Automatic Detection of Cybercrime-Suspected Threads in Online Underground Forums

Total Page:16

File Type:pdf, Size:1020Kb

Automatic Detection of Cybercrime-Suspected Threads in Online Underground Forums Graduate Theses, Dissertations, and Problem Reports 2018 Automatic Detection of Cybercrime-suspected Threads in Online Underground Forums Jian Liu Follow this and additional works at: https://researchrepository.wvu.edu/etd Recommended Citation Liu, Jian, "Automatic Detection of Cybercrime-suspected Threads in Online Underground Forums" (2018). Graduate Theses, Dissertations, and Problem Reports. 7204. https://researchrepository.wvu.edu/etd/7204 This Thesis is protected by copyright and/or related rights. It has been brought to you by the The Research Repository @ WVU with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you must obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in WVU Graduate Theses, Dissertations, and Problem Reports collection by an authorized administrator of The Research Repository @ WVU. For more information, please contact [email protected]. Automatic Detection of Cybercrime-suspected Threads in Online Underground Forums Jian Liu Thesis submitted to the Benjamin M. Statler College of Engineering and Mineral Resources at West Virginia University in partial fulfillment of the requirements for the degree of Master of Science in Computer Science Yanfang Ye, Ph.D., Committee Chairperson Xin Li, Ph.D. Elaine M. Eschen, Ph.D. Lane Department of Computer Science and Electrical Engineering Morgantown, West Virginia 2018 Keywords: underground forums, cybercrime, Heterogeneous Information Network Copyright 2018 Jian Liu Abstract Automatic Detection of Cybercrime-suspected Threads in Online Underground Forums Jian Liu Recently, online underground markets emerging in the form of underground forums have enabled cybercriminals to exchange knowledge, trade in illicit products or services, which have played a central role in the cybercriminal ecosystem. In order to facilitate the deployment of effective countermeasures to disrupt the illicit activities, it’s important to analyze these underground forums to gain deep insights into the ecosystem. Unfortunately, due to the number of forums, their size, and the expertise required, it’s infeasible to perform manual exploration to understand their behavioral processes. To address the above challenges, in this thesis, we propose a novel framework to automate the analysis of underground forums for the detection of cybercrime-suspected threads. To detect whether a given thread is cybercrime-suspected or not, we not only analyze the content in the threads, but also utilize the relations among threads, users, replies, and topics. To model the rich semantic relationships (i.e., thread-user, thread-reply, thread-topic, reply-user and reply-topic relations), we introduce a structured Heterogeneous Information Network (HIN) for representation, which is capable to be composed of different types of entities and relations. To capture the complex relationships (e.g., two threads are relevant if they were posted by the same user and discussed the same topic), we use a meta- structure-based approach to characterize the semantic relatedness over threads. As different meta-structures depict the relatedness over threads at different views, we then build a classifier using Laplacian scores to aggregate different similarities formulated by different meta-structures to make predictions. Comprehensive experiments on the data collections from online underground forums are conducted to validate the effectiveness of our developed system in cybercrime-suspected thread detection by comparisons with alternative approaches. iii To my families iv Acknowledgments I would like to express the deepest appreciation to my committee chair Dr. Yanfang Ye, for the patient guidance, encouragement and advice she has provided throughout my time as her student. I have been extremely lucky to have a supervisor who cared so much about my work, and who responded to my questions and queries so promptly. I would like to thank my committee members, Dr. Li and Dr. Eschen. Thank you for investing time. I feel proud and honored that you accepted to be my committee. I also want to thank my group mates Yiming Zhang and Yujie Fan. Without their help, this thesis cannot be accomplished. v Table of Content Content Abstract ......................................................................................................... ii Acknowledgments ........................................................................................ iv Table of Content ............................................................................................ v List of Figures .............................................................................................. vi List of Tables ............................................................................................... vii Chapter 1. Introduction ................................................................................. 1 1.1 Background and Motivation .................................................................... 1 1.2 Research Objective .................................................................................. 3 1.3 Major Contributions ................................................................................ 4 1.4 Organization of the Thesis ...................................................................... 6 Chapter 2. Related Work ............................................................................... 7 Chapter 3. Proposed Method ......................................................................... 9 3.1 Feature Extraction ................................................................................... 9 3.2 Heterogeneous Information Network Construction .............................. 10 3.3 Meta-structure Based Relatedness ........................................................ 11 3.4 Classification Model Construction ........................................................ 15 Chapter 4. System Architecture .................................................................. 16 Chapter 5. Experimental Results and Analysis ........................................... 18 5.1 Data Collection and Annotation ............................................................ 18 5.2 Evaluation of the Proposed Method ...................................................... 19 5.3 Comparisons with Alternative Methods…………………...………….22 5.4 Case Studies…………………………………………………………...25 Chapter 6. Conclusion and Future Work .................................................... 28 References ................................................................................................... 29 vi List of Figures Figure. 1: Facebook hacking tool advertised in Hack Forums………… .2 Figure. 2: Example of relatedness over threads in underground forum....4 Figure. 3: Network schema for HIN in our application ………………. .11 Figure. 4: Meta-paths (left) and meta-structures (right) on HIN………. 12 Figure. 5: System architecture ………………...….…………………….16 Figure. 6: Effectiveness of Laplacian score………………………….….22 Figure. 7: Parameter sensitivity evaluation.…………….……………... 22 Figure. 8: Scalability evaluation …………………….………………….24 Figure. 9: Stability evaluation………………………….……………….24 Figure. 10: Examples of cybercrime-suspected vs. benign threads…… 25 vii List of Tables TABLE I: The description of each matrix and its element…………. ….10 TABLE II: Performance indices for different methods………………....18 TABLE III: Evaluation of the proposed method………………………. 20 TABLE IV: Comparisons with other alternative methods……………...23 TABLE V: Distribution of detected cybercrime-suspected threads ……26 TABLE VI: Different topics discussed in the detected threads...........… 27 1 Chapter 1. Introduction 1.1 Background and Motivation As Internet becomes increasingly ubiquitous, computing devices connected to Internet have permeated all facets of people’s daily life (e.g., online shopping, social networking). Driven by the innovation centering on Internet ecosystem, the growth of e-commerce has been significantly increased in the overall sluggish economy [1]: worldwide e- commerce sales reached over $2.14 trillion in 2017 and are expected to increase to about $4 trillion in 2020 [2]. Though the Internet has become one of the most important drivers in the worldwide economy, it also provides an open and shared platform by dissolving the barriers so that everyone has opportunity to realize his/her innovations, which implies higher prospects for illicit profits at lower degrees of risk. That is, the Internet can virtually provide a natural and excellent platform for illegal Internet-based activities, commonly known as cybercrimes [3] (e.g., hacking, online scam, credit card and identity fraud, etc.). Cybercrime has become increasingly dependent on the online underground markets, especially underground forums, through which cybercriminals can not only acquisitive the tools, methods and ideas to commit cybercrimes, but also trade the illicit products (e.g., stolen credit cards), resources (e.g., website traffics), and services (e.g., Denial of Service (DDoS) attacks). For example, Fig. 1 shows a Facebook hacking tool advertised in an underground forum (i.e., Hack Forums). The emerging underground forums have enabled cybercriminals to realize considerable profits. For example, the estimated annual revenue for
Recommended publications
  • Key Player Identification in Underground Forums Over
    Session: Long - Graph Nerual Network II CIKM ’19, November 3–7, 2019, Beijing, China Key Player Identification in Underground Forums over Atributed Heterogeneous Information Network Embedding Framework Yiming Zhang, Yujie Fan, Liang Zhao Chuan Shi Yanfang Ye∗ Department of IST School of CS Department of CDS, Case Western George Mason University Beijing University of Posts and Reserve University, OH, USA VA, USA Telecommunications, Beijing, China ABSTRACT ACM Reference Format: Online underground forums have been widely used by cybercrimi- Yiming Zhang, Yujie Fan, Yanfang Ye, Liang Zhao, and Chuan Shi. 2019. nals to exchange knowledge and trade in illicit products or services, Key Player Identifcation in Underground Forums over Attributed Hetero- geneous Information Network Embedding Framework. In which have played a central role in the cybercriminal ecosystem. In The 28th ACM order to combat the evolving cybercrimes, in this paper, we propose International Conference on Information and Knowledge Management (CIKM ’19), November 3–7, 2019, Beijing, China. ACM, New York, NY, USA, 10 pages. and develop an intelligent system named iDetective to automate https://doi.org/10.1145/3357384.3357876 the analysis of underground forums for the identifcation of key players (i.e., users who play the vital role in the value chain). In 1 INTRODUCTION iDetective, we frst introduce an attributed heterogeneous informa- tion network (AHIN) for user representation and use a meta-path As the Internet has become one of the most important drivers in the based approach to incorporate higher-level semantics to build up global economy (e.g., worldwide e-commerce sales reached over relatedness over users in underground forums; then we propose $2.3 trillion dollars in 2017 and its revenues are projected to grow to $4.88 trillion dollars in 2021 [31]), it also provides an open and Player2Vec to efciently learn node (i.e., user) representations in shared platform by dissolving the barriers so that everyone has AHIN for key player identifcation.
