[PDF] Understanding eWhoring | Semantic Scholar (2024)

Figures and Tables from this paper

  • figure 1
  • table I

Topics

eWhoring (opens in a new tab)Hackforums (opens in a new tab)Cambridge Cybercrime Centre (opens in a new tab)CrimeBB (opens in a new tab)Booter Services (opens in a new tab)Crime Script Analysis (opens in a new tab)Underground Forums (opens in a new tab)Business Models (opens in a new tab)Crime-commission Processes (opens in a new tab)

26 Citations

Measuring eWhoring
    S. PastranaAlice HutchingsDaniel R. ThomasJ. Tapiador

    Computer Science, Sociology

    Internet Measurement Conference

  • 2019

A processing pipeline is presented to quantitatively analyse various aspects of eWhoring, including the acquisition and provenance of images; the financial profits and monetisation techniques; and a social network analysis of the offenders.

  • 30
  • PDF
Online sextortion: Characteristics of offences from a decade of community reporting
    Matthew EdwardsNick M. Hollely

    Sociology, Law

    Journal of Economic Criminology

  • 2023
  • 1
  • PDF
Hacker's Paradise: Analysing Music in a Cybercrime Forum
    Anna TalasAlice Hutchings

    Sociology, Computer Science

    2023 APWG Symposium on Electronic Crime Research…

  • 2023

It is found that users who post on music boards post significantly less criminal content elsewhere on the forum, however when broken down by crime type they are significantly more likely to post about eWhoring and trading credentials than other forum users.

  • 1
  • PDF
Measuring Cybercrime as a Service (CaaS) Offerings in a Cybercrime Forum
    Ugur AkyaziM. V. EetenC. Gañán

    Computer Science

  • 2021

It is found that forums do in fact provide a channel for CaaS supply and demand to meet, but only a fraction of the CaAS landscape is seen and there is no evidence in the data for the supposed growth ofCaaS over time.

  • 12
  • PDF
Detecting organized eCommerce fraud using scalable categorical clustering
    Samuel MarchalS. Szyller

    Computer Science, Business

    ACSAC

  • 2019

A novel solution to detect organized fraud by analyzing orders in bulk based on clustering that detects 26.2% of fraud while raising false alarms for only 0.1% of legitimate orders is proposed.

Digital Drift and the Evolution of a Large Cybercrime Forum
    Jack HughesAlice Hutchings

    Computer Science, Sociology

    2023 IEEE European Symposium on Security and…

  • 2023

Overall, the authors see an increasing trend towards financially-driven cybercrime, at both the user and forum level, and forum activity has trended away from gaming/social activity, trending towards more activity in market-related boards.

  • 2
  • PDF
An analysis of fake social media engagement services
    David Nevado CatalánS. PastranaNarseo Vallina-RodriguezJ. Tapiador

    Computer Science

    Comput. Secur.

  • 2023
  • 2
    Jack HughesAndrew CainesAlice Hutchings

    Computer Science, Psychology

  • 2023

These findings indicate forum users are using argot to overcome the cold start problem, a conundrum faced by new users to social networks with ranking systems and marketplaces with feedback systems.

  • 1
  • PDF
Exploring Masculinities and Perceptions of Gender in Online Cybercrime Subcultures
    Maria BadaY. ChuaBen CollierIldiko Pete

    Sociology

  • 2021

While there is now a substantial literature on the role played by online forums in cybercrime economies, there has been little research which accounts for the role played by gender in these

  • 5
  • PDF
Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums
    S. Butler

    Computer Science, Law

    STAST

  • 2020

It is argued that finality is the main advantage of CCs for this user group, not anonymity as widely thought, and an Operational Security Taxonomy for Illicit Internet Activity is proposed to show that banning CCs is unlikely to be effective.

  • 3
  • PDF

...

...

45 References

Discovering credit card fraud methods in online tutorials
    G. V. HardeveldCraig WebberK. O’Hara

    Law, Computer Science

    OnSt '16

  • 2016

A crime script analysis will reveal the most common ways in which carding is executed, and proposes the uptake of prospect theory as an analytical tool to account for deviations from the criminal optimal norm.

