Skip to main content
Top
Published in:
Cover of the book

2017 | OriginalPaper | Chapter

Understanding Craigslist Rental Scams

Authors : Youngsam Park, Damon McCoy, Elaine Shi

Published in: Financial Cryptography and Data Security

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first systematic empirical study of online rental scams on Craigslist. This study is enabled by a suite of techniques that allowed us to identify scam campaigns and our automated system that is able to collect additional information by conversing with scammers. Our measurement study sheds new light on the broad range of strategies different scam campaigns employ and the infrastructure they depend on to profit. We find that many of these strategies, such as credit report scams, are structurally different from the traditional advanced fee fraud found in previous studies. In addition, we find that Craigslist remove less than half of the suspicious listings we detected. Finally, we find that many of the larger-scale campaigns we detected depend on credit card payments, suggesting that a payment level intervention might effectively demonetize them.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
According to the affiliate program of Rental Verified, which is used by one of the credit report campaigns we found, it pays up to \(\$18\) per customer. https://​rentalverified.​com/​affiliates.
 
Literature
7.
go back to reference Buchanan, J., Grant, A.J.: Investigating and prosecuting Nigerian fraud. U. S. Attorneys’ Bull. 49(6), 39–47 (2001) Buchanan, J., Grant, A.J.: Investigating and prosecuting Nigerian fraud. U. S. Attorneys’ Bull. 49(6), 39–47 (2001)
8.
go back to reference Clayton, R., Moore, T., Christin, N.: Concentrating correctly on cybercrime concentration. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015 Clayton, R., Moore, T., Christin, N.: Concentrating correctly on cybercrime concentration. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015
9.
go back to reference Dyrud, M.A.: I brought you a good news: an analysis of Nigerian 419 letters. In: Proceedings of the 2005 Association for Business Communication Annual Convention (2005) Dyrud, M.A.: I brought you a good news: an analysis of Nigerian 419 letters. In: Proceedings of the 2005 Association for Business Communication Annual Convention (2005)
10.
go back to reference Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of Nigerian frauds. In: Montoyo, A., Muńoz, R., Métais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161–172. Springer, Heidelberg (2005). doi:10.1007/11428817_15 CrossRef Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of Nigerian frauds. In: Montoyo, A., Muńoz, R., Métais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161–172. Springer, Heidelberg (2005). doi:10.​1007/​11428817_​15 CrossRef
11.
go back to reference Garg, V., Nilizadeh, S.: Craigslist scams and community composition: investigating online fraud victimization. In: International Workshop on Cyber Crime, IEEE (2013) Garg, V., Nilizadeh, S.: Craigslist scams and community composition: investigating online fraud victimization. In: International Workshop on Cyber Crime, IEEE (2013)
12.
go back to reference Herley, C.: Why do Nigerian Scammers say they are from Nigeria? In: WEIS (2012) Herley, C.: Why do Nigerian Scammers say they are from Nigeria? In: WEIS (2012)
13.
go back to reference Huang, J.M., Stringhini, G., Yong, P.: Quit playing games with my heart: understanding online dating scams. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 216–236. Springer, Cham (2015). doi:10.1007/978-3-319-20550-2_12 CrossRef Huang, J.M., Stringhini, G., Yong, P.: Quit playing games with my heart: understanding online dating scams. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 216–236. Springer, Cham (2015). doi:10.​1007/​978-3-319-20550-2_​12 CrossRef
14.
go back to reference Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the scam jungle: a closer look at 419 scam email operations. In: Security and Privacy Workshops (SPW), 2013 IEEE, pp. 143–150. IEEE (2013) Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the scam jungle: a closer look at 419 scam email operations. In: Security and Privacy Workshops (SPW), 2013 IEEE, pp. 143–150. IEEE (2013)
15.
go back to reference Johnson, C.: Fakers, breachers, slackers, and deceivers: Opportunistic actors during the foreclosure crisis deserve criminal sanctions. Cap. Univ. Law Rev. 40(4), 853 (2012) Johnson, C.: Fakers, breachers, slackers, and deceivers: Opportunistic actors during the foreclosure crisis deserve criminal sanctions. Cap. Univ. Law Rev. 40(4), 853 (2012)
16.
go back to reference Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM Conference on CCS. ACM (2008) Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM Conference on CCS. ACM (2008)
17.
go back to reference Konte, M., Feamster, N., Jung, J.: Dynamics of online scam hosting infrastructure. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 219–228. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00975-4_22 CrossRef Konte, M., Feamster, N., Jung, J.: Dynamics of online scam hosting infrastructure. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 219–228. Springer, Heidelberg (2009). doi:10.​1007/​978-3-642-00975-4_​22 CrossRef
18.
go back to reference Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Félegyházi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G.M., Savage, S.: Click trajectories: end-to-end analysis of the spam value chain. In: IEEE Symposium on Security and Privacy (2011) Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Félegyházi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G.M., Savage, S.: Click trajectories: end-to-end analysis of the spam value chain. In: IEEE Symposium on Security and Privacy (2011)
19.
go back to reference McCoy, D., Dharmdasani, H., Kreibich, C., Voelker, G.M., Savage, S.: Priceless: the role of payments in abuse-advertised goods. In: Proceedings of the 2012 ACM Conference on CCS, CCS 2012 (2012) McCoy, D., Dharmdasani, H., Kreibich, C., Voelker, G.M., Savage, S.: Priceless: the role of payments in abuse-advertised goods. In: Proceedings of the 2012 ACM Conference on CCS, CCS 2012 (2012)
20.
go back to reference McCoy, D., Pitsillidis, A., Jordan, G., Weaver, N., Kreibich, C., Krebs, B., Voelker, G.M., Savage, S., Levchenko, K.: Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In: USENIX Security Symposium (2012) McCoy, D., Pitsillidis, A., Jordan, G., Weaver, N., Kreibich, C., Krebs, B., Voelker, G.M., Savage, S., Levchenko, K.: Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In: USENIX Security Symposium (2012)
21.
go back to reference Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: NDSS (2014) Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: NDSS (2014)
22.
go back to reference Rege, A.: What’s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494–512 (2009) Rege, A.: What’s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494–512 (2009)
23.
go back to reference Smith, A.: Nigerian scam e-mails and the charms of capital. Cult. Stud. 23(1), 27–47 (2009)CrossRef Smith, A.: Nigerian scam e-mails and the charms of capital. Cult. Stud. 23(1), 27–47 (2009)CrossRef
24.
go back to reference Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54, 70–75 (2011)CrossRef Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54, 70–75 (2011)CrossRef
25.
go back to reference Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns. In: Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats, LEET 2011, p. 4. USENIX Association, Berkeley (2011) Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns. In: Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats, LEET 2011, p. 4. USENIX Association, Berkeley (2011)
26.
go back to reference Stone-Gross, B., Moser, A., Kruegel, C., Kirda, E., Almeroth, K.: FIRE: FInding Rogue nEtworks. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Honolulu, HI, December 2009 Stone-Gross, B., Moser, A., Kruegel, C., Kirda, E., Almeroth, K.: FIRE: FInding Rogue nEtworks. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Honolulu, HI, December 2009
27.
go back to reference Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T., Kruegel, C., McCoy, D., Savage, S., Vigna, G.: Framing dependencies introduced by underground commoditization. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015 Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T., Kruegel, C., McCoy, D., Savage, S., Vigna, G.: Framing dependencies introduced by underground commoditization. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015
28.
go back to reference Tive, C.: 419 scam: Exploits of the Nigerian con man. iUniverse (2006) Tive, C.: 419 scam: Exploits of the Nigerian con man. iUniverse (2006)
29.
go back to reference Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychol. Behav. Soc. Netw. 15(3), 181–183 (2012)CrossRef Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychol. Behav. Soc. Netw. 15(3), 181–183 (2012)CrossRef
Metadata
Title
Understanding Craigslist Rental Scams
Authors
Youngsam Park
Damon McCoy
Elaine Shi
Copyright Year
2017
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-54970-4_1

Premium Partner