TB

Tim Booij

Authored

2 records found as author

Off-the-shelf, easy-to-deploy phishing kits are believed to lower the threshold for criminal entrepreneurs going phishing. That is, the practice of harvesting user credentials by tricking victims into disclosing these on fraudulent websites. But, how do these kits impact the phis ...

Opening Pandora’s Box

Charting the ecosystem of Command and Control infrastructures in a terabit-scale network

The amount of people and devices connected through the Internet has been growing at a rapid pace; as of June 2019 58,8% of the world’s population and billions of devices are joined by this vast network of information resources and services. Not every Internet user however has ben ...

Contributed

1 records found as contributor

Inadvertently making cyber criminals rich

A comprehensive study of cryptojacking campaigns at internet scale

Since the release of a browser-based cryptominer by Coinhive in 2017, the easy use of these miners has skyrocketed illicit cryptomining in 2017 and continued in 2018. This method of monetizing websites attracted website owners, as well as criminals seeking new ways to earn a p ...