Cyber Criminal Networks And Money Mules: An Analysis Of Low-Tech And High-Tech Fraud Attacks In The Netherlands ...

This paper is about the money mules used by cyber criminals. Although money mules are not part of the core group of criminal networks, they play an important role within these networks. They are used to interrupt the trail to criminal networks. However, to date only a few cyber crime studies have focused on money mules. Based on case studies about cyber criminal groups, we expected differences between money mules used by low-tech as opposed to high-tech groups. We analyzed data from a fraud registration database of a Dutch bank to gain in-sight into the characteristics of money mules and how c... Mehr ...

Verfasser: Leukfeldt, Rutger
Jansen, Jurjen
Dokumenttyp: Text
Erscheinungsdatum: 2016
Verlag/Hrsg.: Zenodo
Schlagwörter: Money Mules / Phishing / Malware / Cyber crime / Organized Crime
Sprache: unknown
Permalink: https://search.fid-benelux.de/Record/base-29581278
Datenquelle: BASE; Originalkatalog
Powered By: BASE
Link(s) : https://dx.doi.org/10.5281/zenodo.56210

This paper is about the money mules used by cyber criminals. Although money mules are not part of the core group of criminal networks, they play an important role within these networks. They are used to interrupt the trail to criminal networks. However, to date only a few cyber crime studies have focused on money mules. Based on case studies about cyber criminal groups, we expected differences between money mules used by low-tech as opposed to high-tech groups. We analyzed data from a fraud registration database of a Dutch bank to gain in-sight into the characteristics of money mules and how cyber criminal networks use them. Our analyses clearly show that there are indeed significant differences. Furthermore, the characteristics of money mules indicate what kind of criminal network is behind the attack. The results of our study can be used by law enforcement agencies to develop targeted investigation and prosecution strategies. ... :