Banking malware and the laundering of its profits

Banking malware is malicious software that aims to steal money from victims via manipulated bank transfers in online banking. This paper describes how the profits of banking malware are generated and subsequently laundered, with a particular focus on the use of bitcoins and other digital payment met...

Full description

Saved in:  
Bibliographic Details
Main Author: Custers, Bart HM (Author)
Contributors: Pool, Ronald LD (Other) ; Cornelisse, Remon (Other)
Format: Electronic Article
Language:English
Published: 2019
In: European journal of criminology
Online Access: Presumably Free Access
Volltext (Verlag)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a2200000 4500
001 167718289X
003 DE-627
005 20230428155130.0
007 cr uuu---uuuuu
008 190917s2019 xx |||||o 00| ||eng c
024 7 |a 10.1177/1477370818788007  |2 doi 
035 |a (DE-627)167718289X 
035 |a (DE-599)KXP167718289X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Custers, Bart HM  |4 aut 
245 1 0 |a Banking malware and the laundering of its profits  |c Bart HM Custers, Ronald LD Pool, Remon Cornelisse 
264 1 |c 2019 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Banking malware is malicious software that aims to steal money from victims via manipulated bank transfers in online banking. This paper describes how the profits of banking malware are generated and subsequently laundered, with a particular focus on the use of bitcoins and other digital payment methods. Computers are infected with banking malware via phishing emails, in which people are persuaded in various ways to click on links or open attachments, or via exploit kits, programs that try to find weak spots in the security of computer systems. After infection, bank transfers of the online banking accounts of victims are manipulated via fake website screens (web injects). Behind the screens the amounts and beneficiaries of transactions are modified, emptying the victims’ bank accounts. In the next step, the banking malware profits are laundered. In this paper we describe two models that are used in particular (next to more traditional money laundering methods). The first model involves the use of money mules and a quick cash-out. The second model focuses on direct spending via (a) direct purchases of products via online shopping, (b) direct purchases of bitcoins via Bitcoin exchanges or (c) direct purchases of luxury goods. Bitcoins can be further laundered via so-called mixing services. All in all, these methods allow criminals to launder profits in relative anonymity and prevent seizure of the illegal profits. 
700 1 |a Pool, Ronald LD  |4 oth 
700 1 |a Cornelisse, Remon  |4 oth 
773 0 8 |i Enthalten in  |t European journal of criminology  |d London [u.a.] : Sage, 2004  |g 16(2019), 6, Seite 728-745  |h Online-Ressource  |w (DE-627)379048256  |w (DE-600)2135314-1  |w (DE-576)112775543  |x 1741-2609  |7 nnns 
773 1 8 |g volume:16  |g year:2019  |g number:6  |g pages:728-745 
856 |u https://scholarlypublications.universiteitleiden.nl/access/item%3A2908689/view  |x unpaywall  |z Vermutlich kostenfreier Zugang  |h repository [oa repository (via OAI-PMH doi match)] 
856 4 0 |u http://doi.org/10.1177/1477370818788007  |x Verlag  |3 Volltext 
936 u w |d 16  |j 2019  |e 6  |h 728-745 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3516322764 
LOK |0 003 DE-627 
LOK |0 004 167718289X 
LOK |0 005 20190917154358 
LOK |0 008 190917||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 689   |a s  |a Banking malware 
LOK |0 689   |a s  |a Bitcoins 
LOK |0 689   |a s  |a Cybercrime 
LOK |0 689   |a s  |a Money laundering 
LOK |0 689   |a s  |a Money mules 
LOK |0 689   |a s  |a Geldwäsche 
LOK |0 689   |a s  |a Schadsoftware 
LOK |0 689   |a s  |a Bankgeschäfte 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krub 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw