Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

Understanding Craigslist Rental Scams

verfasst von : Youngsam Park, Damon McCoy, Elaine Shi

Erschienen in: Financial Cryptography and Data Security

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first systematic empirical study of online rental scams on Craigslist. This study is enabled by a suite of techniques that allowed us to identify scam campaigns and our automated system that is able to collect additional information by conversing with scammers. Our measurement study sheds new light on the broad range of strategies different scam campaigns employ and the infrastructure they depend on to profit. We find that many of these strategies, such as credit report scams, are structurally different from the traditional advanced fee fraud found in previous studies. In addition, we find that Craigslist remove less than half of the suspicious listings we detected. Finally, we find that many of the larger-scale campaigns we detected depend on credit card payments, suggesting that a payment level intervention might effectively demonetize them.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
According to the affiliate program of Rental Verified, which is used by one of the credit report campaigns we found, it pays up to \(\$18\) per customer. https://​rentalverified.​com/​affiliates.
 
Literatur
7.
Zurück zum Zitat Buchanan, J., Grant, A.J.: Investigating and prosecuting Nigerian fraud. U. S. Attorneys’ Bull. 49(6), 39–47 (2001) Buchanan, J., Grant, A.J.: Investigating and prosecuting Nigerian fraud. U. S. Attorneys’ Bull. 49(6), 39–47 (2001)
8.
Zurück zum Zitat Clayton, R., Moore, T., Christin, N.: Concentrating correctly on cybercrime concentration. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015 Clayton, R., Moore, T., Christin, N.: Concentrating correctly on cybercrime concentration. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015
9.
Zurück zum Zitat Dyrud, M.A.: I brought you a good news: an analysis of Nigerian 419 letters. In: Proceedings of the 2005 Association for Business Communication Annual Convention (2005) Dyrud, M.A.: I brought you a good news: an analysis of Nigerian 419 letters. In: Proceedings of the 2005 Association for Business Communication Annual Convention (2005)
10.
Zurück zum Zitat Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of Nigerian frauds. In: Montoyo, A., Muńoz, R., Métais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161–172. Springer, Heidelberg (2005). doi:10.1007/11428817_15 CrossRef Gao, Y., Zhao, G.: Knowledge-based information extraction: a case study of recognizing emails of Nigerian frauds. In: Montoyo, A., Muńoz, R., Métais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 161–172. Springer, Heidelberg (2005). doi:10.​1007/​11428817_​15 CrossRef
11.
Zurück zum Zitat Garg, V., Nilizadeh, S.: Craigslist scams and community composition: investigating online fraud victimization. In: International Workshop on Cyber Crime, IEEE (2013) Garg, V., Nilizadeh, S.: Craigslist scams and community composition: investigating online fraud victimization. In: International Workshop on Cyber Crime, IEEE (2013)
12.
Zurück zum Zitat Herley, C.: Why do Nigerian Scammers say they are from Nigeria? In: WEIS (2012) Herley, C.: Why do Nigerian Scammers say they are from Nigeria? In: WEIS (2012)
13.
Zurück zum Zitat Huang, J.M., Stringhini, G., Yong, P.: Quit playing games with my heart: understanding online dating scams. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 216–236. Springer, Cham (2015). doi:10.1007/978-3-319-20550-2_12 CrossRef Huang, J.M., Stringhini, G., Yong, P.: Quit playing games with my heart: understanding online dating scams. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 216–236. Springer, Cham (2015). doi:10.​1007/​978-3-319-20550-2_​12 CrossRef
14.
Zurück zum Zitat Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the scam jungle: a closer look at 419 scam email operations. In: Security and Privacy Workshops (SPW), 2013 IEEE, pp. 143–150. IEEE (2013) Isacenkova, J., Thonnard, O., Costin, A., Balzarotti, D., Francillon, A.: Inside the scam jungle: a closer look at 419 scam email operations. In: Security and Privacy Workshops (SPW), 2013 IEEE, pp. 143–150. IEEE (2013)
15.
Zurück zum Zitat Johnson, C.: Fakers, breachers, slackers, and deceivers: Opportunistic actors during the foreclosure crisis deserve criminal sanctions. Cap. Univ. Law Rev. 40(4), 853 (2012) Johnson, C.: Fakers, breachers, slackers, and deceivers: Opportunistic actors during the foreclosure crisis deserve criminal sanctions. Cap. Univ. Law Rev. 40(4), 853 (2012)
16.
Zurück zum Zitat Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM Conference on CCS. ACM (2008) Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM Conference on CCS. ACM (2008)
17.
Zurück zum Zitat Konte, M., Feamster, N., Jung, J.: Dynamics of online scam hosting infrastructure. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 219–228. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00975-4_22 CrossRef Konte, M., Feamster, N., Jung, J.: Dynamics of online scam hosting infrastructure. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 219–228. Springer, Heidelberg (2009). doi:10.​1007/​978-3-642-00975-4_​22 CrossRef
18.
Zurück zum Zitat Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Félegyházi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G.M., Savage, S.: Click trajectories: end-to-end analysis of the spam value chain. In: IEEE Symposium on Security and Privacy (2011) Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Félegyházi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G.M., Savage, S.: Click trajectories: end-to-end analysis of the spam value chain. In: IEEE Symposium on Security and Privacy (2011)
19.
Zurück zum Zitat McCoy, D., Dharmdasani, H., Kreibich, C., Voelker, G.M., Savage, S.: Priceless: the role of payments in abuse-advertised goods. In: Proceedings of the 2012 ACM Conference on CCS, CCS 2012 (2012) McCoy, D., Dharmdasani, H., Kreibich, C., Voelker, G.M., Savage, S.: Priceless: the role of payments in abuse-advertised goods. In: Proceedings of the 2012 ACM Conference on CCS, CCS 2012 (2012)
20.
Zurück zum Zitat McCoy, D., Pitsillidis, A., Jordan, G., Weaver, N., Kreibich, C., Krebs, B., Voelker, G.M., Savage, S., Levchenko, K.: Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In: USENIX Security Symposium (2012) McCoy, D., Pitsillidis, A., Jordan, G., Weaver, N., Kreibich, C., Krebs, B., Voelker, G.M., Savage, S., Levchenko, K.: Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In: USENIX Security Symposium (2012)
21.
Zurück zum Zitat Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: NDSS (2014) Park, Y., Jones, J., McCoy, D., Shi, E., Jakobsson, M.: Scambaiter: understanding targeted nigerian scams on craigslist. In: NDSS (2014)
22.
Zurück zum Zitat Rege, A.: What’s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494–512 (2009) Rege, A.: What’s love got to do with it? Exploring online dating scams and identity fraud. Int. J. Cyber Criminol. 3(2), 494–512 (2009)
23.
Zurück zum Zitat Smith, A.: Nigerian scam e-mails and the charms of capital. Cult. Stud. 23(1), 27–47 (2009)CrossRef Smith, A.: Nigerian scam e-mails and the charms of capital. Cult. Stud. 23(1), 27–47 (2009)CrossRef
24.
Zurück zum Zitat Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54, 70–75 (2011)CrossRef Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54, 70–75 (2011)CrossRef
25.
Zurück zum Zitat Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns. In: Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats, LEET 2011, p. 4. USENIX Association, Berkeley (2011) Stone-Gross, B., Holz, T., Stringhini, G., Vigna, G.: The underground economy of spam: a botmaster’s perspective of coordinating large-scale spam campaigns. In: Proceedings of the 4th USENIX Conference on Large-Scale Exploits and Emergent Threats, LEET 2011, p. 4. USENIX Association, Berkeley (2011)
26.
Zurück zum Zitat Stone-Gross, B., Moser, A., Kruegel, C., Kirda, E., Almeroth, K.: FIRE: FInding Rogue nEtworks. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Honolulu, HI, December 2009 Stone-Gross, B., Moser, A., Kruegel, C., Kirda, E., Almeroth, K.: FIRE: FInding Rogue nEtworks. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), Honolulu, HI, December 2009
27.
Zurück zum Zitat Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T., Kruegel, C., McCoy, D., Savage, S., Vigna, G.: Framing dependencies introduced by underground commoditization. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015 Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T., Kruegel, C., McCoy, D., Savage, S., Vigna, G.: Framing dependencies introduced by underground commoditization. In: Proceedings of the Fourteenth Workshop on the Economics of Information Security (WEIS), Delft, Netherlands, June 2015
28.
Zurück zum Zitat Tive, C.: 419 scam: Exploits of the Nigerian con man. iUniverse (2006) Tive, C.: 419 scam: Exploits of the Nigerian con man. iUniverse (2006)
29.
Zurück zum Zitat Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychol. Behav. Soc. Netw. 15(3), 181–183 (2012)CrossRef Whitty, M.T., Buchanan, T.: The online romance scam: a serious cybercrime. CyberPsychol. Behav. Soc. Netw. 15(3), 181–183 (2012)CrossRef
Metadaten
Titel
Understanding Craigslist Rental Scams
verfasst von
Youngsam Park
Damon McCoy
Elaine Shi
Copyright-Jahr
2017
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-54970-4_1

Premium Partner