Cyber Fraud: Tactics, Techniques and Procedures



Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, "Cyber Fraud: Tactics, Techniques and Procedures" documents changes in the culture of cyber criminals and explores innovations that are the result of those changes. The book uses the term botnet as a metaphor for the evolving changes represented by this underground economy. 

Copiously illustrated, this authoritative volume: 

  • Examines economic vulnerability models in the market and analyzes how they affect vendors, end users and vulnerability researchers
  • Outlines a conceptual model of the structures, functions and roles of actors and organizations within this illicit marketplace
  • Discusses the roles of white hats and black hats in the underground culture
  • Addresses the developing maturity of malcode communication and the preventative measures organizations can take
  • Discusses Trojan software, specifically designed by hackers, used to target the financial sector
  • Outlines the necessary countermeasure expenditures that should be considered by organizations

This eye-opening work includes a variety of case studies including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell and profit from the personal financial information for consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

Product Details

ISBN 978-1-4200-9127-4
Hardcover, 500 PAGES

Table of Contents:

  • Chapter 1: Emerging Economic Models for Software Vulnerability Research
  • Chapter 2: Cyber Fraud: Principles, Trends, and Mitigation Techniques
  • Chapter 3: The Cyber Threat Landscape in Russia
  • Chapter 4: The Cyber Threat Landscape in Brazil
  • Chapter 5: The Russian Business Network: The Rise and Fall of a Criminal ISP
  • Chapter 6: Banking Trojans: An Overview
  • Chapter 7: Inside the World of Money Mules
  • Chapter 8: IFrame Attacks - An Examination of the Business of IFrame Exploitation
  • Chapter 9: Distributed Denial of Service (DDoS) Attacks: Motivations and Methods
  • Chapter 10: The Torpig Trojan Exposed
  • Chapter 11: The Laqma Trojan
  • Chapter 12: Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks
  • Chapter 13: SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse
  • Chapter 14: Preventing Malicious Code from "Phoning Home"
  • Chapter 15: Mobile Malicious Code Trends