A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists
Case studies show that there are at least two types of groups involved in phishing: low-tech all-rounders and high-tech specialists. However, empirical criminological research into cybercriminal networks is scarce. This article presents a taxonomy of cybercriminal phishing networks, based on analysi...
Main Author: | |
---|---|
Contributors: | ; |
Format: | Electronic Article |
Language: | English |
Published: |
2017
|
In: |
Crime, law and social change
Year: 2017, Volume: 67, Issue: 1, Pages: 21-37 |
Online Access: |
Presumably Free Access Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000caa a22000002c 4500 | ||
---|---|---|---|
001 | 1853780006 | ||
003 | DE-627 | ||
005 | 20240311152440.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230727s2017 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s10611-016-9662-2 |2 doi | |
035 | |a (DE-627)1853780006 | ||
035 | |a (DE-599)KXP1853780006 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Leukfeldt, E. R. |d 1982- |e VerfasserIn |0 (DE-588)142549843 |0 (DE-627)63674664X |0 (DE-576)326932488 |4 aut | |
109 | |a Leukfeldt, E. R. 1982- |a Leukfeldt, Rutger 1982- |a Leukfeldt, E. Rutger 1982- |a Leukfeldt, Eric Rutger 1982- | ||
245 | 1 | 2 | |a A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists |c E. Rutger Leukfeldt, Edward R. Kleemans, Wouter P. Stol |
264 | 1 | |c 2017 | |
300 | |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Literaturverzeichnis: Seite 37 | ||
520 | |a Case studies show that there are at least two types of groups involved in phishing: low-tech all-rounders and high-tech specialists. However, empirical criminological research into cybercriminal networks is scarce. This article presents a taxonomy of cybercriminal phishing networks, based on analysis of 18 Dutch police investigations into phishing and banking malware networks. There appears to be greater variety than shown by previous studies. The analyzed networks cannot easily be divided into two sharply defined categories. However, characteristics such as technology use and offender-victim interaction can be used to construct a typology with four overlapping categories: from low-tech attacks with a high degree of direct offender-victim interaction to high-tech attacks without such interaction. Furthermore, clear differences can be distinguished between networks carrying out low-tech attacks and high-tech attacks. Low-tech networks, for example, make no victims in other countries and core members and facilitators generally operate from the same country. High-tech networks, on the contrary, have more international components. Finally, networks with specialists focusing on one type of crime are present in both low-tech and high-tech networks. These specialist networks have more often a local than an international focus. | ||
650 | 4 | |a Criminal networks | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Malware | |
650 | 4 | |a Organized Crime | |
650 | 4 | |a Phishing | |
650 | 4 | |a Theory | |
700 | 1 | |a Kleemans, Edward R. |d 1967- |e VerfasserIn |0 (DE-588)1144379520 |0 (DE-627)1680943863 |0 (DE-576)495230502 |4 aut | |
700 | 1 | |a Stol, Wouter |d 1958- |e VerfasserIn |0 (DE-588)173476449 |0 (DE-627)698389786 |0 (DE-576)134321804 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Crime, law and social change |d Getzville, NY : HeinOnline, 1991 |g 67(2017), 1, Seite 21-37 |h Online-Ressource |w (DE-627)320525325 |w (DE-600)2015096-9 |w (DE-576)252295854 |x 1573-0751 |7 nnas |
773 | 1 | 8 | |g volume:67 |g year:2017 |g number:1 |g pages:21-37 |
856 | |u https://research.vu.nl/files/151519922/Leukfeldt2017_Article_ATypologyOfCybercriminalNetworks.pdf |x unpaywall |z Vermutlich kostenfreier Zugang |h repository [oa repository (via OAI-PMH doi match)] | ||
856 | 4 | 0 | |u https://doi.org/10.1007/s10611-016-9662-2 |x Resolving-System |z lizenzpflichtig |3 Volltext |
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4358180108 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1853780006 | ||
LOK | |0 005 20240311152440 | ||
LOK | |0 008 230727||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21-110 |c DE-627 |d DE-21-110 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-21-110 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a krzo | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw |