Automatic Detection and Analysis of the “Game Hack” Scam

Author(s):  
Emad Badawi ◽  
Guy-Vincent Jourdan ◽  
Gregor Bochmann ◽  
Iosif-Viorel Onut

The “Game Hack” Scam (GHS) is a mostly unreported cyberattack in which attackers attempt to convince victims that they will be provided with free, unlimited “resources” or other advantages for their favorite game. The endgame of the scammers ranges from monetizing for themselves the victims time and resources by having them click through endless “surveys”, filing out “market research” forms, etc., to collecting personal information, getting the victims to subscribe to questionable services, up to installing questionable executable files on their machines. Other scams such as the “Technical Support Scam”, the “Survey Scam”, and the “Romance Scam” have been analyzed before but to the best of our knowledge, GHS has not been well studied so far and is indeed mostly unknown. In this paper, our aim is to investigate and gain more knowledge on this type of scam by following a data-driven approach; we formulate GHS-related search queries, and used multiple search engines to collect data about the websites to which GHS victims are directed when they search online for various game hacks and tricks. We analyze the collected data to provide new insight into GHS and research the extent of this scam. We show that despite its low profile, the click traffic generated by the scam is in the hundreds of millions. We also show that GHS attackers use social media, streaming sites, blogs, and even unrelated sites such as change.org or jeuxvideo.com to carry out their attacks and reach a large number of victims. Our data collection spans a year; in that time, we uncovered 65,905 different GHS URLs, mapped onto over 5,900 unique domains.We were able to link attacks to attackers and found that they routinely target a vast array of games. Furthermore, we find that GHS instances are on the rise, and so is the number of victims. Our low-end estimation is that these attacks have been clicked at least 150 million times in the last five years. Finally, in keeping with similar large-scale scam studies, we find that the current public blacklists are inadequate and suggest that our method is more effective at detecting these attacks.

Algorithms ◽  
2021 ◽  
Vol 14 (5) ◽  
pp. 154
Author(s):  
Marcus Walldén ◽  
Masao Okita ◽  
Fumihiko Ino ◽  
Dimitris Drikakis ◽  
Ioannis Kokkinakis

Increasing processing capabilities and input/output constraints of supercomputers have increased the use of co-processing approaches, i.e., visualizing and analyzing data sets of simulations on the fly. We present a method that evaluates the importance of different regions of simulation data and a data-driven approach that uses the proposed method to accelerate in-transit co-processing of large-scale simulations. We use the importance metrics to simultaneously employ multiple compression methods on different data regions to accelerate the in-transit co-processing. Our approach strives to adaptively compress data on the fly and uses load balancing to counteract memory imbalances. We demonstrate the method’s efficiency through a fluid mechanics application, a Richtmyer–Meshkov instability simulation, showing how to accelerate the in-transit co-processing of simulations. The results show that the proposed method expeditiously can identify regions of interest, even when using multiple metrics. Our approach achieved a speedup of 1.29× in a lossless scenario. The data decompression time was sped up by 2× compared to using a single compression method uniformly.


2021 ◽  
Vol 10 (1) ◽  
pp. e001087
Author(s):  
Tarek F Radwan ◽  
Yvette Agyako ◽  
Alireza Ettefaghian ◽  
Tahira Kamran ◽  
Omar Din ◽  
...  

A quality improvement (QI) scheme was launched in 2017, covering a large group of 25 general practices working with a deprived registered population. The aim was to improve the measurable quality of care in a population where type 2 diabetes (T2D) care had previously proved challenging. A complex set of QI interventions were co-designed by a team of primary care clinicians and educationalists and managers. These interventions included organisation-wide goal setting, using a data-driven approach, ensuring staff engagement, implementing an educational programme for pharmacists, facilitating web-based QI learning at-scale and using methods which ensured sustainability. This programme was used to optimise the management of T2D through improving the eight care processes and three treatment targets which form part of the annual national diabetes audit for patients with T2D. With the implemented improvement interventions, there was significant improvement in all care processes and all treatment targets for patients with diabetes. Achievement of all the eight care processes improved by 46.0% (p<0.001) while achievement of all three treatment targets improved by 13.5% (p<0.001). The QI programme provides an example of a data-driven large-scale multicomponent intervention delivered in primary care in ethnically diverse and socially deprived areas.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


PLoS Genetics ◽  
2021 ◽  
Vol 17 (1) ◽  
pp. e1009315
Author(s):  
Ardalan Naseri ◽  
Junjie Shi ◽  
Xihong Lin ◽  
Shaojie Zhang ◽  
Degui Zhi

Inference of relationships from whole-genome genetic data of a cohort is a crucial prerequisite for genome-wide association studies. Typically, relationships are inferred by computing the kinship coefficients (ϕ) and the genome-wide probability of zero IBD sharing (π0) among all pairs of individuals. Current leading methods are based on pairwise comparisons, which may not scale up to very large cohorts (e.g., sample size >1 million). Here, we propose an efficient relationship inference method, RAFFI. RAFFI leverages the efficient RaPID method to call IBD segments first, then estimate the ϕ and π0 from detected IBD segments. This inference is achieved by a data-driven approach that adjusts the estimation based on phasing quality and genotyping quality. Using simulations, we showed that RAFFI is robust against phasing/genotyping errors, admix events, and varying marker densities, and achieves higher accuracy compared to KING, the current leading method, especially for more distant relatives. When applied to the phased UK Biobank data with ~500K individuals, RAFFI is approximately 18 times faster than KING. We expect RAFFI will offer fast and accurate relatedness inference for even larger cohorts.


2020 ◽  
Vol 30 (9) ◽  
pp. 4899-4913
Author(s):  
Amanda L Rodrigue ◽  
Aaron F Alexander-Bloch ◽  
Emma E M Knowles ◽  
Samuel R Mathias ◽  
Josephine Mollon ◽  
...  

Abstract Identifying genetic factors underlying neuroanatomical variation has been difficult. Traditional methods have used brain regions from predetermined parcellation schemes as phenotypes for genetic analyses, although these parcellations often do not reflect brain function and/or do not account for covariance between regions. We proposed that network-based phenotypes derived via source-based morphometry (SBM) may provide additional insight into the genetic architecture of neuroanatomy given its data-driven approach and consideration of covariance between voxels. We found that anatomical SBM networks constructed on ~ 20 000 individuals from the UK Biobank were heritable and shared functionally meaningful genetic overlap with each other. We additionally identified 27 unique genetic loci that contributed to one or more SBM networks. Both GWA and genetic correlation results indicated complex patterns of pleiotropy and polygenicity similar to other complex traits. Lastly, we found genetic overlap between a network related to the default mode and schizophrenia, a disorder commonly associated with neuroanatomic alterations.


2018 ◽  
Vol 4 (4) ◽  
pp. 487-501 ◽  
Author(s):  
Kun Kuang ◽  
Meng Jiang ◽  
Peng Cui ◽  
Hengliang Luo ◽  
Shiqiang Yang

2018 ◽  
Vol 115 (37) ◽  
pp. 9300-9305 ◽  
Author(s):  
Shuo Wang ◽  
Erik D. Herzog ◽  
István Z. Kiss ◽  
William J. Schwartz ◽  
Guy Bloch ◽  
...  

Extracting complex interactions (i.e., dynamic topologies) has been an essential, but difficult, step toward understanding large, complex, and diverse systems including biological, financial, and electrical networks. However, reliable and efficient methods for the recovery or estimation of network topology remain a challenge due to the tremendous scale of emerging systems (e.g., brain and social networks) and the inherent nonlinearity within and between individual units. We develop a unified, data-driven approach to efficiently infer connections of networks (ICON). We apply ICON to determine topology of networks of oscillators with different periodicities, degree nodes, coupling functions, and time scales, arising in silico, and in electrochemistry, neuronal networks, and groups of mice. This method enables the formulation of these large-scale, nonlinear estimation problems as a linear inverse problem that can be solved using parallel computing. Working with data from networks, ICON is robust and versatile enough to reliably reveal full and partial resonance among fast chemical oscillators, coherent circadian rhythms among hundreds of cells, and functional connectivity mediating social synchronization of circadian rhythmicity among mice over weeks.


2018 ◽  
Author(s):  
Theresita Joseph ◽  
Stephen D. Auger ◽  
Luisa Peress ◽  
Daniel Rack ◽  
Jack Cuzick ◽  
...  

ABSTRACTBackgroundHyposmia features in several neurodegenerative conditions, including Parkinson’s disease (PD). The University of Pennsylvania Smell Identification Test (UPSIT) is a widely used screening tool for detecting hyposmia, but is time-consuming and expensive when used on a large scale.MethodsWe assessed shorter subsets of UPSIT items for their ability to detect hyposmia in 891 healthy participants from the PREDICT-PD study. Established shorter tests included Versions A and B of both the 4-item Pocket Smell Test (PST) and 12-item Brief Smell Identification Test (BSIT). Using a data-driven approach, we evaluated screening performances of 23,231,378 combinations of 1-7 smell items from the full UPSIT.ResultsPST Versions A and B achieved sensitivity/specificity of 76.8%/64.9% and 86.6%/45.9% respectively, whilst BSIT Versions A and B achieved 83.1%/79.5% and 96.5%/51.8% for detecting hyposmia defined by the longer UPSIT. From the data-driven analysis, two optimised sets of 7 smells surpassed the screening performance of the 12 item BSITs (with validation sensitivity/specificities of 88.2%/85.4% and 100%/53.5%). A set of 4 smells (Menthol, Clove, Gingerbread and Orange) had higher sensitivity for hyposmia than PST-A, -B and even BSIT-A (with validation sensitivity 91.2%). The same 4 smells also featured amongst those most commonly misidentified by 44 individuals with PD compared to 891 PREDICT-PD controls and a screening test using these 4 smells would have identified all hyposmic patients with PD.ConclusionUsing abbreviated smell tests could provide a cost-effective means of screening for hyposmia in large cohorts, allowing more targeted administration of the UPSIT or similar smell tests.


Sign in / Sign up

Export Citation Format

Share Document