Reverse Social Engineering to Counter Social Engineering in Mobile Money Theft: A Tanzanian Context
Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a "lure" to tempt a victim directly, via mobile phones; mostly to gain money by...
Saved in:
Published in: | Journal of applied security research Vol. 18; no. 3; pp. 546 - 558 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Routledge
03-07-2023
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a "lure" to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative undertaking, which in reality is phony. Once the victim has paid the money, the attackers become inaccessible. Reverse social engineering entails deception of the predator by the pray in order to capture or discourage the predator. Through a case study, this paper investigates and presents an incident where a victim of mobile social engineering attempts to reverse the process in order to arraign the attackers. |
---|---|
ISSN: | 1936-1610 1936-1629 |
DOI: | 10.1080/19361610.2022.2031702 |