Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

09/09/2020
by   Michele Campobasso, et al.
0

In this paper we provide evidence of an emerging criminal infrastructure enabling impersonation attacks at scale. Impersonation-as-a-Service (ImpaaS) allows attackers to systematically collect and enforce user profiles (consisting of user credentials, cookies, device and behavioural fingerprints, and other metadata) to circumvent risk-based authentication system and effectively bypass multi-factor authentication mechanisms. We present the ImpaaS model and evaluate its implementation by analysing the operation of a large, invite-only, Russian ImpaaS platform providing user profiles for more than 260'000 Internet users worldwide. Our findings suggest that the ImpaaS model is growing, and provides the mechanisms needed to systematically evade authentication controls across multiple platforms, while providing attackers with a reliable, up-to-date, and semi-automated environment enabling target selection and user impersonation against Internet users as scale.

READ FULL TEXT
research
02/22/2019

RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications

Providing a mechanism to authenticate users in healthcare applications i...
research
10/15/2020

Multi-factor authentication for users of non-internet based applications of blockchain-based platforms

Attacks targeting several millions of non-internet based application use...
research
04/16/2020

AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning

The authentication field is evolving towards mechanisms able to keep use...
research
10/18/2019

A Solution for Controlling and Managing User Profiles based on Data Privacy for IoT Applications

IoT is an emerging area in which we expect to have billions of devices c...
research
11/22/2017

Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks

Cloud-based services have become part of our day-to-day software solutio...
research
05/30/2019

Dashboard Task Monitor for Managing ATLAS User Analysis on the Grid

The organization of the distributed user analysis on the Worldwide LHC C...
research
01/04/2022

Prospects for Improving Password Selection

User-chosen passwords remain essential to online security, and yet peopl...

Please sign up or login with your details

Forgot password? Click here to reset