Вы находитесь на странице: 1из 7

Explaining Cybercrime through the Lens of

Differential Association Theory


Hadidi44-2.php PayPal Case Study

Rachel Levin Jonathan Richardson Gary Warner, Kent Kerley, PhD


(levin8@tcnj.edu) (richardsoj1@nku.edu) (gar@cis.uab.edu, krkerley@uab.edu)
The College of New Jersey Northern Kentucky University University of Alabama at Birmingham
Ewing, NJ Highland Heights, KY Birmingham, AL

Abstract—Social learning theories, such as differential source intelligence tools to conduct the research, investigation
association theory, state that criminals develop deviant behaviors was carried out under the scope of this theory.
and learn the tools of their trade through close association with
other deviants. This case study examines a group of 99 email
addresses found to be using the same PayPal phishing kit. It uses II. THEORETICAL BACKGROUND
Open Source Intelligence techniques to determine potential
relationships between the holders of these email addresses. The Traditional criminological theories have been used to
results are then discussed in light of differential association explain cybercrime in the past, but such theories pertain to
theory to determine the extent to which this theory may aid in the intuitive choice, rather than learning outcomes. Social learning
understanding of cybercrime. (Abstract) theories are within a subcategory of social process theories
[14]. Social process theories attempt to explain crime through
Index Terms—Phishing, Differential Association Theory, the contribution of societal factors to the moral development of
Cybercrime, PayPal an individual. Social learning theories, in particular, explain
how the interaction within groups and peers constitute the
I. INTRODUCTION framework for criminal activities [3]. These theories posit that
criminals learn behavior through social interactions involving
Cybercrime has evolved with the ever-constant boom of the sharing of knowledge through physical acts and
modern technology, but law enforcement has struggled to keep reinforcement of ethical codes and attitudes towards crime.
up with the innovations of cybercriminals. Cybercrime has Within this framework, these specific theories can contribute to
become a huge problem for online financial institutions and E- explaining cybercrime.
commerce websites alike. Typical street-level criminals and
cybercriminals may differ in many ways. In street-level crime, Computers provide various hubs of open source
criminals commit their acts against people that are in their information and serve as a world within themselves comprised
general vicinity. Their motives often are clear, usually of multiple communities. The range of interests presented
involving immediate reward and financial gain. within the cyber world includes a rich subculture based on
Cybercriminals commit all of their crimes online where devious intent. The most successful cybercriminals require
distance is no factor in their motivations. They can commit access to a wide array of abilities, tools, and knowledge that is
these crimes without fear of being seen. Their motivations are hard to acquire in isolation. Therefore, one can infer that social
usually related to those of street-level criminals, but their learning theories provide a basic framework for explaining how
reward usually comes at a later date. Data collection is their criminals share knowledge and tools, but more importantly,
immediate reward, whereas financial gain comes in time. how they create favorable attitudes and group-reinforcing
rationalizations towards participating in crime [15]. Social
There are clear differences between these types of criminals,
learning theories consist of a number of sub theories. In this
but can they be explained through the same criminological
research, the focus will be on the study of differential
theories? association theory in relation to the cybercrime world.
Using social learning theories as a heuristic guide, we In the fields of Sociology and Criminology, differential
provide a case study of cybercrime. This is an exploratory association theory is the exemplar of social learning theories
study that investigates the many criminals who all chose to [3]. This theory was introduced by Edwin Sutherland in 1939
personalize and use the same PayPal phishing kit referred to as and posits that criminality, in large part, represents a
hadidi44-2.php because of the presence of that unique socialization process. Short for “differential association with
filename. It is clear that cybercriminals pursue deviant criminal and anti-criminal behavioral patterns,”[13] the theory
behaviors and commit deviant actions, but how did they come generalizes that humans learn to participate in delinquency
to all use the same tool in this case? What can we learn about from exposure to criminal behavior and attitudes through
this case from differential association theory? Utilizing open association with close and trusted peers. Further exploration
into this theory reveals the idea that learning criminal behavior
is a process similar to learning any other type of behavior [20]. exploit their victims’ finances or for identity theft. The January
The theory is built upon nine basic concepts that are 2012 RSA report notes that in 2011, roughly one in every 300
summarized as follows: emails in circulation around the Internet was believed to
contain elements relating to phishing. This report also stated
1) Criminal behavior is learned that in 2011, 279,580 phishing attacks were observed, a 37%
2) Criminal behavior is learned through interaction with increase in attacks from their 2010 report.
others
3) Learning behavior takes place within intimate The top requested phishing sites imitated the login pages of
personal groups the U.S.-based banks [25]. This information demonstrates why
4) Learning criminal behavior includes techniques of research into a financial institution phish such as PayPal is
committing the crime and direction of motives, drives, necessary for a greater understanding of cybercriminal tool
rationalizations, and attitudes. sharing [25]. According to the January 2012 RSA phishing
5) Direction of drives and motives is learned from report; phishers in 2011 kept their focus on committing fraud
definitions of legal codes as favorable and against financial institutions. This report states that financial
unfavorable. institutions topped the chart of entities that had their web pages
6) A person becomes a criminal when contact with other targeted for the majority of phishing attacks. Financial
deviants produces an excess of definitions favorable to institutions combat phishing in one of two ways: internal cyber
the violation of the law security professionals, or by contracting takedown companies
7) Differential associations vary in frequency, duration, that remove relevant phishing websites when they are detected
priority, and intensity. [18]. However, with a better understanding of cybercrime
8) The process of learning criminal behavior by through current social learning theories, phishing may be
association with criminal and anti-criminal patterns combated before taking place.
involves all of the mechanisms that are involved in
any other learning. The purpose of this case study is not to give a history of
9) The process of learning criminal behavior expresses phishing; rather it is to describe how phishers, hackers, and
general needs and values, but is not excused by such spammers share their online tools and how cybercriminals fit
because noncriminal behavior expresses the same into differential association theory. This insight should inspire
needs and values. [20] future research into other social learning theories and how they
apply to cybercrime.
These nine components of differential association theory
are usually used to explain street-level crime and white-collar Integral to this study was the use of the University of
crime. Differential association has been used to explain a wide Alabama at Birmingham’s (UAB) [28] Spam Data Mine. The
range of online misbehavior ranging from cyber bullying to purpose of the resource is to store and research spam data
terrorism [32,33]. This study will explore the investigation into found throughout the Internet, usually in form of spam emails
the hadidi44-2.php phishing kit and examine how this theory [27]. UAB’s Computer Forensics Research Lab automatically
may be used as a framework for understanding this case. extracts information from the spam emails and stores it for use
in open source investigations. UAB gathers upwards of 1
million spam emails a day, totaling more than 500 million
III. TECHNICAL BACKGROUND spam emails as of January 2011. The UAB Phishing
Operations team receives potential phishing URLs from
For the purpose of this case study, phishing will be defined various sources, including URL lists and spam email messages,
as the use of deceitful emails to trick targeted victims into and systematically analyzes them to determine if the URL is
redirecting to a fake website and disclosing private information confirmed to be a phishing website [27]. If the URL is found
such as user names, passwords, credit card numbers, social to be a phish, automated tools, informed by patterns labeled by
security numbers, addresses and other exploitative information. subject matter experts on the team, decide what financial
As consumers have embraced online methods of commerce, institution or e-commerce web site it belongs to [27]. The
banks and online merchants have moved towards email as the phishing analysis system does this in part by inventorying the
most inexpensive and effective method of maintaining individual files used to create the phishing system and finding
relationships with their customers. This normalization of email previously confirmed phishing sites that contain the same set of
as the chosen method for consumer-facing communications has files used on the site under consideration through a process
created a new opportunity for criminals as consumers now called Deep MD5 Matching[35].
expect important reminders and notices from their online Automated and manual techniques are then used to attempt to
merchants to arrive via electronic mail. Criminals around the identify phishing kits placed on a hacked web server used for
world no longer need to be in physical proximity to their victim phishing. A phishing kit is an archive file, usually in “.zip”
to accomplish sophisticated financial crimes. format, uploaded to a compromised web site by the phisher.
The phishing site is then made by unzipping the kit in the
Phishing has grown into a multi-billion dollar conglomerate directory structure of the published webserver pages. These
comprised of sects of cybercriminals from around the world, kits often contain the email addresses to which stolen personal
collectively hoarding millions of unsuspecting victims’ financial information gathered from victims will be sent,
personal information annually and using that information to referred to as “drop emails.” Since its creation in 2007, the
UAB PhishOps team has confirmed and archived more than search a variety of data sources for relevant information, and
540,000 phishing websites. As of July 18, 2012, the Phishing then graphically represents relationships formed between
Ops team had found 194,462 total recorded phish for the year search items when they return common results. Email
of 2012 alone. Within these phish, the team was able to retrieve addresses were found to be related to one another for a variety
21,412 (11%) phishing kits. In 2011, over 189,000 phishing of reasons. Some were found on the same hacked website
sites for more than 400 ecommerce and financial institutions where hackers had posted email addresses of their team mates
were identified. When a phishing kit is located on a phishing as a form of graffiti. Others were found to belong to members
site, it is retrieved and analyzed, with key information about the of a common hacking forum, or to have been used as an
kit and its contents stored into the Phishing Data Mine. These administrative email address for a website.
tools were used to archive and analyze the “hadidi44-2.php”
phishing kit that serves as the focus of this case study. Some of the results of the Maltego search yielded additional
aliases or identities used by the same hacker. For example,
IV. METHODS Maltego produced more than 50 results for the email address
crywolef@yahoo.com including evidence that the email was
Analysts on the PhishOps team work with law enforcement and used to register the domain FireMovies.net, and that the
corporate investigators to identify groups of related phishing individual also used the aliases mamoun00@hotmail.com and
sites that are interesting for further investigation because of cry_wolef@hotmail.com both of which are contained in our
their prominence in relation to other groups of phishing sites. original list of 99 hadidi44-2 emails. This particular individual
In this case study, visiting researchers participating in the is also involved in hacking. We also know that this criminal
National Science Foundation Research Experience for used the email address crywole@yahoo.com to register the
Undergraduates emulated these techniques while learning the domain tahasocial.com. Tahasocial.com is recommended by
methods used routinely in the lab. Individual phishing kits are
members of traidnt.net, an Arabic forum. Traidnt.net is an
chosen for investigation for a variety of reasons, including
online hacking forum with several members within our target
being linked to a particular financial loss, or in response to a
request from an investigator. In this case, the kit was chosen emails, including fnxdsp@hotmail.fr, deemar197@gmail.com,
due to a sudden surge in the prominence of the kit. In July and hk96sp@gmail.com. Each of these emails also receives
2012, more than thirty phishing sites imitating PayPal were stolen information from at least one version of the hadidi44-
found to have used the same phishing kit, where the only 2.php action file.
modification between versions of the kit was the drop email
address that should receive the stolen credentials. In the lab The Google search engine was used to find further
parlance, the php program file that sends the email to the information on the phishers, as well as clues as to where they
criminal is called the “action file.” For convenience of share their tools. By searching the previously mentioned email,
reference, the kit was referred to by the name of its action file, deemar197@gmail.com, we find that this email uses the alias
“hadidi44-2.php.” The hadidi44-2 kit was found to have been “Zakariati” on the Arabic hacking forum, Sa3eka. Sa3eka
used to create at least 274 phishing sites dating back almost a proved to be popular within our set of criminals, along with
year to July 25, 2011. Ninety-six versions of the kit were other Arabic web design forums such as traidnt.net, and Arabic
found based on the uniqueness of the action file with the most hacking forums including VBhacker, VBspiders, and
prominent version of the kit found to be used 31 times. These gazahacker.net. These forums were found to create most of the
emails were then extracted for investigation. Within the 96 relationships within our criminal web. This discovery helped
hadidi44-2 kits, 99 unique email addresses were extracted for to reveal forums where criminals felt comfortable freely
further investigation. discussing their nefarious activities. In some cases the same
email address is associated with multiple aliases across
The concept of 99 individuals each choosing to name their different forums. Conversely, multiple email addresses were
action file hadidi44-2.php was not plausible. This left the found for the same alias within threads of comments found on
research with three possible outcomes: (1) The kit's creator had the forums. With multiple email addresses, further searches
multiple email accounts and was spreading the kit from a were conducted using Maltego and other techniques, deducing
plethora of different aliases or (2) The kit was freely available even more information on the hadidi44-2 criminals. Many of
on the Internet and any aspiring criminal could acquire and use the searches resulted in social networking profiles.
it, or (3) The kit was distributed within a community of
cybercriminals who share their tools and techniques with one In the modern cyber-driven world, communities are being
another. By investigating the emails, the relationships between formed online creating associations and forming social bonds
these criminals could be identified and finding the origin of through the Internet. One way in which people take advantage
hadidi44-2 could help us further explain whether the criminals of this is through social networking sites, such as Facebook.
behind these email addresses had a relationship with one Of the ninety-nine unique email addresses associated with the
another as suggested by the differential association theory. hadidi44-2.php, twenty-nine of these criminals were owners of
Facebook profiles. Strict privacy settings and fraudulent
After extracting the 99 unique emails from the phishing kit, personal information within profiles ended the investigation of
each individual email was searched through a number of open some of the cybercriminals, while less vigilant profiles
source intelligence tools, beginning with Paterva’s Maltego provided a surfeit of information. For example,
product. Maltego uses a series of predefined transforms to mootez.saad@gmail.com has a Facebook profile under the
name, Mootez Saad. Analysis of Saad’s public pictures proved The i2 chart created on this information represents how the
to be lucrative to this investigation. Within these files were thirty-two most significant criminals relate to each other. The
multiple screenshots of stolen PayPal accounts. Saad attempted final chart is displayed in Figure 1.The largest cluster contains
to cover his tracks by masking the personal information within twenty-three of these emails. This cluster also contains detailed
his screenshots, however his attention to detail was lacking in information regarding relationships to the criminals to
most cases. Upon closer inspection of Saad’s other Facebook Facebook pages, aliases, alternate email addresses, and Arabic
images, another email under the address of forum memberships. Using Google, many forums were found
miutex.xox@hotmail.fr was identified in addition to a physical where the criminals showed an online presence. A widely used
street address, details of a PayPal SQL injection attack, and his forum, called sa3eka, was the hub for many of the perpetrators
Skype alias. behind hadidi44-2. Eleven of the twenty-three criminals were
found to be members of this forum, which is the point at the top
After researching all ninety-nine email addresses and their of the tree shown in Figure 1. Searches of the forum revealed
associations, the relationships were collected and portrayed in that a PayPal phishing kit, as well as many other hacker tools,
i2 Analyst’s Notebook where the analysis of their connections designed by a hacker named Hadidi44 were distributed on this
took place. Each individual shows the relationship between site. The remaining twelve drop email addresses in this tree
hadidi44-2 emails as demonstrated by common social network were directly related to the Sa3eka members either through
links, including forum memberships, Facebook groups, and common membership in other Arabic-language hacking
other contexts. Unconnected trees were not demonstrated to forums, such as VBSpiders and VBhacker, or through close
have a social network relationship to each other. Creating this associates. We found the most prominent locations of the
type of chart allowed for visual representation of the criminals’ criminals to be Morocco, Palestine, and Tunisia. Though the
relationships with one another. criminals were not close associates in the real world, they
seemed to be closely related to each other within cyber
communities, as one can view from the interconnectedness of
the largest cluster documented in i2.

A close up view of the relationships with the phisher Cry


Wolef can be viewed in Figure 2. Cry Wolef links to other
members of the chart through common memberships in
GazaHacker.net, fr.netlog.com, and links between his “taha-
social.com” domain and the traidnt forum.

Figure 1: Hadidi44-2 emails in social network context

V. RESULTS

Using open source intelligence tools generated very useful


results. Maltego was able to provide relevant email addresses,
websites, and other relationships, which were refined through
further queries using Google and other search methods.
Google returned fewer results then Maltego, but were often
more relevant than some of the leads generated in Maltego. It
provided various links to community forums, web pages, and
social networking sites tied to the specified email searched.

Of the ninety-nine unique emails behind the hadidi44-2.php


action file, forty-three emails were found on the Internet.
Figure 2: Cry Wolef
Thirty-two emails returned ample and significant results not
only on the criminals themselves, but also the way in which
they were able to obtain hadidi44-2. The remaining eleven of Discussed earlier within the Methods section was the
those emails had registered Facebook profiles, but naivety of mootezsaad@gmail.com. Due to the lack of privacy
investigation into their profiles yielded no substantial results. settings on Saad’s Facebook profile, investigation into this
criminal’s malicious activity provided a plethora of evidence
against him. Saad had multiple friends with perilous privacy V. DISCUSSION AND CONCLUSION
settings as well, including the group that dubs themselves as The hadidi44-2 kit was found to be a file hosted on the
the Tunisian-Hackers. This group boasts about its mission to Tunisian-Hacker Facebook page with multiple copies and
create a community of Tunisian ethical hackers. (Perhaps they adaptations found on different Arabic-language hacker forums.
failed in the “ethical” portion of that mission, as evidenced by The kit seems to have originated on the sa3eka forum, and
their many ties to PayPal phishing.) Investigating further, many of the later instances of the kit can be traced back
email contacts for the group are found under through social relationships to members who would have had
bsebai@ymail.com and smatrix1@live.fr. access to the original kit. It is concluded that these forums are
where the majority of the criminals using this kit share their
An example of a single phisher using many email addresses tools. In this specific case study, it is inferred that the
would be “Smatrix.” Smatrix1@live.fr is linked to the sa3eka cybercriminals involved in this particular PayPal phish shared
hackers through Achraf_lady, and his membership in the their tools of the trade with other cybercriminals through close
Islamic Army Alkatrone, led by Dr. Timor, a member of both knit cyber communities.
VBSpiders and VBHackers, forums which share several
members with sa3eka. smatrix1@live.fr also uses the email The criminals behind the hadidi44-2.php PayPal phishing
alias smatrix4spam@gmail.com with a Facebook page kit were able to learn and propagate their criminal activity by
assigned to the name Borhen Jwini. Smatrix is also known as making connections within the cyber world. Just as a gang
cc4smatrix@gmail.com which is the email of one of the member obtains their weapons and knowledge from more
criminals receiving information through hadidi44-2 .php. experienced members of the same gang, the criminals involved
Under this email, we find that this criminal is the administrator in this case obtained their tools from more experienced
of a website called Tounsi-Shop where he has listed his phone cybercriminals who frequented the same forums. Therefore,
number and street address. Smatrix is also linked to Mootez
specific components of the differential association theory can
Saad as a common member of the Tunisian-Hackers Facebook
group. explain aspects of this case study.

After searching through various notes posted by the Which components of Sutherland’s theory are prevalent in
this investigation and which ones are not? To analyze this
Tunisian-Hackers, it was evident that they acquired stolen
question, each component was evaluated separately. The ones
PayPal accounts. Through comments, pictures, and notes, it
most relevant to this case are explained as follows:
was deduced that this group was a large proponent in the
spread of this kit. Deeper investigation led to a MediaFire
1) Criminal behavior is learned: Phishing PayPal was
link posted under a header titled “PayPal scam by smatrix”.
learned in this case. We know this because the usage of the
Though the file itself was inaccessible, a search was
hadidi44-2.php kit is growing. The number of times that the kit
conducted on the various php components featured within
was used more than doubled within only a week and a half.
the post.
2) Criminal behavior is learned through interaction with
Searching with Google for these various php components led to
a browsable directory containing a copy of the hadidi44-2 others: This instance of phishing was learned through virtual
phishing kit publicly displayed within a hacked website. The communication within forums and social networking mediums.
kit was designed under the alias of Dr. Spam. Dr. Spam had his The criminals were able to interact with each other through the
results sent to rezult@live.de. The same cybercriminal also virtual world. More prominent phishers were able to serve as
uses the email zakprokiller@gmail.com, which was the most teachers of the crime through these virtual mediums.
prominent drop email associated with the kit, used to create at
least 31 phishing sites at the beginning of this research. 3) Learning behavior takes place within intimate personal
Searching this kit in the data mine 10 days later revealed that groups: Close relationships were formed within these criminals
the “zakprokiller version” had been encountered more than through the virtual communication mediums. These individuals
twice as many times as it was on the first day it was accessed. learned the usage of the kit by developing a trust and
On this day, the search showed that Dr. Spam used this kit 68 connection with the influential phishers present within these
times. Dr. Spam has an alternative alias, “Map Dr. S.,” on the communities.
widely used sa3eka forum. On this forum he has posted another
phishing kit containing the action file hadidi44-2.php, but this 4) Learning criminal behavior includes techniques of
one pertains to an AlertPay scam. committing the crime and direction of motives, drives,
rationalizations, and attitudes: Techniques and skills of
The alias Sam-Hacker has posted a word of thanks for the phishing were available through public upload of the hadidi44-
criminal embedding the AlertPay tool and his email address is
2 kit to the close-knit cyber communities. Criminals targeted
Iv4@vip.cn. This criminal hacks websites with a criminal with
the alias Sn!PeR-HaCkER whose email is waes@w.cn, one of PayPal for monetary purposes and believed it was acceptable
the emails associated with the PayPal scam through hadidi44- because reputable criminals within the forums were spreading
2.php. The connections to this particular file are widespread the kit. They were motivated by proof of monetary gain from
through these Arabic-language hacking forums and show the the other criminals that utilized this kit. The proof was in form
spread of this specific tool used to phish PayPal.

Figure 3: Close up look at the 12 chart; Cry Wolef associations


of screen shots of stolen accounts and gains, as well as boasts motivations in ways that help to prevent and combat
of gain on forums. cybercrime in the future.

7) Differential associations vary in frequency, duration, ACKNOWLEDGMENT


priority, and intensity: This kit was being used by 99 email
FUNDING FOR THIS STUDY WAS PROVIDED BY THE NATIONAL
addresses. However, most of these found criminals were
SCIENCE FOUNDATION’S RESEARCH EXPERIENCES FOR
previously hackers associated with their own smaller hacking UNDERGRADUATES PROGRAM (AWARD # 1004953).
groups. Phishing is a more serious crime than hacking that
involves much more involvement. Instead of defacing websites, REFERENCES
they are stealing money, identities, etc.
[1] Agnew, R. "Testing the leading crime theories–an alternative
strategy focusing on motivational processes." Journal of
9) The process of learning criminal behavior expresses Research in Crime and Delinquency, no. 4 (1995): 32.
general needs and values, but is not excused by such because
noncriminal behavior expresses the same needs and values: [2] Akers, R L., M D. Khron, L Lanza-Kaduce, and M Radosevich.
Phishers were able to express need for monetary gain and an "Social learning and deviant behavior: A specific test of a
outlet for their computer skills, which they may have thought to general theory." American Sociological Association (1979): 636
not be accessible without committing this crime However, non- - 655.
offenders express need for money and creative outlet and find
non-criminal ways to gain these needs. Therefore, the crimes of [3] Akers, R L. Deviant behavior - a social learning approach
Belmont, CA: Wadsworth Publishing Co., 1973.
these criminals cannot be excused by the reasons as to why
they committed the crime in the first place. [4] Beck, K, and J Zhan. "Phishing in Finance." Future Information
Six of the nine components of the differential Technology (FutureTech),2010 5th International Conference on
association theory were able to explain aspects of this PayPal (2010): 1-5.
phishing case. The remaining three components deal with the
histories of the criminals. With this particular investigation, [5] Burgess, R L., and R L. Akers. "A differential association-
there was not enough past history found on the individuals to reinforcement theory of criminal behavior." Social Problems
explain the inherent development of the criminals involved in (1966): 128-147.
this case. These components refer to the ways in which
criminal behavior is learned in association with peers in [6] Chen, J, and C Guo. "Online Detection and Prevention of
Phishing Attacks." Communications and Networking in China,
communication to share a common idea through practices,
2006. ChinaCom '06. First International Conference on (2006):
skills, and tool sharing [13, 14]. This case study observed
1-7.
behavior that seems to reinforce these points. Although the
particular kit was placed onto the Internet where any person [7] Collins, M P., T J. Shimeall, S Faber, J Janies, R Weaver, M
could freely access it, analysis shows that cybercriminals have Shon, and J B. Kadane. "Using uncleanliness to predict future
formed intimate communities where they have developed a botnet addresses." In Proceedings of the 7th ACM SIGCOMM
sense of trust and friendship. They may not be close in conference on Internet measurement (2007): 93-104.
proximity or even acquaintanceship in the real world, but in the
cyber world they have formed close associations with each [8] Dahmija, R, J D. Tygar, and M Hearst. "Why Phishing Works."
other. In their cyber bubbles they are able to learn from each UC Berkeley: Experimental Social Science Laboratory (Xlab).
other by sharing ideas, practices, and tools of injustice. Retrieved from: http://escholarship.org/uc/item/9dd9v9vd
Specifically regarding the hadidi44-2 kit, public sharing of the (2006):
kit within these close criminal communities allowed for
different cybercriminals to associate with one another for a [9] Gu, G, J Zhang, and W Lee. "BotMiner: Clustering Analysis of
common purpose. This common purpose was to commit a Network Traffic for Protocol- and Structure-Independent Botnet
crime. Thus, it is concluded that hadidi44-2 kit was distributed Detection." In Proc. of the 17 th conference USENIX Security
as an open source phishing kit within a particular community Symposium, Boston, MA (2008): 139-154.
targeted at a particular audience. The process of the spread of
[10] Hayati, P, and V Potdar. "Spammer and hacker, two old friends
the hadidi44-2 kit can therefore be explained through
." Digital Ecosystems and Technologies, 2009. DEST '09. 3rd
components of the differential association theory.
IEEE International Conference on (2009): 290-294.
This case study examined a specific pattern of
financial crimes that reinforced the concept that differential [11] Husna, H, S Phithakkitnukoon, S Palla, and R Dantu. "Behavior
association seems relevant to cybercrimes, even though no Analysis of Spam Botnets." Communication Systems Software
“real world” association can be documented between the and Middleware and Workshops, 2008. COMSWARE 2008. 3rd
criminals. The authors encourage additional case studies be International Conference on (2008): 246-253.
conducted in order to further relate social learning theories to
cybercrime. With a deeper understanding of how cybercrime [12] Irani, D, S Webb, J Griffin, and C Pu. "Evolutionary Study of
can be explained through such traditional criminology theories, Phishing ." eCrime Researchers Summit (2008): 1-10.
law enforcement may be able to better understand criminal
[13] Lanier, M M., and S Henry. “Learning Criminal Behavior: [25] "RSA." The Year In Phishing. Fraud Report, Accessed July 18,
Social Process Theories." In Essential Criminology, 2nd ed., 2012.
156-178. Oxford, United Kingdom: Westview Press, 2004. http://www.rsa.com/solutions/consumer_authentication/intelrepo
rt/11635_Online_Fraud_report_0112.pdf.
[14] McQuade, S C. "Theories of Computer Enabled Abuse and
Crime." In Understanding and Managing Cyber crime, 1st ed., [26] "Technical Trends in Phishing Attacks. us-cert.gov." Us-cert.gov
137-182. Boston, Massachusetts: Pearson Education, Inc, 2006. , Accessed July 18, 2012.
http://www.cis.uab.edu/UABSpamDataMine.
[15] Morris, R G., and A G. Blackburn. "Cracking The Code: An [27] "UAB Phishing Operations. UAB Computer and Information
Empirical Exploration of Social Learning Theory and Computer Sciences." UAB Computer and Information Sciences , Accessed
Crime." Journal of Crime and Justice 1 (2009): 1-32. July 18, 2012. http://www.cis.uab.edu/PhishOps.