    [Show full text]
  • Supervised Discovery of Cybercrime Supply Chains
    Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains Rasika Bhalerao∗, Maxwell Aliapoulios∗, Ilia Shumailov†, Sadia Afroz‡, Damon McCoy∗ ∗ New York University, † University of Cambridge, ‡ International Computer Science Institute [email protected], [email protected], [email protected], [email protected], [email protected], Abstract—Understanding the sequences of processes needed expertise and connections. Machine learning has been used to perform a cybercrime is crucial for effective interventions. to automate some analysis of cybercrime forums, such as However, generating these supply chains currently requires time- identifying products that are bought and sold [26], however, consuming manual effort. We propose a method that leverages machine learning and graph-based analysis to efficiently extract using it to discover the trade relationship between products supply chains from cybercrime forums. Our supply chain de- has not been explored yet. tection algorithm can identify 33% and 42% relevant chains In this paper, we propose an approach to systematically within major English and Russian forums, respectively, showing identify relevant supply chains from cybercrime forums. Our improvements over the baselines of 11% and 5%, respectively. approach classifies the product category from a forum post, Our analysis of the supply chains demonstrates underlying connections between products and services that are potentially identifies the replies indicating that a user bought or sold the useful understanding and undermining the illicit activity of these product, then builds an interaction graph and uses a graph forums. For example, our extracted supply chains illuminate cash traversal algorithm to discover links between related product out and money laundering techniques and their importance to buying and subsequent selling posts.
    [Show full text]
  • Measuring Cybercrime As a Service (Caas) Offerings in a Cybercrime Forum
    Measuring Cybercrime as a Service (CaaS) Offerings in a Cybercrime Forum Ugur Akyazi Michel van Eeten Carlos H. Gañán Delft University of Technology Delft University of Technology Delft University of Technology [email protected] [email protected] [email protected] ABSTRACT could be purchased for around $200 and a month of SMS spoofing The emergence of Cybercrime-as-a-Service (CaaS) is a critical evo- for only $20. In addition to technical tools, it is also possible to hire lution in the cybercrime landscape. A key area of research on CaaS services, such as targeted account takeover [35]. The overall impact is where and how the supply of CaaS is being matched with demand. of CaaS is to make cybercrime more accessible to new criminals, Next to underground marketplaces and custom websites, cyber- as well as to support business models for advanced criminals via crime forums provide an important channel for CaaS suppliers to specialized business-to-business services [22]. attract customers. Our study presents the first comprehensive and A key area of research on CaaS is where and how the supply longitudinal analysis of types of CaaS supply and demand on a of these services is being matched with demand. This question is cybercrime forum. We develop a classifier to identify supply and critical for developing effective disruption strategies by law enforce- demand for each type and measure their relative prevalence and ment. Simply put: how do CaaS suppliers find their customers? One apply this to a dataset spanning 11 years of posts on Hack Forums, of the promises of CaaS is that it is accessible for new entrants, so one of the largest and oldest ongoing English-language cybercrime it cannot operate effectively within old and constrained model of forum on the surface web.
