Active Countermeasures for Email Fraud
- URL: http://arxiv.org/abs/2210.15043v2
- Date: Thu, 1 Jun 2023 19:39:30 GMT
- Title: Active Countermeasures for Email Fraud
- Authors: Wentao Chen, Fuzhou Wang, Matthew Edwards
- Abstract summary: Scam-baiters play the roles of victims, reply to scammers, and try to waste their time and attention with long and unproductive conversations.
We developed and deployed an expandable scam-baiting mailserver that can conduct scam-baiting activities automatically.
- Score: 2.6856688022781556
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As a major component of online crime, email-based fraud is a threat that
causes substantial economic losses every year. To counteract these scammers,
volunteers called scam-baiters play the roles of victims, reply to scammers,
and try to waste their time and attention with long and unproductive
conversations. To curb email fraud and magnify the effectiveness of
scam-baiting, we developed and deployed an expandable scam-baiting mailserver
that can conduct scam-baiting activities automatically. We implemented three
reply strategies using three different models and conducted a one-month-long
experiment during which we elicited 150 messages from 130 different scammers.
We compare the performance of each strategy at attracting and holding the
attention of scammers, finding tradeoffs between human-written and
automatically-generated response strategies. We also demonstrate that scammers
can be engaged concurrently by multiple servers deploying these strategies in a
second experiment, which used two server instances to contact 92 different
scammers over 12 days. We release both our platform and a dataset containing
conversations between our automatic scam-baiters and real human scammers, to
support future work in preventing online fraud.
Related papers
- ScamChatBot: An End-to-End Analysis of Fake Account Recovery on Social Media via Chatbots [18.10200822118935]
This study focuses on scammers engaging in fake technical support to target users who are having problems recovering their accounts.
The main contribution of our work is the development of an automated system that interacts with scammers.
Our results show that scammers employ many social media profiles asking users to contact them via a few communication channels.
This automated approach highlights how scammers use a variety of strategies, including role-playing, to trick victims into disclosing personal or financial information.
arXiv Detail & Related papers (2024-12-19T17:22:35Z) - (Blind) Users Really Do Heed Aural Telephone Scam Warnings [42.93674984678535]
We explore how two groups of individuals, legally blind (n=36) and sighted ones (n=36) react to aural telephone scam warnings in naturalistic settings.
We developed an aural variant of telephone scam warnings and tested them in three conditions: baseline (no warning), short warning, and contextual warning that preceded the scam's content.
Both the legally blind and the sighted participants found the contextual warnings as powerful usable security cues.
arXiv Detail & Related papers (2024-12-05T09:47:38Z) - BaThe: Defense against the Jailbreak Attack in Multimodal Large Language Models by Treating Harmful Instruction as Backdoor Trigger [67.75420257197186]
In this work, we propose $textbfBaThe, a simple yet effective jailbreak defense mechanism.
Jailbreak backdoor attack uses harmful instructions combined with manually crafted strings as triggers to make the backdoored model generate prohibited responses.
We assume that harmful instructions can function as triggers, and if we alternatively set rejection responses as the triggered response, the backdoored model then can defend against jailbreak attacks.
arXiv Detail & Related papers (2024-08-17T04:43:26Z) - Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams [19.802676243375615]
There is an increase in an emerging fraud trend called cryptocurrency-based technical support scam.
We present an analysis apparatus called HoneyTweet to analyze this kind of scam.
arXiv Detail & Related papers (2024-01-18T09:31:45Z) - Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild [4.129433926074777]
This paper presents the first comprehensive analysis of an emerging cryptocurrency scam named "arbitrage bot" disseminated on online social networks.
The scam revolves around Decentralized Exchanges (DEX) arbitrage and aims to lure victims into executing a so-called "bot contract" to steal funds from them.
To collect the scam at a large scale, we developed a fully automated scam detection system named CryptoScamHunter.
arXiv Detail & Related papers (2023-10-18T20:13:17Z) - Automatic Scam-Baiting Using ChatGPT [0.46040036610482665]
We report on the results of a month-long experiment comparing the effectiveness of two ChatGPT-based automatic scam-baiters to a control measure.
With engagement from over 250 real email fraudsters, we find that ChatGPT-based scam-baiters show a marked increase in scammer response rate and conversation length.
We discuss the implications of these results and practical considerations for wider deployment of automatic scam-baiting.
arXiv Detail & Related papers (2023-09-04T13:13:35Z) - A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools
Stock Prediction [100.9772316028191]
In this paper, we experiment with a variety of adversarial attack configurations to fool three stock prediction victim models.
Our results show that the proposed attack method can achieve consistent success rates and cause significant monetary loss in trading simulation.
arXiv Detail & Related papers (2022-05-01T05:12:22Z) - Uncovering the Dark Side of Telegram: Fakes, Clones, Scams, and
Conspiracy Movements [67.39353554498636]
We perform a large-scale analysis of Telegram by collecting 35,382 different channels and over 130,000,000 messages.
We find some of the infamous activities also present on privacy-preserving services of the Dark Web, such as carding.
We propose a machine learning model that is able to identify fake channels with an accuracy of 86%.
arXiv Detail & Related papers (2021-11-26T14:53:31Z) - Recent trends in Social Engineering Scams and Case study of Gift Card
Scam [4.345672405192058]
Social engineering scams (SES) has been existed since the adoption of the telecommunications by humankind.
Recent trends of various social engineering scams targeting the innocent people all over the world.
Case study of real-time gift card scam targeting various enterprise organization customers.
arXiv Detail & Related papers (2021-10-13T04:17:02Z) - Phishing and Spear Phishing: examples in Cyber Espionage and techniques
to protect against them [91.3755431537592]
Phishing attacks have become the most used technique in the online scams, initiating more than 91% of cyberattacks, from 2012 onwards.
This study reviews how Phishing and Spear Phishing attacks are carried out by the phishers, through 5 steps which magnify the outcome.
arXiv Detail & Related papers (2020-05-31T18:10:09Z) - Learning with Weak Supervision for Email Intent Detection [56.71599262462638]
We propose to leverage user actions as a source of weak supervision to detect intents in emails.
We develop an end-to-end robust deep neural network model for email intent identification.
arXiv Detail & Related papers (2020-05-26T23:41:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.