Cyber Fraud: Tactics, Techniques and Procedures

Free Standard Shipping

Purchasing Options

ISBN 9781420091274
Cat# AU9127



SAVE 20%

eBook (VitalSource)
ISBN 9781420091281
Cat# AUE9127



SAVE 30%

eBook Rentals

Other eBook Options:


    • Examines economic vulnerability models in the market and analyzes how they affect vendors, end users, and vulnerability researchers
    • Outlines a conceptual model of the structures, functions, and roles of actors and organizations within this illicit marketplace
    • Discusses the roles of white hats and black hats in the underground culture
    • Addresses the developing maturity of malcode communication and the preventative measures organizations can take
    • Discusses Trojan software designed by hackers, used to target the financial sector
    • Outlines the countermeasure expenditures that should be considered by organizations


    With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy.

    Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas.

    This eye-opening work includes a variety of case studies ? including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

    Table of Contents

    Cyber Fraud: Principles, Trends, and Mitigation Techniques

    The Cyber Threat Landscape in Russia

    Banking Trojans: An Overview

    The Russian Business Network: Rise and Fall of a Criminal ISP

    IFrame Attacks - An Examination of the Business of IFrame Exploitation

    Inside the World of Money Mules

    Preventing Malicious Code from "Phoning Home"

    Distributed Denial of Service (DDoS) Attacks: Motivations and Methods

    Mobile Malicious Code Trends

    The Torpig Trojan Exposed

    The Laqma Trojan298

    BBB: A Threat Analysis of Targeted Spear – Phishing Attacks

    Silentbanker Unmuted: An In-Depth Examination of the Silentbaker Trojan Horse

    Emerging Economic Models for Software Vulnerability Research

    Author Bio(s)

    Verisign iDefense Security Intelligence Service, Dulles, Virginia, USA

    Editorial Reviews

    Written and edited by known experts in the field, the content is indeed of high quality and very informative. The logical structure and writing style are excellent, which is a challenging task when there are so many contributors. The book is a must-read for several reader categories. I strongly recommend some of the technical chapters to advanced undergraduate and graduate computer science students. Law students can use the book to grasp the necessary technical background material for investigating cyber fraud. Finally, it is also for readers who wish to learn about the current state of Internet fraud. For all of these readers, this book is a welcome and rewarding addition to the bookshelf.
    —Radu State, in Computing Reviews, April 2012