A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists

Case studies show that there are at least two types of groups involved in phishing: low-tech all-rounders and high-tech specialists. However, empirical criminological research into cybercriminal networks is scarce. This article presents a taxonomy of cybercriminal phishing networks, based on analysi...

Full description

Saved in:  
Bibliographic Details
Authors: Leukfeldt, E. R. 1982- (Author) ; Kleemans, Edward R. 1967- (Author) ; Stol, Wouter 1958- (Author)
Format: Electronic Article
Language:English
Published: 2017
In: Crime, law and social change
Year: 2017, Volume: 67, Issue: 1, Pages: 21-37
Online Access: Presumably Free Access
Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1853780006
003 DE-627
005 20240311152440.0
007 cr uuu---uuuuu
008 230727s2017 xx |||||o 00| ||eng c
024 7 |a 10.1007/s10611-016-9662-2  |2 doi 
035 |a (DE-627)1853780006 
035 |a (DE-599)KXP1853780006 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Leukfeldt, E. R.  |d 1982-  |e VerfasserIn  |0 (DE-588)142549843  |0 (DE-627)63674664X  |0 (DE-576)326932488  |4 aut 
109 |a Leukfeldt, E. R. 1982-  |a Leukfeldt, Rutger 1982-  |a Leukfeldt, E. Rutger 1982-  |a Leukfeldt, Eric Rutger 1982- 
245 1 2 |a A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists  |c E. Rutger Leukfeldt, Edward R. Kleemans, Wouter P. Stol 
264 1 |c 2017 
300 |b Illustrationen 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Literaturverzeichnis: Seite 37 
520 |a Case studies show that there are at least two types of groups involved in phishing: low-tech all-rounders and high-tech specialists. However, empirical criminological research into cybercriminal networks is scarce. This article presents a taxonomy of cybercriminal phishing networks, based on analysis of 18 Dutch police investigations into phishing and banking malware networks. There appears to be greater variety than shown by previous studies. The analyzed networks cannot easily be divided into two sharply defined categories. However, characteristics such as technology use and offender-victim interaction can be used to construct a typology with four overlapping categories: from low-tech attacks with a high degree of direct offender-victim interaction to high-tech attacks without such interaction. Furthermore, clear differences can be distinguished between networks carrying out low-tech attacks and high-tech attacks. Low-tech networks, for example, make no victims in other countries and core members and facilitators generally operate from the same country. High-tech networks, on the contrary, have more international components. Finally, networks with specialists focusing on one type of crime are present in both low-tech and high-tech networks. These specialist networks have more often a local than an international focus. 
650 4 |a Criminal networks 
650 4 |a Cybercrime 
650 4 |a Malware 
650 4 |a Organized Crime 
650 4 |a Phishing 
650 4 |a Theory 
700 1 |a Kleemans, Edward R.  |d 1967-  |e VerfasserIn  |0 (DE-588)1144379520  |0 (DE-627)1680943863  |0 (DE-576)495230502  |4 aut 
700 1 |a Stol, Wouter  |d 1958-  |e VerfasserIn  |0 (DE-588)173476449  |0 (DE-627)698389786  |0 (DE-576)134321804  |4 aut 
773 0 8 |i Enthalten in  |t Crime, law and social change  |d Getzville, NY : HeinOnline, 1991  |g 67(2017), 1, Seite 21-37  |h Online-Ressource  |w (DE-627)320525325  |w (DE-600)2015096-9  |w (DE-576)252295854  |x 1573-0751  |7 nnns 
773 1 8 |g volume:67  |g year:2017  |g number:1  |g pages:21-37 
856 |u https://research.vu.nl/files/151519922/Leukfeldt2017_Article_ATypologyOfCybercriminalNetworks.pdf  |x unpaywall  |z Vermutlich kostenfreier Zugang  |h repository [oa repository (via OAI-PMH doi match)] 
856 4 0 |u https://doi.org/10.1007/s10611-016-9662-2  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4358180108 
LOK |0 003 DE-627 
LOK |0 004 1853780006 
LOK |0 005 20240311152440 
LOK |0 008 230727||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krzo 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw