Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon

  • Conference paper
  • First Online:

Abstract

Mobile Money (MM) technologies are popular in developing countries where people are unbanked, and they are exploited as means of financial transactions in the economy. Sophisticated cyber-phishing techniques successfully target MM accounts. Related countermeasures are rare and the existing ones are so technical that people without minimal knowledge cannot be helped. Making the knowledge around cybercrime facts is therefore relevant since it provides a good basis for further technical research. In this vein, this paper dissects phishing cybercrime strategies observed within the Cameroonian cyberspace. We provide identified vulnerabilities, process design of generic MM attack, taxonomies of attacks, and classification of the latter based on criteria. Findings about commonalities and dissimilarities reveal two aspects to really consider when designing solutions: emotion and interactions.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

References

  1. Aker, J.: Using mobile money to help the poor in developing countries. The Fletcher School, Tufts University.https://econofact.org/using-mobile-money-to-help-the-poor-in-developing-countries. Accessed 01 Aug 2022

  2. Banque mondiale, Rapport de la Banque mondiale : les transactions électroniques sont d’une importance vitale pour la croissance économique.https://www.banquemond-iale.org/fr/news/press-release/2014/08/28/world-bank-report-digital-payments-economic-growth. Accessed 01 Aug 2022

  3. Agenceecofin, l’Afrique Subsaharienne et le mobile money.https://www.agenceeco-fin.com/monetique/0804-75539-l-afrique-subsaharienne-a-genere-64-15-des-transactions-mondiales-par-mobile-money-en-2019. Accessed 01 Aug 2022

  4. Finmark. FinScope Consumer Survey Highlights Cameroon 2017. Finmark Trust: Johannesburg, South Africa (2017).https://finmark.org.za/system/docu-ments/files/000/000/220/original/Cameroon-pocket-guide_English.pdf?1601984244. Accessed 01 Aug 2022

  5. Andzongo, S.: Cameroon: MobileMoney Transactions Surged to FCFA3500bn in 2017. Investiraucameroun.com.https://www.businessincameroon.com/finance/3108-8300-came-roon-mobile-money-transactions-surged-to-cfa3-500bn-in-2017. Accessed 01 Aug 2022

  6. Tengeh, R.K., Gahapa Talom, F.S.: Mobile money as a sustainable alternative for SMEs in less developed financial markets. J. Open Innov. Technol. Mark. Complex6, 163 (2020).https://doi.org/10.3390/joitmc6040163

    Article  Google Scholar 

  7. Amponsah, E.O.: The advantages and disadvantages of mobile money on the profitability of the ghanaian banking industry. Texila Int. J. Manag.4, 1–8 (2018)

    Google Scholar 

  8. Must, B., Ludewig, K.: Mobile money: cell phone banking in developing countries. Policy Matters J.7, 27–33 (2010)

    Google Scholar 

  9. Jai, A.K., Gupta, B.B.: A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterp. Inf. Syst.16(4), 527–565 (2022)

    Google Scholar 

  10. Wang, Z., Zhu, H., Sun, L.: Social engineering in cybersecurity: effect mechanisms, Human vulnerabilities and attack methods. IEEE Access9, 11895–11910 (2021)

    Google Scholar 

  11. Bangda, B.: La cybercriminalité fait perdre 12,2 milliards au Cameroun en 2021. EcoMatin.https://ecomatin.net/la-cybercriminalite-fait-perdre-122-milliards-s-au-cameroun-en-2021/. Accessed 01 Aug 2022

  12. Gandotra, E., Gupta, D.: An efficient approach for phishing detection using machine learning. In: Giri, K.J., Parah, S.A., Bashir, R., Muhammad, K. (eds) Multimedia Security. Algorithms for Intelligent Systems. Springer, Singapore.https://doi.org/10.1007/978-981-15-8711-5_12

  13. Do, N.Q., Selamat, A., Krejcar, O., Herrera-Viedma, E. and Fujita, H.: Deep learning for phishing detection: taxonomy, current challenges and future directions. IEEE Access 36429–36463 (2022)

    Google Scholar 

  14. Catal, C., Giray, G., Tekinerdogan, B., Kumar, S., Shukla, S.: Applications of deep learning for phishing detection: a systematic literature review. Knowl. Inf. Syst.64, 1457–1500 (2022)

    Article  Google Scholar 

  15. Quang, D.N., Selamat, A., Krejcar, O.: Recent research on phishing detection through machine learning algorithm. In: Fujita, H., Selamat, A., Lin, J.-W., Ali, M. (eds.) IEA/AIE 2021. LNCS (LNAI), vol. 12798, pp. 495–508. Springer, Cham (2021).https://doi.org/10.1007/978-3-030-79457-6_42

    Chapter  Google Scholar 

  16. Yu, T., Chen, X., Xu, Z., Xu, J.: MP-GCN: a phishing nodes detection approach via graph convolution network for ethereum. Appl. Sci.12, 7294 (2022)

    Article  Google Scholar 

  17. Chen, W., Guo, X., Chen, Z., Zheng, Z., Lu, Y.: Phishing scam detection on ethereum: towards financial security for blockchain ecosystem. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence Special Track on AI in FinTech, pp. 4506–4512 (2020)

    Google Scholar 

  18. Panga, R.C.T., Marwa, J., Ndibwile, J.D.: A game or notes? The use of a customized mobile game to improve teenagers’ phishing knowledge. Case Tanzania. J. Cybersecur. Priv.2, 466–489 (2022)

    Article  Google Scholar 

  19. Kävrestad, J., Hagberg, A., Nohlberg, M., Rambusch, J., Roos, R., Furnell, S.: Evaluation of contextual and game-based training for phishing detection. Future Internet14, 104 (2022)

    Article  Google Scholar 

  20. Ondrus, J., Pigneur Y.: An Assessment of NFC for future mobile payment systems. In: Proceeding of the International Conference on the Management of Mobile Business (2007)

    Google Scholar 

  21. Mbiti, I.M., Weil, D.N.: Mobile banking: the impact of M-Pesa in Kenya. NBER Working Paper No. w17129 (2011)

    Google Scholar 

  22. Téllez, J., Zeadally, S.: Mobile payment systems secure network architectures and protocols. Computer Communications and Networks, Springer (2017)

    Google Scholar 

  23. Bahri-Domon, Y.: Mobile money ready for take-off in cameroon, Mediamania.https://www.businessincameroon.com/pdf/BC28.pdf. Accessed 01 Aug 2022.

  24. Mbodiam, B.R.: In Cameroon, MTN and orange wage a fierce commercial war on the mobile money market.https://www.businessincameroon.com/telecom/0202-6860-in-came-roon-mtn-and-orange-wage-a-fierce-commercial-war-on-the-mobile-money-market. Accessed 01 Aug 2022

  25. BRM: Cameroon: a decree to limit numbers of SIM per subscriber and prohibit sale of SIM cards on streets.https://www.businessincameroon.com/telecom/0110-5670-cameroon-a-de-cree-to-limit-numbers-of-sim-per-subscriber-and-prohibit-sale-of-sim-cards-on-streets. Accessed 01 Aug 2022

  26. Orange, Transfert d'argent.https://www.orange.cm/fr/om-gestion-de-compte/transfert-d-argent.html. Accessed 01 Aug 2022

  27. BRM: Mobile telephone subscribers’ identification: telecom regulator ART admonishes cameroonian operators.https://www.businessincameroon.com/public-management/1204-11454-mobile-telephone-subscribers-identification-telecom-regulator-art-admonishes-cameroonian-operators. Accessed 01 Aug 2022

  28. Atabong, A.B., Cameroon: SIM card shutdown piles on pressure for telcos.https://itweb.africa/content/lLn14Mmj9RKqJ6Aa. Accessed 01 Aug 2022

  29. Johnson-laird, P.N., Oatley, K.: Basic emotions, rationality, and folk theory. Cogn. Emot.6(3–4), 201–223 (1992)

    Google Scholar 

  30. Bosamia, M.P.: MobileWallet payments recent potential threats and vulnerabilities with its possible security measures. In: Proceedings of the 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp-2017), Changa, India, 1–2 pp. 1–7 (2017)

