Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3419394.3423636acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras

Published: 27 October 2020 Publication History

Abstract

Trust and reputation play a core role in underground cybercrime markets, where participants are anonymous and there is little legal recourse for dispute arbitration. These underground markets exist in tension between two opposing forces: the drive to hide incriminating information, and the trust and stability benefits that greater openness yields. Revealing information about transactions to mitigate scams also provides valuable data about the market. We analyse the first dataset, of which we are aware, about the transactions created and completed on a well-known and high-traffic underground marketplace, Hack Forums, along with the associated threads and posts made by its users over two recent years, from June 2018 to June 2020. We use statistical modelling approaches to analyse the economic and social characteristics of the market over three eras, especially its performance as an infrastructure for trust. In the Set-up era, we observe the growth of users making only one transaction, as well as 'power-users' who make many transactions. In the Stable era, we observe a wide range of activities (including large-scale transfers of intermediate currencies such as Amazon Giftcards) which declines slowly from an initial peak. Finally, we analyse the effects of the Covid-19 pandemic, concluding that while we see a significant increase in transactins across all categories, this reflects a stimulus of the market, rather than a transformation. New users overcome the 'cold start' problem by engaging in low-level currency exchanges to prove their trustworthiness. We observe currency exchange accounts for most contracts, and Bitcoin and PayPal are the preferred payment methods by trading values and number of contracts involved. The market is becoming more centralised over time around influential users and threads, with significant changes observed during the Set-up and Covid-19 eras.

References

[1]
Sadia Afroz, Vaibhav Garg, Damon McCoy, and Rachel Greenstadt. 2013. Honor among thieves: A common's analysis of cybercrime economies. In 2013 APWG eCrime Researchers Summit. IEEE, New York, 1--11.
[2]
Luca Allodi, Marco Corradin, and Fabio Massacci. 2016. Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned. IEEE Transactions on Emerging Topics in Computing 4, 1 (2016), 35--46.
[3]
Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, and Damon McCoy. 2019. Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains. In 2019 APWG Symposium on Electronic Crime Research (eCrime). IEEE, New York, 1--16.
[4]
British Society of Criminology. 2015. Statement of ethics. http://www.britsoccrim.org/ethics/
[5]
Andrew Caines, Sergio Pastrana, Alice Hutchings, and Paula J Buttery. 2018. Automatically identifying the function and intent of posts in underground forums. Crime Science 7, 1 (2018), 14.
[6]
Nicolas Christin. 2013. Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace. In Proceedings of the 22nd International Conference on World Wide Web. ACM, New York, 213--224.
[7]
David Décary-Hétu and Anna Leppänen. 2016. Criminals and signals: An assessment of criminal performance in the carding underworld. Security Journal 29, 3 (2016), 442--460.
[8]
David Gefen, Elena Karahanna, and Detmar W Straub. 2003. Trust and TAM in online shopping: An integrated model. MIS Quarterly 27, 1 (2003), 51--90.
[9]
Thomas J. Holt. 2013. Examining the forces shaping cybercrime markets online. Social Science Computer Review 31, 2 (2013), 165--177.
[10]
Thomas J. Holt and Eric Lampke. 2010. Exploring stolen data markets online: products and market forces. Criminal Justice Studies 23, 1 (2010), 33--50.
[11]
Thomas J Holt, Olga Smirnova, and Alice Hutchings. 2016. Examining signals of trust in criminal markets online. Journal of Cybersecurity 2, 2 (2016), 137--145.
[12]
Thorsten Holz, Markus Engelberth, and Felix Freiling. 2009. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. In Computer Security - ESORICS 2009. Springer, Berlin, 1--18.
[13]
Xuan Nhat Lam, Thuc Vu, Trong Duc Le, and Anh Duc Duong. 2008. Addressing Cold-Start Problem in Recommendation Systems. In Proc. 2nd Int. Conf. on Ubiquitous Information Management and Communication. ACM, New York, 208--211.
[14]
Paul Felix Lazarsfeld and Neil W Henry. 1968. Latent Structure Analysis. Houghton Mifflin Co., Boston.
[15]
Blerina Lika, Kostas Kolomvatsos, and Stathes Hadjiefthymiades. 2014. Facing the Cold Start Problem in Recommender Systems. Expert Syst. Appl. 41, 4 (2014), 2065--2073.
[16]
Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. 2011. An Analysis of Underground Forums. In Proceedings of the Internet Measurement Conference. ACM, New York, 71--80.
[17]
Meltem Odabaş, Thomas J Holt, and Ronald L Breiger. 2017. Markets as governance environments for organizations at the edge of illegality: insights from social network analysis. American Behavioral Scientist 61, 11 (2017), 1267--1288.
[18]
Sergio Pastrana, Alice Hutchings, Daniel Thomas, and Juan Tapiador. 2019. Measuring eWhoring. In Proceedings of the Internet Measurement Conference. ACM, New York, 463--477.
[19]
Sergio Pastrana, Daniel R. Thomas, Alice Hutchings, and Richard Clayton. 2018. CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale. In Proceedings of the 2018 World Wide Web Conference. ACM, New York, 1845--1854.
[20]
Paul A Pavlou. 2003. Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce 7, 3 (2003), 101--134.
[21]
Kimberly Kiefer Peretti. 2008. Data breaches: What the underground world of carding reveals. Santa Clara Computer & High Tech. Law Journal 25 (2008), 375.
[22]
Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko, and Vern Paxson. 2017. Tools for Automated Analysis of Cybercriminal Markets. In Proceedings of the 26th International Conference on World Wide Web. ACM, New York, 657--666.
[23]
Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, and Gail-Joon Ahn. 2019. Understanding and Predicting Private Interactions in Underground Forums. In Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy. ACM, New York, 303--314.
[24]
Bruce W Tuckman. 1965. Developmental sequence in small groups. Psychological Bulletin 63, 6 (1965), 384.
[25]
Rolf van Wegberg, Fieke Miedema, Ugur Akyazi, Arman Noroozian, Bram Klievink, and Michel van Eeten. 2020. Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics. In Proceedings of The Web Conference 2020. ACM, New York, 816--826.
[26]
World Health Organisation. 2020. WHO COVID-19 timeline. https://who.int/news-room/detail/29-06-2020-covidtimeline
[27]
Michael Yip, Craig Webber, and Nigel Shadbolt. 2013. Trust among cybercriminals? Carding forums, uncertainty and implications for policing. Policing and Society 23, 4 (2013), 516--539.

Cited By

View all
  • (2024)You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat IntelligenceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678930(368-383)Online publication date: 30-Sep-2024
  • (2024)The Art of Cybercrime Community ResearchACM Computing Surveys10.1145/3639362Online publication date: 10-Jan-2024
  • (2024)No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00007(717-734)Online publication date: 19-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IMC '20: Proceedings of the ACM Internet Measurement Conference
October 2020
751 pages
ISBN:9781450381383
DOI:10.1145/3419394
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 October 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Covid-19
  2. coronavirus
  3. cybercrime market
  4. economic evolution
  5. hacking forums
  6. pandemic
  7. underground economy

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IMC '20
IMC '20: ACM Internet Measurement Conference
October 27 - 29, 2020
Virtual Event, USA

Acceptance Rates

IMC '20 Paper Acceptance Rate 53 of 216 submissions, 25%;
Overall Acceptance Rate 277 of 1,083 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)123
  • Downloads (Last 6 weeks)7
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat IntelligenceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678930(368-383)Online publication date: 30-Sep-2024
  • (2024)The Art of Cybercrime Community ResearchACM Computing Surveys10.1145/3639362Online publication date: 10-Jan-2024
  • (2024)No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00007(717-734)Online publication date: 19-May-2024
  • (2024)On the Dark Side of the Coin: Characterizing Bitcoin Use for Illicit ActivitiesPassive and Active Measurement10.1007/978-3-031-56252-5_3(37-66)Online publication date: 20-Mar-2024
  • (2023)The emotional infrastructure of a cybercrime collective: Evidence from Dark0deCriminology & Criminal Justice10.1177/17488958231212412Online publication date: 18-Nov-2023
  • (2023)Urbanity, Transgressive Digitality, and COVID-19: Hierarchical Cybercrime(s) and the Subaltern Nigerian Urban Youth in a Global PandemicJournal of Asian and African Studies10.1177/00219096231218443Online publication date: 31-Dec-2023
  • (2023)Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised AccessProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605047(1-12)Online publication date: 29-Aug-2023
  • (2023)Autism Disclosures and Cybercrime Discourse on a Large Underground Forum2023 APWG Symposium on Electronic Crime Research (eCrime)10.1109/eCrime61234.2023.10485504(1-14)Online publication date: 15-Nov-2023
  • (2023)A Graph-Based Stratified Sampling Methodology for the Analysis of (Underground) ForumsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.330442418(5473-5483)Online publication date: 2023
  • (2023)Visualizing Cyber-Threats in Underground Forums2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00032(244-258)Online publication date: Jul-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media