NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
7) Click fraud: also called pay-per-click fraud –the practice <strong>of</strong> artificially inflating<br />
traffic statistics to defraud advertisers or websites that provide venues for advertisers.<br />
Click fraud is the subject <strong>of</strong> some controversy and increasing litigation due to the<br />
advertising networks being a key beneficiary <strong>of</strong> the fraud.<br />
8) Crackers: see definition <strong>of</strong> blackhat hackers.<br />
9) CVV2: is a three or four digit value that is uniquely derived for each credit card<br />
and is found at the back <strong>of</strong> the card. It is a new authentication procedure established by<br />
credit card companies to further efforts towards reducing fraud for internet transactions,<br />
since it attempts to verify to the merchant that the cardholder does in fact have the card<br />
in his or her possession.<br />
10) DDoS: abbreviation for Distributed Denial <strong>of</strong> Service. This is an attack in which<br />
thousands <strong>of</strong> separate computers, which are usually part <strong>of</strong> a botnet, bombard a target<br />
with bogus data to knock it <strong>of</strong>f the net. DDoS attacks have been used by extortionists<br />
who threaten to knock a site <strong>of</strong>fline unless a hefty ransom is paid.<br />
11) Drop services: online money laundry service, where someone sets up<br />
anonymous mailboxes and has people send goods purchased with stolen card details for<br />
a certain fee, and then ship it <strong>of</strong>f to the customer.<br />
12) Exploit: a bug or vulnerability in s<strong>of</strong>tware that malicious hackers use to<br />
compromise a computer or network. Exploit code is the snippet <strong>of</strong> programming that<br />
actually does the work <strong>of</strong> penetrating via this loophole.<br />
13) Fast flux: is a technique used by botnets to hide phishing and malware delivery<br />
sites behind an ever-changing network <strong>of</strong> compromised hosts acting as proxies. This<br />
sophisticated technique is used to hide the location <strong>of</strong> criminal servers, complicating the<br />
process <strong>of</strong> tracking them down. The Storm worm is one <strong>of</strong> the recent malware variants<br />
to make use <strong>of</strong> this technique.<br />
Page 93