    [Show full text]
  • Hackers Gonna Hack: Investigating the Effect of Group Processes and Social Identities Within Online Hacking Communities
    Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Thesis submitted for the degree of Doctor of Philosophy Bournemouth University October 2018 This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and due acknowledgement must always be made of the use of any material contained in, or derived from, this thesis. 1 2 Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Abstract Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattacks. This investigation examines the human side of hacking and the merits of understanding this community. This includes group processes regarding: the identification and adoption of a social identity within hacking, and the variations this may cause in behaviour; trust within in the social identity group; the impact of breaches of trust within the community. It is believed that this research could lead to constructive developments for cybersecurity practices and individuals involved with hacking communities by identifying significant or influencing elements of the social identity and group process within these communities. For cybersecurity, the positive influence on individual security approaches after the hacker social identity adoption, and the subsequent in-group or out-group behaviours, could be adapted to improve security in the work place context. For individuals involved in the communities, an increase in the awareness of the potential influences from their adopted social identities and from other members could help those otherwise vulnerable to manipulation, such as new or younger members.
    [Show full text]
  • Towards Automatic Discovery of Cybercrime Supply Chains
    Towards Automatic Discovery of Cybercrime Supply Chains Rasika Bhalerao∗, Maxwell Aliapoulios∗, Ilia Shumailovy, Sadia Afrozz, Damon McCoy∗ ∗ New York University, y University of Cambridge, z International Computer Science Institute, [email protected], [email protected], [email protected], [email protected], [email protected], Abstract—Cybercrime forums enable modern criminal en- [28], [29], [38]. However, we as a community do not have trepreneurs to collaborate with other criminals into increasingly any systematic methods of identifying these supply chains that efficient and sophisticated criminal endeavors. Understanding the enable more sophisticated and streamlined attacks. Currently connections between different products and services can often illuminate effective interventions. However, generating this un- analysts often manually investigate cybercrime forums to derstanding of supply chains currently requires time-consuming understand these supply chains, which is a time-consuming manual effort. process [19]. In this paper, we propose a language-agnostic method to In this paper, we propose, implement, and evaluate a automatically extract supply chains from cybercrime forum posts framework to systematically identify relevant supply chains and replies. Our supply chain detection algorithm can identify 36% and 58% relevant chains within major English and Russian present in cybercrime forums. Our framework is composed of forums, respectively, showing improvements over the baselines of several components which include automated
    [Show full text]
  • The Gateway Trojan
    THE GATEWAY TROJAN Volume 1, Version 1 TABLE OF CONTENTS About This Report ....................................................................................................................................1 Why This Malware?..................................................................................................................................2 The Basic Questions About RATs..........................................................................................................2 Different Breeds of RATs ........................................................................................................................5 Symantec’s Haley Subcategories of RATs .........................................................................................6 Dissecting a RAT .......................................................................................................................................7 Category II: Common RATs ....................................................................................................................9 Back Orifice ...........................................................................................................................................9 Bifrost ................................................................................................................................................. 10 Blackshades ....................................................................................................................................... 11 DarkTrack .........................................................................................................................................
    [Show full text]
  • The Internet of Things in the Cybercrime Underground
    The Internet of Things in the Cybercrime Underground Stephen Hilt, Vladimir Kropotov, Fernando Mercês, Mayra Rosario, and David Sancho TREND MICRO LEGAL DISCLAIMER Contents The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all 4 situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted Introduction upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document 7 at any time without prior notice. The IoT in Underground Communities Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to 40 the original language official version of the document. Any Case Studies on IoT Underground discrepancies or differences created in the translation are not binding and have no legal effect for compliance or Criminals enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro 43 makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree Predictions that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied.
    [Show full text]
  • The Internet of Things in the Cybercrime Underground
    The Internet of Things in the Cybercrime Underground Stephen Hilt, Vladimir Kropotov, Fernando Mercês, Mayra Rosario, and David Sancho TREND MICRO LEGAL DISCLAIMER Contents The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all 4 situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted Introduction upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document 7 at any time without prior notice. The IoT in Underground Communities Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to 40 the original language official version of the document. Any Case Studies on IoT Underground discrepancies or differences created in the translation are not binding and have no legal effect for compliance or Criminals enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro 43 makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree Predictions that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied.
    [Show full text]
  • Towards a New Cyber Threat Actor Typology
    Mark de Bruijne, Michel van Eeten, Carlos Hernández Gañán, Wolter Pieters Towards a new cyber threat actor typology A hybrid method for the NCSC cyber security assessment Towards a new cyber threat actor typology A hybrid method for the NCSC cyber security assessment By Mark de Bruijne, Michel van Eeten, Carlos Hernández Gañán, Wolter Pieters Faculty of Technology, Policy and Management Delft University of Technology 1 Preface This report could not have been made without the help of a large number of people. We cannot mention all of these people by name, but our thanks extends to all of them. First of all, the researchers would like to thank all the interviewees, who were promised anonymity, for their precious time and valuable feedback. They have contributed a lot to the report and our understanding of cyber actors and the methods which can be used to classify them. We, furthermore, would like to extend these thanks to the members of the supervisory committee. The committee consisted of Prof. Stijn Ruiter (chair), drs. Olivier Hendriks, drs. Noortje Henrichs, dr. Jan Kortekaas, Prof. Eric Verheul, and drs. Wytske van der Wagen. We appreciated their critical and highly constructive feedback during the entire process. Needless to say, the usual disclaimer applies: The contributions from respondents or members of the supervisory committee do not mean that the respondents, members of the supervisory committee or these institutions automatically agree with the complete content of the report. Also, we would like to emphasize that the report does not necessarily reflect the opinion of or the Minister or the Ministry of Security and Justice.
    [Show full text]
  • Lord of the Flies
    LORD OF THE FLIES: AN OPEN-SOURCE INVESTIGATION INTO SAUD AL-QAHTANI Table of Contents Introduction .................................................................................................................................................................................................... 1 I. Key Findings...............................................................................................................................................................................................3 II. From Poet To Enforcer ........................................................................................................................................................................ 4 III. Leaked Contact Information Owned By Al-Qahtani ............................................................................................................8 Al-Qahtani Twitter Connected To [email protected] And Cell Number ....................................................................8 Royal Court Email Used To Provide Al-Qahtani Phone Number, Email ................................................................... 10 Gmail Linked To Same Al-Qahtani Phone Number And Email As Twitter .............................................................. 11 IV. Hack Forums Activity ....................................................................................................................................................................... 15 Scammed On Day One .....................................................................................................................................................................
    [Show full text]
  • U. C. Berkeley Dissertation
    The Dark Net: De-Anonymization, Classification and Analysis by Rebecca Sorla Portnoff A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor David Wagner, Chair Professor Vern Paxson Professor David Bamman Spring 2018 The Dark Net: De-Anonymization, Classification and Analysis Copyright c 2018 by Rebecca Sorla Portnoff 1 Abstract The Dark Net: De-Anonymization, Classification and Analysis by Rebecca Sorla Portnoff Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Wagner, Chair The Internet facilitates interactions among human beings all over the world, with greater scope and ease than we could have ever imagined. However, it does this for both well-intentioned and malicious actors alike. This dissertation focuses on these malicious persons and the spaces online that they inhabit and use for profit and plea- sure. Specifically, we focus on three main domains of criminal activity on the clear web and the Dark Net: classified ads advertising trafficked humans for sexual services, cy- ber black-market forums, and Tor onion sites hosting forums dedicated to child sexual abuse material (CSAM). In the first domain, we develop tools and techniques that can be used separately and in conjunction to group Backpage sex ads by their true author (and not the claimed author in the ad). Sites for online classified ads selling sex are widely used by human traffickers to support their pernicious business. The sheer quantity of ads makes manual exploration and analysis unscalable.
    [Show full text]
  • Selling “Slaving”
    SELLING “SL AV ING” OUTING THE PRINCIPAL ENABLERS THAT PROFIT FROM PUSHING MALWARE AND PUT YOUR PRIVACY AT RISK JULY 2015 TABLE OF CONTENTS TABLE OF CONTENTS ..................................................................................................................................................I TABLE OF IMAGES ..........................................................................................................................................................II ABOUT THIS REPORT ..................................................................................................................................................1 EXECUTIVE SUMMARY .............................................................................................................................................3 Dirty Rats: How Hackers Are Peeking Into Your Bedroom ...............................................3 WHAT CAN RATTERS DO? .................................................................................................................................... 6 SELLING “SLAVING” ......................................................................................................................................................7 CHEAP, EASY-TO-USE MALWARE THAT PAYS FOR ITSELF............................................... 8 STORIES OF CRUELTY—“RATS” ON THE ATTACK .......................................................................10 YOUTUBE HAS A RAT PROBLEM................................................................................................................
    [Show full text]