[prev in list] [next in list] [prev in thread] [next in thread]
List: websecurity
Subject: [WEB SECURITY] Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
From: "Mike Fratto" <mfratto () gmail ! com>
Date: 2008-12-19 16:33:17
Message-ID: a96eb4980812190833v40a041bcn37ca877255579488 () mail ! gmail ! com
[Download RAW message or body]
Interesting research in harvesting creds.
http://honeyblog.org/junkyard/reports/impersonation-attacks-TR.pdf
Summary:
To summarize, our work presented in this paper makes the following two
main contributions:
1. We present a method to analyze a large class of credential-stealing
attacks (impersonation attacks)
in an highly automated fashion.
2. We apply this method to the case of keylogging attacks based on
dropzones and provide a detailed
analysis of the collected data, giving a novel and first-hand insight
into the underground economy
of Internet criminals from a unique and novel viewpoint.
----------------------------------------------------------------------------
Join us on IRC: irc.freenode.net #webappsec
Have a question? Search The Web Security Mailing List Archives:
http://www.webappsec.org/lists/websecurity/archive/
Subscribe via RSS:
http://www.webappsec.org/rss/websecurity.rss [RSS Feed]
Join WASC on LinkedIn
http://www.linkedin.com/e/gis/83336/4B20E4374DBA
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic