{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:07:08Z","timestamp":1772809628771,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,5]],"date-time":"2014-11-05T00:00:00Z","timestamp":1415145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,5]]},"DOI":"10.1145\/2663716.2663749","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"347-358","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Handcrafted Fraud and Extortion"],"prefix":"10.1145","author":[{"given":"Elie","family":"Bursztein","sequence":"first","affiliation":[{"name":"Google, Mountain view, CA, USA"}]},{"given":"Borbala","family":"Benko","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Daniel","family":"Margolis","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Tadek","family":"Pietraszek","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Andy","family":"Archer","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Allan","family":"Aquino","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Andreas","family":"Pitsillidis","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"APWG. Global phishing survey: Trends and domain name use in 1h2011. http:\/\/www.antiphishing.org\/reports\/ 2011.  APWG. Global phishing survey: Trends and domain name use in 1h2011. http:\/\/www.antiphishing.org\/reports\/ 2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1925004.1925009"},{"key":"e_1_3_2_1_3_1","volume-title":"Influence: The psychology of persuasion","author":"Cialdini R. B.","year":"1993","unstructured":"R. B. Cialdini . Influence: The psychology of persuasion . 1993 . R. B. Cialdini. Influence: The psychology of persuasion. 1993."},{"key":"e_1_3_2_1_4_1","volume-title":"FBI","author":"FBI.","year":"2013","unstructured":"FBI. 2013 internet crime report. Technical report , FBI , 2013. FBI. 2013 internet crime report. Technical report, FBI, 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314391"},{"key":"e_1_3_2_1_7_1","unstructured":"Google. Google's internet identity research. https:\/\/sites.google.com\/site\/oauthgoog\/gnubby.  Google. Google's internet identity research. https:\/\/sites.google.com\/site\/oauthgoog\/gnubby."},{"key":"e_1_3_2_1_8_1","unstructured":"Google. Login challenge for suspicious sign-ins. https:\/\/support.google.com\/a\/answer\/6002699?hl=en.  Google. Login challenge for suspicious sign-ins. https:\/\/support.google.com\/a\/answer\/6002699?hl=en."},{"key":"e_1_3_2_1_9_1","unstructured":"Google. Transparency report: Safe browsing. http:\/\/www.google.com\/transparencyreport\/safebrowsing\/?hl=en.  Google. Transparency report: Safe browsing. http:\/\/www.google.com\/transparencyreport\/safebrowsing\/?hl=en."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_11_1","unstructured":"M. Hearn. An update on our war against account hijackers. http:\/\/bit.ly\/1qfMckD 2013.  M. Hearn. An update on our war against account hijackers. http:\/\/bit.ly\/1qfMckD 2013."},{"key":"e_1_3_2_1_12_1","unstructured":"IOActive. Reversal and analysis of zeus and spyeye banking trojans. http:\/\/www.ioactive.com\/pdfs\/ZeusSpyEyeBankingTrojanAnalysis.pdf.  IOActive. Reversal and analysis of zeus and spyeye banking trojans. http:\/\/www.ioactive.com\/pdfs\/ZeusSpyEyeBankingTrojanAnalysis.pdf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_15_1","unstructured":"J. Leyden. Typo-squatting domains can harvest corporate emails. http:\/\/bit.ly\/1o8dx6d 2011.  J. Leyden. Typo-squatting domains can harvest corporate emails. http:\/\/bit.ly\/1o8dx6d 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73614-1_2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093498"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299016"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Discovering phishing dropboxes using email metadata. In eCrime Researchers Summit (eCrime)","author":"Moore T.","year":"2012","unstructured":"T. Moore and R. Clayton . Discovering phishing dropboxes using email metadata. In eCrime Researchers Summit (eCrime) , 2012 , pages 1 -- 9 . IEEE , 2012. T. Moore and R. Clayton. Discovering phishing dropboxes using email metadata. In eCrime Researchers Summit (eCrime), 2012, pages 1--9. IEEE, 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"Jun.","author":"Naraine R.","year":"2012","unstructured":"R. Naraine . Zdnet security blog: \"state-sponsored attackers\" using ie zero-day to hijack gmail accounts , Jun. 2012 . R. Naraine. Zdnet security blog: \"state-sponsored attackers\" using ie zero-day to hijack gmail accounts, Jun. 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.11"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557330"},{"key":"e_1_3_2_1_23_1","unstructured":"Symantec. Industrial espionage: Targeted attacks and advanced persistent threats (apts). http:\/\/bit.ly\/RsGkV7.  Symantec. Industrial espionage: Targeted attacks and advanced persistent threats (apts). http:\/\/bit.ly\/RsGkV7."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660282"},{"key":"e_1_3_2_1_25_1","unstructured":"T. N. Web. Microsoft can recycle your outlook.com email address if your account becomes inactive. http:\/\/tnw.co\/1sWsNAU 2013.  T. N. Web. Microsoft can recycle your outlook.com email address if your account becomes inactive. http:\/\/tnw.co\/1sWsNAU 2013."},{"key":"e_1_3_2_1_26_1","volume-title":"NDSS","author":"Whittaker C.","year":"2010","unstructured":"C. Whittaker , B. Ryner , M. Nazif , and M. Nazif . Large-scale automatic classification of phishing pages . In NDSS , 2010 . C. Whittaker, B. Ryner, M. Nazif, and M. Nazif. Large-scale automatic classification of phishing pages. In NDSS, 2010."},{"key":"e_1_3_2_1_27_1","volume-title":"NDSS","author":"Zhang Y.","year":"2007","unstructured":"Y. Zhang , S. Egelman , L. Cranor , J. Hong , and J. Hong . Phinding phish: Evaluating anti-phishing tools . In NDSS , 2007 . Y. Zhang, S. Egelman, L. Cranor, J. Hong, and J. Hong. Phinding phish: Evaluating anti-phishing tools. In NDSS, 2007."},{"key":"e_1_3_2_1_28_1","unstructured":"Embassy of the Unites States warning on West African advanced fee scams http:\/\/abidjan.usembassy.gov\/art_of_scam.html.  Embassy of the Unites States warning on West African advanced fee scams http:\/\/abidjan.usembassy.gov\/art_of_scam.html."}],"event":{"name":"IMC '14: Internet Measurement Conference","location":"Vancouver BC Canada","acronym":"IMC '14","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2014 Conference on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663716.2663749","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663716.2663749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:18Z","timestamp":1750229778000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663716.2663749"}},"subtitle":["Manual Account Hijacking in the Wild"],"short-title":[],"issued":{"date-parts":[[2014,11,5]]},"references-count":28,"alternative-id":["10.1145\/2663716.2663749","10.1145\/2663716"],"URL":"https:\/\/doi.org\/10.1145\/2663716.2663749","relation":{},"subject":[],"published":{"date-parts":[[2014,11,5]]},"assertion":[{"value":"2014-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}