OmeTV Pretexting Phishing Attacks: A Case Study of Social Engineering

One of the most common types of social engineering attacks is phishing. This technique uses psychological manipulation of the target to unknowingly hand over the information the attacker wants. Our research tries to find out how a phishing attack can be executed by first pretexting the OmeTV video c...

Full description

Saved in:
Bibliographic Details
Published in:2022 7th International Workshop on Big Data and Information Security (IWBIS) pp. 119 - 124
Main Authors: Girinoto, Priambodo, Dimas Febriyan, Yulita, Tiyas, Adek Muhammad Zulkham, R. K., Fathurrahman Rifqi, A., Shakira Putri, A.
Format: Conference Proceeding
Language:English
Published: IEEE 01-10-2022
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:One of the most common types of social engineering attacks is phishing. This technique uses psychological manipulation of the target to unknowingly hand over the information the attacker wants. Our research tries to find out how a phishing attack can be executed by first pretexting the OmeTV video chat application. The target of our attack is OmeTV players from Indonesia who are over 18 years old. The proposed attack methodology is Social Engineering Session (SES). This study also aims to provide an overview of what kind of information can be extracted from the target during an attack. The results show that the pretexting phishing attack on the OmeTV video chat application was successfully carried out to obtain some of the target's personal information including: full name, date of birth or age, address, educational status, hobbies, Instagram account, and phone number.
DOI:10.1109/IWBIS56557.2022.9924801