DOI QR코드

DOI QR Code

Phishing Attacks on Cryptocurrency Traders in Arab States of The Gulf

  • Sawsan Alshehri (Department, of Information Systems, College of Computer science and information systems) ;
  • Reem Alhotaylah (Department, of Information Systems, College of Computer science and information systems) ;
  • Marwa Alyami (Department, of Information Systems, College of Computer science and information systems) ;
  • Abdullah Alghamdi (Department, of Information Systems, College of Computer science and information systems) ;
  • Mesfer Alrizq (Department, of Information Systems, College of Computer science and information systems)
  • Received : 2024.08.05
  • Published : 2024.08.30

Abstract

With the great development of technology in all fields these days, including the financial field, people have gone into cryptocurrency trading, without prior knowledge or experience, which made them prey and coveted by hackers through phishing attacks. Therefore, we will study cases where people can be a victim of phishing because cryptocurrency occurs without an intermediary, such as banks and monetary institutions. It is a form of peer-to-peer transaction, physical wallets, and fake investing. This study aims to know the concept of a phishing attack on cryptocurrencies, and to measure the extent of peoples awareness of the security risks on these currencies. Previous literature will be reviewed, and a questionnaire will be published on traders who use cryptocurrency trading platforms, and then we collect data and analyze the answers provided, so that we can suggest educational solutions to these phishing problems.

Keywords

References

  1. Xia, P., Zhang, B., Ji, R., Gao, B., Wu, L., Luo, X., Wang, H., & Xu, G. (2020). Characterizing Cryptocurrency Exchange Scams. http://arxiv.org/abs/2003.07314 
  2. Xia, P., Wang, H., Luo, X., Wu, L., Zhou, Y., Bai, G., Xu, G., Huang, G., & Liu, X. (2020). Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. http://arxiv.org/abs/2007.13639 
  3. Lal, B., Agarwal, R., & Shukla, S. K. (2021). Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain. http://arxiv.org/abs/2108.11818 
  4. Reddy, E. (2020). Analysing the investigation and prosecution of cryptocurrency crime as provided for by the South African cybercrimes bill. In Statute Law Review (Vol. 41, Issue 2, pp. 226-239). Oxford University Press. https://doi.org/10.1093/slr/hmz001 
  5. Trozze, A., Kamps, J., Akartuna, E. A., Hetzel, F. J., Kleinberg, B., Davies, T., & Johnson, S. D. (2022). Cryptocurrencies and future financial crime. In Crime Science (Vol. 11, Issue 1). BioMed Central Ltd. https://doi.org/10.1186/s40163-021-00163-8 
  6. Astrakhantseva, I., Astrakhantsev, R., & Los, A. (2021). Cryptocurrency fraud schemes analysis. SHS Web of Conferences, 106, 02001. https://doi.org/10.1051/shsconf/202110602001 
  7. Reddy, E., & Minnaar, A. (2018). CRYPTOCURRENCY: A TOOL AND TARGET FOR CYBERCRIME Civil-military relations View project Rural crime View project. https://www.researchgate.net/publication/338572871 
  8. Lapuh Bele, J. (2021). Cryptocurrencies as facilitators of cybercrime. SHS Web of Conferences, 111, 01005. https://doi.org/10.1051/shsconf/202111101005 
  9. Corbet, S., Cumming, D. J., Lucey, B. M., Peat, M., Vigne, S. A., & Chi Minh City, H. (n.d.). The Destabilising Effects of Cryptocurrency Cybercriminality. 
  10. Ivanov, M. A., Kliuchnikova, B. v., Chugunkov, I. v., & Plaksina, A. M. (2021). Phishing Attacks and Protection against Them. Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021, 425-428. https://doi.org/10.1109/ElConRus51938.2021.9396693 
  11. Weber, K., Schutz, A. E., Fertig, T., & Muller, N. H. (2020). Exploiting the human factor: Social engineering attacks on cryptocurrency users. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12206 LNCS, 650-668. https://doi.org/10.1007/978-3-030-50506-6_45 
  12. Sayeed, S., & Marco-Gisbert, H. (n.d.). On the Effectiveness of Blockchain Against Cryptocurrency Attacks. 
  13. Froehlich M, Hulm Ph.,& Alt F. (2021). Under Pressure. A User-Centered Threat Model for Cryptocurrency Owners 
  14. Andryukhin, A. A. (2019). Phishing Attacks and Preventions in Blockchain Based Projects. Proceedings - 20 International Conference on Engineering Technologies and Computer Science: Innovation and Application, EnT 2019, 15-19. https://doi.org/10.1109/EnT.201900008 
  15. Anti-Phishing Working Group, & Institute of Electrical and Electronics Engineers. (n.d.). 2018 APWG Symposium on Electronic Crime Research (eCrime) : proceedings of the 2018 APWG Symposium on Electronic Crime Research (eCrime) : San Diego, California, USA, May 15-17, 2018. 
  16. Wen, H., Fang, J., Wu, J., & Zheng, Z. (2021). Transaction-based hidden strategies against general phishing detection framework on ethereum. Proceedings - IEEE International Symposium on Circuits and Systems, 2021-May. https://doi.org/10.1109/ISCAS51556.2021.9401091 
  17. Badawi, E., & Jourdan, G. V. (2020). Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review. In IEEE Access (Vol. 8, pp. 200021-200037). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2020.3034816 
  18. Gottipati, H. (2020). A PROPOSED CYBERSECURITY MODEL FOR CRYPTOCURRENCY EXCHANGES. 
  19. Varlioglu, S., Elsayed, N., Elsayed, Z., & Ozer, M. (n.d.). The Dangerous Combo: Fileless Malware and Cryptojacking. 
  20. Ahvanooey, M. T., Mazurczyk, W., Taleby Ahvanooey, M., Zhu, M. X., Kilger, M., & Choo, K.-K. R. (n.d.). Do Dark Web and Cryptocurrencies Empower Cybercriminals? Covert Channels and Malware Analysis View project Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Study View project Do Dark Web and Cryptocurrencies Empower Cybercriminals? http://ax555xx.onion 
  21. scheau, M. C., & Zaharie, stefan. (2018). The Way of Cryptocurrency. In Economy Informatics (Vol. 18, Issue 1). 
  22. Poursafaei, F., Hamad, G. B., & Zilic, Z. (2020). Detecting Malicious Ethereum Entities via Application of Machine Learning Classification. 
  23. Phillips, R., & Wilder, H. (2020). Tracing Cryptocurrency Scams: Clustering Replicated Advance-Fee and Phishing Websites. https://help.twitter.com/en/rules-and-policies/financial-scam 
  24. Chen, W., Guo, X., Chen, Z., Zheng, Z., & Lu, Y. (2020). Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. https://bitcoin.org/bitcoin.pdf 
  25. IEEE Circuits and Systems Society, & Institute of Electrical and Electronics Engineers. (n.d.). 2020 IEEE International Symposium on Circuits and Systems (ISCAS) : proceedings : ISCAS 2020 : Virtual Conference, October 10-21, 2020. 
  26. Bartoletti, M., Lande, S., Loddo, A., Pompianu, L., & Serusi, S. (2021). Cryptocurrency scams: Analysis and perspectives. IEEE Access, 9, 148353-148373. https://doi.org/10.1109/ACCESS.2021.3123894 
  27. Chen, L., Peng, J., Liu, Y., Li, J., Xie, F., & Zheng, Z. (2021). Phishing Scams Detection in Ethereum Transaction Network. ACM Transactions on Internet Technology, 21(1). https://doi.org/10.1145/3398071 
  28. Wu, J., Yuan, Q., Lin, D., You, W., Chen, W., Chen, C., & Zheng, Z. (2022). Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52(2), 1156-1166. https://doi.org/10.1109/TSMC.2020.3016821 
  29. Dika, A., & Nowostawski, M. (2018). Security Vulnerabilities in Ethereum Smart Contracts. 2018 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 955-962. https://doi.org/10.1109/Cybermatics_2018.2018.00182 
  30. Chen, W., Xu, Y., Zheng, Z., Zhou, Y., Yang, J. E., & Bian, J. (2019). Detecting "Pump & dump schemes" on cryptocurrency market using an improved apriori algorithm. Proceedings - 13th IEEE International Conference on Service-Oriented System Engineering, SOSE 2019, 10th International Workshop on Joint Cloud Computing, JCC 2019 and 2019 IEEE International Workshop on Cloud Computing in Robotic Systems, CCRS 2019, 293-298. https://doi.org/10.1109/SOSE.2019.00050 
  31. Laadam, J. A., Profile, S., Li, J.-J., Shetewy, N., Aitlaadam, J., Li, *, & Jiang, J. (2019). Challenges of the Bitcoin in the Arabic Countries. https://doi.org/10.7176/JESD 
  32. A. Alghamdi, "A Hybrid Method for Customer Segmentation in Saudi Arabia Restaurants Using Clustering, Neural Networks and Optimization Learning Techniques," Arabian Journal of Science Engineering, Jul. 2022, doi: 10.1007/s13369-022-07091-y. 
  33. A. Alghamdi, "A Hybrid Method for Big Data Analysis Using Fuzzy Clustering, Feature Selection and Adaptive Neuro-Fuzzy Inferences System Techniques: Case of Mecca and Medina Hotels in Saudi Arabia," Arabian Journal of Science Engineering, Jun. 2022, doi: 10.1007/S13369-022-06978-0. 
  34. Alghamdi, A., "Computer Science Graduation Project During Covid-19 Pandemic: Challenges and Solutions." IJCSNS - International Journal of Computer Science and Network Security, 22, 1, 718-724, 2022, doi: 10.22937/IJCSNS.2022.22.1.94 
  35. A. Alghamdi, "Analyzing the Barriers and Possibilities with p-values towards Starting a New Postgraduate Computer and Engineering Programs at Najran University: A Cross-Sectional Study," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 11, no. 12, 59/31 2020, doi: 10.14569/IJACSA.2020.0111215. 
  36. Y. Liu, G. Shan, Y. Liu, A. Alghamdi, I. Alam, and S. Biswas, "Blockchain Bridges Critical National Infrastructures: E-Healthcare Data Migration Perspective," IEEE Access, vol. 10, pp. 28509-28519, 2022, doi: 10.1109/ACCESS.2022.3156591 
  37. Reza, Md. S., Biswas, S., Alghamdi, A., Alrizq, M., Bairagi, A. K., & Masud, M., "ACC: Blockchain Based Trusted Management of Academic Credentials." 2021 IEEE International Symposium on Smart Electronic Systems (ISES) (Formerly INiS), 438-443, 2021, https://doi.org/10.1109/iSES52644.2021.00104