metv借口网络钓鱼攻击:社会工程案例研究

Girinoto, Dimas Febriyan Priambodo, Tiyas Yulita, R. K. A. M. Zulkham, A. Rifqi, A. S. Putri
{"title":"metv借口网络钓鱼攻击:社会工程案例研究","authors":"Girinoto, Dimas Febriyan Priambodo, Tiyas Yulita, R. K. A. M. Zulkham, A. Rifqi, A. S. Putri","doi":"10.1109/IWBIS56557.2022.9924801","DOIUrl":null,"url":null,"abstract":"One of the most common types of social engineering attacks is phishing. This technique uses psychological manipulation of the target to unknowingly hand over the information the attacker wants. Our research tries to find out how a phishing attack can be executed by first pretexting the OmeTV video chat application. The target of our attack is OmeTV players from Indonesia who are over 18 years old. The proposed attack methodology is Social Engineering Session (SES). This study also aims to provide an overview of what kind of information can be extracted from the target during an attack. The results show that the pretexting phishing attack on the OmeTV video chat application was successfully carried out to obtain some of the target’s personal information including: full name, date of birth or age, address, educational status, hobbies, Instagram account, and phone number.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"OmeTV Pretexting Phishing Attacks: A Case Study of Social Engineering\",\"authors\":\"Girinoto, Dimas Febriyan Priambodo, Tiyas Yulita, R. K. A. M. Zulkham, A. Rifqi, A. S. Putri\",\"doi\":\"10.1109/IWBIS56557.2022.9924801\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most common types of social engineering attacks is phishing. This technique uses psychological manipulation of the target to unknowingly hand over the information the attacker wants. Our research tries to find out how a phishing attack can be executed by first pretexting the OmeTV video chat application. The target of our attack is OmeTV players from Indonesia who are over 18 years old. The proposed attack methodology is Social Engineering Session (SES). This study also aims to provide an overview of what kind of information can be extracted from the target during an attack. The results show that the pretexting phishing attack on the OmeTV video chat application was successfully carried out to obtain some of the target’s personal information including: full name, date of birth or age, address, educational status, hobbies, Instagram account, and phone number.\",\"PeriodicalId\":348371,\"journal\":{\"name\":\"2022 7th International Workshop on Big Data and Information Security (IWBIS)\",\"volume\":\"120 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 7th International Workshop on Big Data and Information Security (IWBIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWBIS56557.2022.9924801\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWBIS56557.2022.9924801","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

最常见的社会工程攻击类型之一是网络钓鱼。这种技术利用目标的心理操纵,在不知情的情况下交出攻击者想要的信息。我们的研究试图找出网络钓鱼攻击是如何通过首先冒充metv视频聊天应用程序来执行的。我们的攻击目标是来自印尼的18岁以上的metv玩家。提出的攻击方法是社会工程会话(SES)。本研究还旨在概述在攻击期间可以从目标中提取什么样的信息。结果表明,对OmeTV视频聊天应用进行的假借网络钓鱼攻击成功,获取了目标的一些个人信息,包括:全名、出生日期或年龄、地址、教育状况、爱好、Instagram账号、电话号码等。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
OmeTV Pretexting Phishing Attacks: A Case Study of Social Engineering
One of the most common types of social engineering attacks is phishing. This technique uses psychological manipulation of the target to unknowingly hand over the information the attacker wants. Our research tries to find out how a phishing attack can be executed by first pretexting the OmeTV video chat application. The target of our attack is OmeTV players from Indonesia who are over 18 years old. The proposed attack methodology is Social Engineering Session (SES). This study also aims to provide an overview of what kind of information can be extracted from the target during an attack. The results show that the pretexting phishing attack on the OmeTV video chat application was successfully carried out to obtain some of the target’s personal information including: full name, date of birth or age, address, educational status, hobbies, Instagram account, and phone number.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信