    Google Scholar 

  31. Mtaho, A.B: Improving mobile money security with two-factor authentication. Int. J. Comput. Appl.109, 9–15 (2015)

    Google Scholar 

  32. Bosamia, M.P.: MobileWallet payments recent potential threats and vulnerabilities with its possible security measures. In Proceedings of the 2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp-2017), Changa, India, vol. 1–2; pp. 1–7 (2017)

    Google Scholar 

  33. Saxena, S., Vyas, S., Kumar, B.S., Gupta, S.: Survey on online electronic payments security. In: Proceedings of the 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, pp. 746–751 (2019)

    Google Scholar 

  34. Maseno, E.M., Ogao, P., Matende, S.: Vishing attacks on mobile platform in Nairobi county kEnya. Int. J. Adv. Res. Comput. Sci. Technol.5, 73–77 (2017)

    Google Scholar 

  35. Akomea-Frimpong, I., Andoh, C., Akomea-Frimpong, A., Dwomoh-Okudzeto, Y. Control of fraud on mobile money services in Ghana: an exploratory study. J. Money Laund. Control22, 300–317 (2018)

    Google Scholar 

  36. Gilman, L., Joyce, M.: Managing the risk of fraud in mobile money (2012).http://www.gsma.com/mmu. Accessed 01 Aug 2022

  37. Lonie, S., Fraud risk management for mobile money: an overview (2017).https://www.chyp.com/wp-content/uploads/2018/06/Fraud-Risk-Management-for-MM-31.07.2017.pdf. Accessed 01 Aug 2022

  38. Buku, M., Mazer, R.: Fraud in mobile financial services: protecting consumers, providers, and the system.https://www.cgap.org/publications/fraud-mobile-%EF%AC%81nancial-services. Accessed 01 Aug 2022

  39. ITU, Security testing for USSD and STK based digital financial services applications.https://figi.itu.int/wp-content/uploads/2021/04/Security-testing-for-USSD-and-STK-based-Digital-Financial-Services-applications-1.pdf. Accessed 01 Aug 2022

Download references

Author information

Authors and Affiliations

  1. Department of Mathematics and Computer Science, Faculty of Science, University of Ngaoundere, Ngaoundere, Cameroon

    Alima Nzeket Njoya & Franklin Tchakounté

  2. Cybersecurity With Computational and Artificial Intelligence Group (CyComAI), Ngaoundere, Cameroon

    Alima Nzeket Njoya & Franklin Tchakounté

  3. Department of Mathematics, Rhodes University, Grahamstown, 6140, South Africa

    Franklin Tchakounté & Marcellin Atemkeng

  4. Department of Information and Computing Sciences, Scientific Research Development Institute of Technology, Loganlea, Australia

    Kalum Priyanath Udagepola

  5. Laboratory of Mathematics and Computer Science, University of Joseph Ki-Zerbo, Ouagadougou, Burkina Faso

    Didier Bassolé

Authors
  1. Alima Nzeket Njoya

    You can also search for this author inPubMed Google Scholar

  2. Franklin Tchakounté

    You can also search for this author inPubMed Google Scholar

  3. Marcellin Atemkeng

    You can also search for this author inPubMed Google Scholar

  4. Kalum Priyanath Udagepola

    You can also search for this author inPubMed Google Scholar

  5. Didier Bassolé

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toFranklin Tchakounté.

Editor information

Editors and Affiliations

  1. Taif University, Ta'if, Saudi Arabia

    Rashid A. Saeed

  2. State University of Zanzibar, Zanzibar, Tanzania

    Abubakar D. Bakari

  3. State University of Zanzibar, Zanzibar, Tanzania

    Yahya Hamad Sheikh

Rights and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nzeket Njoya, A., Tchakounté, F., Atemkeng, M., Udagepola, K.P., Bassolé, D. (2023). Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon. In: Saeed, R.A., Bakari, A.D., Sheikh, Y.H. (eds) Towards new e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 499. Springer, Cham. https://doi.org/10.1007/978-3-031-34896-9_26

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp