Recent trends in Social Engineering Scams and Case study of Gift Card
Scam
- URL: http://arxiv.org/abs/2110.06487v1
- Date: Wed, 13 Oct 2021 04:17:02 GMT
- Title: Recent trends in Social Engineering Scams and Case study of Gift Card
Scam
- Authors: Rajasekhar Chaganti, Bharat Bhushan, Anand Nayyar, Azrour Mourade
- Abstract summary: Social engineering scams (SES) has been existed since the adoption of the telecommunications by humankind.
Recent trends of various social engineering scams targeting the innocent people all over the world.
Case study of real-time gift card scam targeting various enterprise organization customers.
- Score: 4.345672405192058
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Social engineering scams (SES) has been existed since the adoption of the
telecommunications by humankind. An earlier version of the scams include
leveraging premium phone service to charge the consumers and service providers
but not limited to. There are variety of techniques being considered to scam
the people due to the advancements in digital data access capabilities and
Internet technology. A lot of research has been done to identify the scammer
methodologies and characteristics of the scams. However, the scammers finding
new ways to lure the consumers and stealing their financial assets. An example
would be a recent circumstance of Covid-19 unemployment, which was used as a
weapon to scam the US citizens. These scams will not be stopping here, and will
keep appearing with new social engineering strategies in the near future. So,
to better prepare these kind of scams in ever-changing world, we describe the
recent trends of various social engineering scams targeting the innocent people
all over the world, who oversight the consequences of scams,and also give
detailed description of recent social engineering scams including Covid scams.
The social engineering scan threat model architecture is also proposed to map
various scams. In addition, we discuss the case study of real-time gift card
scam targeting various enterprise organization customers to steal their money
and put the organization reputation in stake. We also provide recommendations
to internet users for not falling a victim of social engineering scams. In the
end, we provide insights on how to prepare/respond to the social engineering
scams by following the security incident detection and response life cycle in
enterprises
Related papers
- (Blind) Users Really Do Heed Aural Telephone Scam Warnings [42.93674984678535]
We explore how two groups of individuals, legally blind (n=36) and sighted ones (n=36) react to aural telephone scam warnings in naturalistic settings.
We developed an aural variant of telephone scam warnings and tested them in three conditions: baseline (no warning), short warning, and contextual warning that preceded the scam's content.
Both the legally blind and the sighted participants found the contextual warnings as powerful usable security cues.
arXiv Detail & Related papers (2024-12-05T09:47:38Z) - Dynamic Fraud Detection: Integrating Reinforcement Learning into Graph Neural Networks [39.54354926067617]
Graph neural networks are a type of deep learning model that can utilize the interactive relationships within graph structures.
fraudulent activities only account for a very small part of transaction transfers.
fraudsters often disguise their behavior, which can have a negative impact on the final prediction results.
arXiv Detail & Related papers (2024-09-15T23:08:31Z) - Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates [8.24724427283375]
We study how cryptocurrency giveaway scams operate at scale.
We find that 1 in 1000 scam tweets, and 4 in 100,000 livestream views, net a victim.
Scammers managed to extract nearly $4.62 million from just hundreds of victims.
arXiv Detail & Related papers (2024-05-16T01:50:50Z) - Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams [19.802676243375615]
There is an increase in an emerging fraud trend called cryptocurrency-based technical support scam.
We present an analysis apparatus called HoneyTweet to analyze this kind of scam.
arXiv Detail & Related papers (2024-01-18T09:31:45Z) - The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web [39.96427593096699]
We identify 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue.
Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions.
arXiv Detail & Related papers (2024-01-09T16:35:25Z) - Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild [4.129433926074777]
This paper presents the first comprehensive analysis of an emerging cryptocurrency scam named "arbitrage bot" disseminated on online social networks.
The scam revolves around Decentralized Exchanges (DEX) arbitrage and aims to lure victims into executing a so-called "bot contract" to steal funds from them.
To collect the scam at a large scale, we developed a fully automated scam detection system named CryptoScamHunter.
arXiv Detail & Related papers (2023-10-18T20:13:17Z) - Tainted Love: A Systematic Review of Online Romance Fraud [68.8204255655161]
Romance fraud involves cybercriminals engineering a romantic relationship on online dating platforms.
We characterise the literary landscape on romance fraud, advancing the understanding of researchers and practitioners.
Three main contributions were identified: profiles of romance scams, countermeasures for mitigating romance scams, and factors that predispose an individual to become a scammer or a victim.
arXiv Detail & Related papers (2023-02-28T20:34:07Z) - Active Countermeasures for Email Fraud [2.6856688022781556]
Scam-baiters play the roles of victims, reply to scammers, and try to waste their time and attention with long and unproductive conversations.
We developed and deployed an expandable scam-baiting mailserver that can conduct scam-baiting activities automatically.
arXiv Detail & Related papers (2022-10-26T21:20:13Z) - Uncovering the Dark Side of Telegram: Fakes, Clones, Scams, and
Conspiracy Movements [67.39353554498636]
We perform a large-scale analysis of Telegram by collecting 35,382 different channels and over 130,000,000 messages.
We find some of the infamous activities also present on privacy-preserving services of the Dark Web, such as carding.
We propose a machine learning model that is able to identify fake channels with an accuracy of 86%.
arXiv Detail & Related papers (2021-11-26T14:53:31Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.