DocumentCode :
2194990
Title :
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
Author :
Maggi, Federico
Author_Institution :
Dipt. di Elettron. e Inf., Politec. di Milano, Milan, Italy
fYear :
2010
fDate :
June 29 2010-July 1 2010
Firstpage :
824
Lastpage :
831
Abstract :
Phishing is the practice of eliciting a person´s confidential information such as name, date of birth or credit card details. Typically, the phishers use simple technologies (e.g., e-mailing) to spread social engineering attacks with the goal of persuading a large amount of victims into voluntarily disclose sensitive data. Phishing based on e-mail and web technologies is certainly the most popular form. It has indeed received ample attention and some mitigation measures have been implemented. In this paper we describe our study on vishing (voice phishing), a form of phishing where the scammers exploit the phone channel to ask for sensitive information, rather than sending e-mails and cloning trustworthy websites. In some sense, the traditional a-lá-Mitnick phone scams are streamlined by attackers using techniques that are typical of modern, e-mail-based phishing. We detail our analysis of an embryonic, real-world database of vishing attacks reported by victims through a publicly-available web application that we build for this purpose. The vishing activity that we registered in our preliminary analysis is targeted against the U.S. customers. According to our samples, we analyzed to what extent the criminals rely on automated responders to streamline the vishing campaigns. In addition, we analyzed the content of the conversations and found that words such as ``credit´´, ``press´´ (a key) or ``account´´ are fairly popular. In addition, we describe the data collection infrastructure and motivate why gathering data about vishing is more difficult than for regular e-mail phishing.
Keywords :
Internet; computer crime; unsolicited e-mail; Web technology; e-mail; e-mail based phishing; phishing; social engineering attack; trustworthy Websites cloning; vishing; voice phishing; Computers; Credit cards; Electronic mail; Humans; Security; Software; Telephony; measurements; phishing; phone phishing; social engineering;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on
Conference_Location :
Bradford
Print_ISBN :
978-1-4244-7547-6
Type :
conf
DOI :
10.1109/CIT.2010.156
Filename :
5578085
Link To Document :
بازگشت