typically simple, yet effective: when making a payment on webshop that has been infected with a formjacker, the submitted payment information is not just transmitted to the webshop, but also...
master thesis 2021
document
Akyazi, U. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
The emergence of Cybercrime-as-a-Service (CaaS) is a critical evolution in the cybercrime landscape. A key area of research on CaaS is where and how the supply of CaaS is being matched with demand. Next to underground marketplaces and custom websites, cybercrime forums provide an important channel for CaaS suppliers to attract customers. Our...
conference paper 2021
document
Booij, Tim M. (author), Verburgh, Thijmen (author), Falconieri, Federico (author), van Wegberg, R.S. (author)
Dark net markets are a competitive environment. As these anonymous markets enable criminals to trade illicit goods or services, this causes vendors to operate under pseudonyms, rather than real-world identities. The constant battle between market admins and law enforcement makes the typical lifespan of a market two years. When a market...
conference paper 2021
document
van Wegberg, R.S. (author)
Many scientific studies and industry reports have observed the emergence of so-called cybercrime-as-a-service. The idea is that specialized suppliers in the underground economy cater to criminal entrepreneurs in need of certain capabilities – substituting specialized technical knowledge with “knowing what to buy”. The impact of this trend could...
doctoral thesis 2020
document
Hernandez Ganan, C. (author), Akyazi, U. (author), Tsvetkova, Elena (author)
One of the many facets of cybercrime consists in transactions of malicious software, fraudulent information, and other potentially harmful goods and services via underground marketplaces. A portion of these goods comprises the illegal trading of consumer products such as vouchers, coupons, and loyalty program accounts that are later used to...
conference paper 2020
document
van de Laarschot, Jochem (author)
Cybercrime thrives and online anonymous markets, or darknet markets, play an important role in the cybercriminal ecosystem. Vendors active on darknet markets invest in security mechanisms to compromise the availability or usefulness of evidence to Law Enforcement Agencies. Therefore, difficulties arise in linking identities or machines to...
master thesis 2020
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
Tsvetkova, Elena (author)
A portion of the digital fraud occurring on the dark web comprises the illegal exchange of vouchers, coupons, and stolen accounts, defined in this research as service fraud. Despite its existence, this type of fraud had not been previously explored. This thesis employs a quantitative approach to examine which company characteristics influence...
master thesis 2020
document
Noroozian, A. (author)
Hosting providers are theoretically in a key position to combat cybercrime as they are often the entities renting out the resources that end up being abused by miscreants. Yet, notwithstanding hosting providers' current security measures to combat abuse, their responses vary widely. In many cases the response is ineffective, as empirical...
doctoral thesis 2020
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
document
van Wegberg, R.S. (author), Miedema, F.E.G. (author), Akyazi, U. (author), Noroozian, A. (author), Klievink, A.J. (author), van Eeten, M.J.G. (author)
Many cybercriminal entrepreneurs lack the skills and techniques to provision certain parts of their business model, leading them to outsource these parts to specialized criminal vendors. Online anonymous markets, from Silk Road to AlphaBay, have been used to search for these products and contract with their criminal vendors. While one listing of...
conference paper 2020
document
Booij, Tim (author)
The amount of people and devices connected through the Internet has been growing at a rapid pace; as of June 2019 58,8% of the world’s population and billions of devices are joined by this vast network of information resources and services. Not every Internet user however has benign intentions. Cybercriminals use this technology for their own...
master thesis 2019
document
Bijmans, Hugo (author)
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power from others to be used in illicit cryptomining. While first observed as host-based infections with low activity, the release of an efficient browser-based cryptomining application -- as introduced by Coinhive in 2017 -- has skyrocketed...
master thesis 2019
document
Hoppenreijs, Marrit (author)
The European financial sector is a frequent victim of banking malware leading to massive losses. It appears that not all customers’ banks are equally attractive targets among cybercriminals who deploy banking malware. This research established a comprehensive regression model explaining why certain banks are more attractive to cybercriminals....
master thesis 2019
document
van der Meulen, Sietske (author)
Digitalization and automation brings many amazing things; games, social media, navigation. However, it also makes us more vulnerable. The facelessness of cyber space and the emancipation of place makes it hard to grasp. Additionally, our personal data becomes more valuable and thereby more lucrative to criminalize. The combination of these...
master thesis 2019
document
van der Wagen, Wytske (author), Pieters, W. (author)
Victims are often conceptualized as single, human and static entities with certain risk factors that make them more vulnerable and attractive for offenders. This framework is challenged by emerging forms of high-tech cybercrime, such as ransomware, botnets and virtual theft, in which the offender targets a composite of human, technical and...
journal article 2018
Searched for: subject%3A%22Cybercrime%22
(1 - 20 of 24)

Pages