[16] Nazario, J, and T Holz. "As the net churns: Fast-flux botnet [28] "UAB Spam Data Mine. UAB Computer and Information
observations." Malicious and Unwanted Software, 2008. Sciences." UAB Computer and Information Sciences , Accessed
MALWARE 2008. 3rd International Conference on (2008): 24- July 18, 2012. http://www.cis.uab.edu/UABSpamDataMine.
31.
[29] "Understanding Criminology Theories." Criminology.com ,
[17] Nero, P J., B Wardman, H Copes, and G Warner. "Phishing: Accessed July 18, 2012.
Crime that pays." eCrime Researchers Summit (eCrime), (2011): http://www.criminology.com/resources/understanding-
1-10. criminology-theories.

[18] Parno, B, C Kuo, and A Perrig. "Authentication and Fraud [30] "What is Maltego?." Maltego, Accessed July 18, 2012.
Detection: Phoolproof phishing prevention. ." Di Crescenzo, G., http://www.paterva.com/web5/client/overview.php.
Rubin, A 4107 (2006):
[31] "What is PostgreSQL?." The PostgreSQL Global Development
[19] Rivest, R. "The MD5 Message Digest Algorithm." RFC 1321 Group , Accessed July 18, 202.
(1992): http://www.postgresql.org/docs/devel/static/intro-whatis.html.

[20] Sutherland, E H., D R. Cressey, and D F. Luckenbill. Principles [32] Freiburger, T. and Crane, J. “The Internet as a Terrorist’s Tool:
of criminology, 11th ed. Oxford: Altamira Pr, 1992. A Social Learning Perspective” in Cyber Criminology: Exploring
Internet Crimes and Criminal Behavior. Boca Raton, FL: CRC Press
[21] Yong-Xia, Z, and Z Ge. "MD5 Research." Multimedia and
Information Technology (MMIT), (2010): 271-273. [33] Wang, J., Nansel, T. R., & Iannotti, R. J. (2011). Cyber and
Traditional Bullying: Differential Association With Depression.
[22] Yu, W D., S Nargundkar, and N Tiruthani. "A Phishing Journal of Adolescent Health, 48 (4), 415-417.
Vulnerability Analysis of Web Based. ." Computers and
Communications, 2008. ISCC 2008. IEEE Symposium on [34] Wardman, B., Warner, G., McCalley, H., Turner, S., & Skjellum,
(2008): 326-331. A. (2010). Reeling in Big Phish with a Deep MD5 Net. Journal of
Digital Forensics, Security and Law, 5 (3), 33-55.
[23] "Botnet." Oxford Dictionaries, Accessed July 18, 2012.
http://oxforddictionaries.com/definition/english/botnet. [35] McCalley, H., Wardman, B. & Warner, G. (2011) Analysis of
Back-Doored Phishing Kits. Advanced in Digital Forensics VII, 155-
[24] "Key Features. IBM i2 Analyst's Notebook." IBM, Accessed 168.
July 18, 2012. http://www.i2group.com/us/products/analysis-
product-line/ibm-i2-analysts-notebook.

Вам также может понравиться