Skip to main content

An Analysis of the Nature of Spam as Cybercrime

  • Chapter
  • First Online:

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 3))

Abstract

The continued rapid growth of the Internet and the emergence of the Internet of Things (IoT) have resulted in the increased sophistication of malicious software or crime-ware tools and the refinement of deceptive methods to conduct computer attacks and intrusions. Cyber attacks via spam emails (unsolicited bulk messages) remain one of the major vectors for the dissemination of malware and many predicate forms of cybercrime. Monitoring spam as potential cybercrime can help prevention by observing changes in attack methods including the type of malicious code and the presence of criminal networks. In this paper, we describe the nature and trends in spam borne malware. This paper outlines some of the issues and problems in respect to the spam in cybercrime and gives examples of known cases and offers insight to tackle spam problems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Signal-Spam was initiated in 2005 as a public–private organization to identify spammers for enforcement cases.

  2. 2.

    Tor is free software and an open network that helps internet users defend against network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Abbreviations

AFP:

Australian Federal Police

C&C:

Command and control server

CAN-SPAM:

Controlling the Assault of Non-Solicited Pornography and Marketing

CoE:

Council of Europe

DDoS:

Distributed Denial of Service

ECPA:

Electronic Communications Privacy Act

IoT:

Internet of things

ISP:

Internet service provider

ITU:

International Telecommunication Union

Malware:

Malicious software

NSW:

New South Wales

OECD:

Organization for Economic Cooperation and Development

P2P:

Peer-to-peer

PPI:

Pay per install

RTA:

Remote access trojan

Tor:

The onion router

URL:

Uniform resource locator

VPN:

Virtual private network

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mamoun Alazab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Alazab, M., Broadhurst, R. (2017). An Analysis of the Nature of Spam as Cybercrime. In: Clark, R., Hakim, S. (eds) Cyber-Physical Security. Protecting Critical Infrastructure, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-32824-9_13

Download citation

Publish with us

Policies and ethics