Reverse Social Engineering to Counter Social Engineering in Mobile Money Theft: A Tanzanian Context

Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a "lure" to tempt a victim directly, via mobile phones; mostly to gain money by...

Full description

Saved in:
Bibliographic Details
Published in:Journal of applied security research Vol. 18; no. 3; pp. 546 - 558
Main Authors: Kilavo, Hassan, J. Mselle, Leonard, I. Rais, Ramadhani, Mrutu, Salehe I.
Format: Journal Article
Language:English
Published: Routledge 03-07-2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a "lure" to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative undertaking, which in reality is phony. Once the victim has paid the money, the attackers become inaccessible. Reverse social engineering entails deception of the predator by the pray in order to capture or discourage the predator. Through a case study, this paper investigates and presents an incident where a victim of mobile social engineering attempts to reverse the process in order to arraign the attackers.
ISSN:1936-1610
1936-1629
DOI:10.1080/19361610.2022.2031702