Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks

Online forums serve as offender convergence settings for cybercriminals, but it is unknown whether all cybercriminal networks use forums. Important questions are how cybercriminals meet, how cybercriminal networks develop and what this means for the criminal capabilities of these networks. To gain insight into these questions, we analysed 18 criminal investigations into phishing and malware networks and developed four models of growth. Social ties still play an important role in the origin and growth of the majority of networks. Forums, however, also play a significant role in a number of networks, for example, to find suitable co-offenders or to get into contact with enablers. Criminals with access to forums are able to increase criminal capabilities of their network relatively quickly.

[1]  A family business , 1972 .

[2]  Damián Zaitch,et al.  The social embeddedness of organized crime , 2014 .

[3]  Edward R. Kleemans,et al.  Organized Crime, Transit Crime, and Racketeering , 2007, Crime and Justice.

[4]  H. Bunt,et al.  Georganiseerde criminaliteit in Nederland. Derde rapportage op basis van de Monitor Georganiseerde Criminaliteit. , 2007 .

[5]  D. Wall Cybercrime: The Transformation of Crime in the Information Age , 2007 .

[6]  Kim-Kwang Raymond Choo Organised crime groups in cyberspace: a typology , 2008 .

[7]  Edward R. Kleemans,et al.  Criminal Careers in Organized Crime and Social Opportunity Structure , 2008 .

[8]  M. Levi,et al.  Researching the organization of serious crimes , 2008 .

[9]  Kimberly Peretti Data Breaches: What the Underground World of Carding Reveals , 2009 .

[10]  Stephen McCombie,et al.  A Preliminary Profiling of Internet Money Mules: An Australian Perspective , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[11]  K. Lampe Human capital and social capital in criminal networks: introduction to the special issue on the 7th Blankensee Colloquium , 2009 .

[12]  Yong Lu,et al.  Social Network Analysis of a Criminal Hacker Community , 2010, J. Comput. Inf. Syst..

[13]  Chei Sian Lee,et al.  Determining Services for the Mobile Tourist , 2010, J. Comput. Inf. Syst..

[14]  David Kirk,et al.  An Overview of Social Network Analysis , 2010 .

[15]  T. Holt,et al.  Exploring stolen data markets online: products and market forces , 2010 .

[16]  John Scott,et al.  The SAGE Handbook of Social Network Analysis , 2011 .

[17]  M. Soudijn,et al.  Cybercrime and virtual offender convergence settings , 2012, Trends in Organized Crime.

[18]  David Décary-Hétu,et al.  The social network of hackers , 2012 .

[19]  Nigel Shadbolt,et al.  Structural analysis of online criminal social networks , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.

[20]  Virtuele ontmoetingsruimtes voor cybercriminelen , 2012 .

[21]  Andy Gill,et al.  Above and below: measuring crime risk in and around underground mass transit systems , 2014 .

[22]  Elmer Lastdrager,et al.  Achieving a consensual definition of phishing based on a systematic review of the literature , 2014, Crime Science.

[23]  E. R. Leukfeldt,et al.  Cybercrime and social ties , 2014, Trends in Organized Crime.

[24]  T. Holt,et al.  An Assessment of the Current State of Cybercrime Scholarship , 2014 .

[25]  M. Bouchard,et al.  Opportunistic Structures of Organized Crime , 2014 .

[26]  M. Williams,et al.  GUARDIANS UPON HIGH: AN APPLICATION OF ROUTINE ACTIVITIES THEORY TO ONLINE IDENTITY THEFT IN EUROPE AT THE COUNTRY AND INDIVIDUAL LEVEL , 2016 .