  • 15
An inquiry into the nature and causes of the wealth of internet miscreants
    Jason FranklinA. PerrigV. PaxsonS. Savage

    Economics, Computer Science

    CCS '07

  • 2007

Using a seven month trace of logs collected from an active underground market operating on public Internet chat networks, this paper measures how the shift from “hacking for fun” to “ hacking for profit” has given birth to a societal maturity mature enough to steal wealth into the millions of dollars in less than one year.

  • 448
  • PDF
Quit Playing Games with My Heart: Understanding Online Dating Scams
    JingMin HuangG. StringhiniPeng Yong

    Computer Science, Sociology

    DIMVA

  • 2015

It is shown that different types of scammers target a different demographics on the site, and therefore set up accounts with different characteristics, which shed light on the threats associated to online dating scams, and can help researchers and practitioners in developing effective countermeasures to fight them.

  • 45
  • PDF
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale
    S. PastranaDaniel R. ThomasAlice HutchingsR. Clayton

    Computer Science, Sociology

    WWW

  • 2018

CrimeBot is described, a crawler designed around the particular challenges of capturing data from underground forums, used to update and maintain CrimeBB, a dataset of more than 48m posts made from 1m accounts in 4 different operational forums over a decade.

  • 104
  • PDF
Click Trajectories: End-to-End Analysis of the Spam Value Chain
    Kirill LevchenkoAndreas Pitsillidis S. Savage

    Computer Science, Business

    2011 IEEE Symposium on Security and Privacy

  • 2011

This paper quantifies the full set of resources employed to monetize spam email -- including naming, hosting, payment and fulfillment -- using extensive measurements of three months of diverse spam data, broad crawling of naming and hosting infrastructures, and over 100 purchases from spam-advertised sites.

  • 288
  • PDF
Orchestrated crime: The high yield investment fraud ecosystem
    J. NeisiusR. Clayton

    Business, Law

    2014 APWG Symposium on Electronic Crime Research…

  • 2014

It is demonstrated that targeting the sale of kits for HYIPs and aggregators would be a key step towards disrupting the HYIP ecosystem, with the removal of the aggregator sites the next most important action that is needed.

  • 25
  • PDF
Trust among cybercriminals? Carding forums, uncertainty and implications for policing
    Michael YipCraig WebberN. Shadbolt

    Sociology, Law

  • 2013

The findings indicate that carding forums facilitate organised cybercrime because they offer a hybrid form of organisational structure that is able to address sources of uncertainty and minimise transaction costs to an extent that allows a competitive underground market to emerge.

  • 100
  • PDF
Leaving on a jet plane: the trade in fraudulently obtained airline tickets
    Alice Hutchings

    Law

    Crime, Law and Social Change

  • 2018

This crime script analysis provides an overview of the trade in fraudulently obtained tickets, drawing on interviews with industry and law enforcement, and an analysis of an online blackmarket, and identifies additional interventions, aimed at the act, the actor, and the marketplace.

  • 20
  • PDF
The Online Romance Scam: A Serious Cybercrime
    M. WhittyT. Buchanan

    Law, Sociology

    Cyberpsychology Behav. Soc. Netw.

  • 2012

It is found that despite its newness, an estimated 230,000 British citizens may have fallen victim to this crime and there needs to be some rethinking about providing avenues for victims to report the crime or at least making them more comfortable when doing so.

  • 133
  • PDF
Exploring the Provision of Online Booter Services
    Alice HutchingsR. Clayton

    Computer Science, Business

  • 2016

ABSTRACT This research uses differential association, techniques of neutralization, and rational choice theory to study those who operate “booter services”: websites that illegally offer

  • 93
  • PDF

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    [PDF] Understanding eWhoring | Semantic Scholar (2024)

    References

    Top Articles
    Latest Posts
    Article information

    Author: Amb. Frankie Simonis

    Last Updated:

    Views: 6287

    Rating: 4.6 / 5 (56 voted)

    Reviews: 95% of readers found this page helpful

    Author information

    Name: Amb. Frankie Simonis

    Birthday: 1998-02-19

    Address: 64841 Delmar Isle, North Wiley, OR 74073

    Phone: +17844167847676

    Job: Forward IT Agent

    Hobby: LARPing, Kitesurfing, Sewing, Digital arts, Sand art, Gardening, Dance

    Introduction: My name is Amb. Frankie Simonis, I am a hilarious, enchanting, energetic, cooperative, innocent, cute, joyous person who loves writing and wants to share my knowledge and understanding with you.