Investigating IPTV Malware in the Wild
Adam Lockett,
Ioannis Chalkias,
Cagatay Yucel (),
Jane Henriksen-Bulmer and
Vasilis Katos
Additional contact information
Adam Lockett: Department of Computing & Informatics, Faculty of Science & Technology, Bournemouth University, Fern Barrow, Wallisdown, Dorset BH12 5BB, UK
Ioannis Chalkias: Centre for Research and Technology Hellas, Information Technologies Institute, 570 01 Thessaloniki, Greece
Cagatay Yucel: Department of Computing & Informatics, Faculty of Science & Technology, Bournemouth University, Fern Barrow, Wallisdown, Dorset BH12 5BB, UK
Jane Henriksen-Bulmer: Department of Computing & Informatics, Faculty of Science & Technology, Bournemouth University, Fern Barrow, Wallisdown, Dorset BH12 5BB, UK
Vasilis Katos: Department of Computing & Informatics, Faculty of Science & Technology, Bournemouth University, Fern Barrow, Wallisdown, Dorset BH12 5BB, UK
Future Internet, 2023, vol. 15, issue 10, 1-18
Abstract:
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from different sources. These infringing IPTV technologies may include websites, software, software add-ons, and physical set-top boxes. Due to the free or low cost of illegal IPTV technologies, illicit IPTV content providers will often resort to intrusive advertising, scams, and the distribution of malware to increase their revenue. We developed an automated solution for collecting and analysing malware from illegal IPTV technologies and used it to analyse a sample of illicit IPTV websites, application (app) stores, and software. Our results show that our IPTV Technologies Malware Analysis Framework (IITMAF) classified 32 of the 60 sample URLs tested as malicious compared to running the same test using publicly available online antivirus solutions, which only detected 23 of the 60 sample URLs as malicious. Moreover, the IITMAF also detected malicious URLs and files from 31 of the sample’s websites, one of which had reported ransomware behaviour.
Keywords: malware analysis; cyber threat intelligence; IPTV; digital investigations (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/15/10/325/pdf (application/pdf)
https://www.mdpi.com/1999-5903/15/10/325/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:15:y:2023:i:10:p:325-:d:1250204
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().