NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Appendix<br />
Glossary for cybercrime<br />
(The definitions in this glossary were gleamed from numerous sources including the BBC<br />
News and Wikipedia.)<br />
1) Adware: unwanted programs that, once installed, bombard users with unwanted<br />
adverts. Often those pushing the adware programs get paid for every machine they<br />
manage to recruit. Some adware poses as fake computer security s<strong>of</strong>tware, and it can<br />
be very hard to remove.<br />
2) Blackhat hackers: also known as ‘Crackers’, are hackers, who use their skills<br />
for explicitly criminal or malicious ends. They penetrate systems and <strong>of</strong>ten modify<br />
and/or destroy data. The terms used to refer to writers <strong>of</strong> destructive viruses or those<br />
that use attacks to knock websites <strong>of</strong>fline. Now it is likely to refer to those that steal<br />
credit card numbers and banking data with viruses or by phishing.<br />
3) Botnet: the word is generally used to refer to a collection <strong>of</strong> compromised<br />
computers (called ‘zombie’ computers or ‘bots’— as abbreviation <strong>of</strong> ‘robots’) running<br />
s<strong>of</strong>tware, usually installed via worms, Trojan horses, or backdoors, under a common<br />
command & control infrastructure, controlled by a single person. The majority <strong>of</strong> these<br />
computers are running Micros<strong>of</strong>t Windows operating systems, but other operating<br />
systems can be affected. The biggest botnets can have tens <strong>of</strong> thousands <strong>of</strong> hijacked<br />
computers in them. Recent research suggests they can be hired from as little as 4 cents<br />
per machine.<br />
4) Botnet herder: one <strong>of</strong> the names for the controller or operator <strong>of</strong> a botnet.<br />
5) Carder: someone who steals or trades exclusively in stolen credit card numbers<br />
and their associated information.<br />
6) Cash-out: a euphemism for stealing money from a bank account or credit card<br />
to which someone has gained illegal access. Hackers who grab credit card data <strong>of</strong>ten do<br />
not possess the skills or contacts to launder the money they can steal this way.<br />
Page 92