TY - GEN
T1 - Profiling underground merchants based on network behavior
AU - Sundaresan, Srikanth
AU - McCoy, Damon
AU - Afroz, Sadia
AU - Paxson, Vern
PY - 2016/6/8
Y1 - 2016/6/8
N2 - Online underground forums serve a key role in facilitating information exchange and commerce between gray market or even cybercriminal actors. In order to streamline bilateral communication to complete sales, merchants often publicly post their IM contact details, such as their Skype handle. Merchants that publicly post their Skype handle potentially leak information, since Skype has a known protocol flaw that reveals the IP address(es) of a user when they are online. In this paper, we collect Skype handles of merchants from three underground forums-AntiChat, BlackHat World and Hack Forums-and longitudinally monitor their network behavior. Our analysis of their network behavior provides a rich profile of their likely locations, network behavior, work habits, and other dynamics. In particular, we show that these merchants do not frequently use VPN services, and even when they do, they often leak their likely geolocation by also directly using residential and cellular IP addresses.
AB - Online underground forums serve a key role in facilitating information exchange and commerce between gray market or even cybercriminal actors. In order to streamline bilateral communication to complete sales, merchants often publicly post their IM contact details, such as their Skype handle. Merchants that publicly post their Skype handle potentially leak information, since Skype has a known protocol flaw that reveals the IP address(es) of a user when they are online. In this paper, we collect Skype handles of merchants from three underground forums-AntiChat, BlackHat World and Hack Forums-and longitudinally monitor their network behavior. Our analysis of their network behavior provides a rich profile of their likely locations, network behavior, work habits, and other dynamics. In particular, we show that these merchants do not frequently use VPN services, and even when they do, they often leak their likely geolocation by also directly using residential and cellular IP addresses.
UR - http://www.scopus.com/inward/record.url?scp=84977275085&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84977275085&partnerID=8YFLogxK
U2 - 10.1109/ECRIME.2016.7487943
DO - 10.1109/ECRIME.2016.7487943
M3 - Conference contribution
AN - SCOPUS:84977275085
T3 - eCrime Researchers Summit, eCrime
SP - 62
EP - 70
BT - Proceedings of the 2016 APWG Symposium on Electronic Crime Research, eCrime 2016
PB - IEEE Computer Society
T2 - 2016 APWG Symposium on Electronic Crime Research, eCrime 2016
Y2 - 1 June 2016 through 3 June 2016
ER -