DocumentCode
652331
Title
Crime Toolkits: The Productisation of Cybercrime
Author
Alazab, Ammar ; Abawajy, Jemal ; Hobbs, Mike ; Layton, Richard ; Khraisat, Ansam
Author_Institution
Parallel & Distrib. Comput. Lab., Deakin Univ., Geelong, VIC, Australia
fYear
2013
fDate
16-18 July 2013
Firstpage
1626
Lastpage
1632
Abstract
The productisation of crime toolkits is happening at an ever-increasing rate. Previous attacks that required in-depth knowledge of computer systems can now be purchased online. Large scale attacks previously requiring months to set-up a botnet can now be scheduled for a small fee. Criminals are leveraging this opportunity of commercialization, by compromising web applications and user´s browser, to gain advantages such as using the computer´s resources for launching further attacks, or stealing data such as identifying information.Crime toolkits are being developed to attack an increasing number of applications and can now be deployed by attackers with little technical knowledge. This paper surveys the current trends in crime toolkits, with a case study on the Zeus botnet. We profile the types of exploits that malicious writers prefer, with a view to predicting future attack trends. We find that the scope for damage is increasing, particularly as specialisation and scale increase in cybercrime.
Keywords
Internet; computer crime; invasive software; Web applications; Zeus botnet; computer systems; crime toolkits; criminals; cybercrime productisation; future attack trends; identifying information; large scale attacks; malicious writers; user browser; Browsers; Computers; Electronic mail; Malware; Servers; Software; cybercrime; attack; styling; crime toolkits Introduction;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location
Melbourne, VIC
Type
conf
DOI
10.1109/TrustCom.2013.273
Filename
6681026
Link To Document