• Title/Summary/Keyword: Voice phishing

Search Result 40, Processing Time 0.029 seconds

A Study on Factors Influencing Telecommunications Fraud : In the Case of Voice Phishing (전기 통신 금융사기에 영향을 미치는 요인에 관한 연구 : 전화 금융사기를 중심으로)

  • Jo, Soohyun;Lee, Wooyoo;Choi, Myeonggil
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.35-49
    • /
    • 2016
  • With the gradual development of IT technology, voice phishing victims are increasing in number. In the past when only voice phone calls were made, personal information or financial information were stolen mainly by a direct phone call, but recently, as smart phones are widely in use, it is evolving into a way such as smishing that leads an access to a site with malicious codes spreading out. Since it is easy to run away after committing a crime, and trace are rarely left in case of voice phishing, it is difficult to find out criminal. In addition, it is most likely that a victim be would be exposed to further damage from another voice phishing. Its technique is growing in kinds and turning more intelligent day by day; Therefore, its victims are increasing in number. Previous researches mainly focused the area of legal studies while the factors exposed to voice phishing have not been made. Therefore, this study has analyzed the motifs in which voice phishing is done to draw out its outcomes as follows. First, a victim comes to trust the criminal by the factors of favorability, rare message, and mutuality. Second, the more sophisticated the technique of a criminal, the more likely a victim is exposed to voice phishing.

Forecasting the Occurrence of Voice Phishing using the ARIMA Model (ARIMA 모형을 이용한 보이스피싱 발생 추이 예측)

  • Jung-Ho Choo;Yong-Hwi Joo;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.79-86
    • /
    • 2022
  • Voice phishing is a cyber crime in which fake financial institutions, the Public Prosecutor's Office, and the National Police Agency are impersonated to find out an individual's Certification number and credit card number or withdraw a deposit. Recently, voice phishing has been carried out in a subtle and secret way. Analyzing the trend of voice phishing that occurred in '18~'21, it was found that there is a seasonality that occurs rapidly at a time when the movement of money is intensifying in the trend of voice phishing, giving ambiguity to time series analysis. In this research, we adjusted seasonality using the X-12 seasonality adjustment methodology for accurate prediction of voice phishing occurrence trends, and predicted the occurrence of voice phishing in 2022 using the ARIMA model.

A Study on Voice Phishing Countermeasures of the Police (보이스피싱에 대한 경찰의 대응방안에 관한 연구)

  • Kim, Duck-Yong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.193-198
    • /
    • 2018
  • In Korea, the penetration rate of Internet, telephone and smart devices is reaching the highest level in the world. Cyber financial crimes that exploit such infrastructures continue to evolve. Since the first Voice Phishing crime in May 2006, ten years later, there has been a constant occurrence of Voice Phishing crime. Voice Phishing is a crime in which a victim is phoned for false information to figure out the victim's account number and password. This method of Voice Phishing evolves day by day, and it is difficult to investigate. Most of Voice Phishing is a form of international organized crime that is based in Southeast Asia such as China, and it is not easy to eradicate by international cooperation investigation. The purpose of this study is to investigate the actual situation and case analysis of Voice Phishing crime, and to propose the countermeasures against police Voice Phishing counterplan.

A Study on the Prediction Method of Voice Phishing Damage Using Big Data and FDS (빅데이터와 FDS를 활용한 보이스피싱 피해 예측 방법 연구)

  • Lee, Seoungyong;Lee, Julak
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.185-203
    • /
    • 2020
  • While overall crime has been on the decline since 2009, voice phishing has rather been on the rise. The government and academia have presented various measures and conducted research to eradicate it, but it is not enough to catch up with evolving voice phishing. In the study, researchers focused on catching criminals and preventing damage from voice phishing, which is difficult to recover from. In particular, a voice phishing prediction method using the Fraud Detection System (FDS), which is being used to detect financial fraud, was studied based on the fact that the victim engaged in financial transaction activities (such as account transfers). As a result, it was conceptually derived to combine big data such as call details, messenger details, abnormal accounts, voice phishing type and 112 report related to voice phishing in machine learning-based Fraud Detection System(FDS). In this study, the research focused mainly on government measures and literature research on the use of big data. However, limitations in data collection and security concerns in FDS have not provided a specific model. However, it is meaningful that the concept of voice phishing responses that converge FDS with the types of data needed for machine learning was presented for the first time in the absence of prior research. Based on this research, it is hoped that 'Voice Phishing Damage Prediction System' will be developed to prevent damage from voice phishing.

Voice Phishing Occurrence and Counterplan (보이스피싱 발생 및 대응방안)

  • Cho, Ho-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.176-182
    • /
    • 2012
  • Voice Phishing finds out personal information illegally using electrification and it is confidence game that withdraw deposit on the basis of this. It appeared by new social problem as damage instances increase rapidly. Target of the damage is invading indiscriminately to good civilian and is crime that commit by foreigners such as a most Chinese, Formosan. Voice Phishing can be crime type of new form in terms of criminal practice is achieved in the foreign countries. Therefore, this study wishes to analyze present occurrence actual conditions and example, and search effective confrontation plan regarding Voice Phishing. Voice Phishing criminal offense is growing as crime is not eradicated in spite of continuous public relations and control, and technique is diversified and specializes preferably. Hereafter, confrontation plan about problem may have to be readied in banking communication investigation to eradicate Voice Phishing. Also, polices control activity may have to be reinforce through quick investigation's practice and development of investigation technique, and relevant government ministry and international mutual assistance cooperation such as the Interpol should be reinforced because is shown international crime personality.

A Study on the Characteristics and Progress of New Voice Phishing Based on Psychological Descriptions (심리적 기재를 기반으로 한 신종 보이스피싱의 특성 및 진행과정에 관한 연구)

  • SeiYouen Oh;HyeJin Song
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.510-518
    • /
    • 2023
  • Purpose: This study compares and analyzes the characteristics and progress of existing voice phishing and new voice phishing to present a basic policy plan to prepare countermeasures against new voice phishing based on psychological descriptions. Method: The criminal progress and characteristics of the two were compared and analyzed through damage cases on various portal sites centered on voice phishing crime scenarios. Result: As a result of analyzing the progress of the third stage of new voice phishing, the scenario of new voice phishing that can deceive victims was written more carefully and the scope of the crime was expanded. In the crime execution stage, the victim was socially isolated, reducing the victim's judgment ability, making it more difficult for investigative agencies to investigate, and in the final stage, the continuity and expansion of criminal damage such as extortion of money and valuables are shown. Conclusion: There were differences in the target and scope of the crime and the method of the crime strategy between the two, and the possibility of damage is much greater, so a more efficient response strategy should be prepared.

A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing (빅데이터 기반의 융합 보이스피싱을 이용한사회공학적 공격 기법과 대응방안)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.1
    • /
    • pp.85-91
    • /
    • 2015
  • Recently government has distributed precautionary measure and response procedures for smishing(SMS phishing), pharming, phishing, memory hacking and intensified Electronic Financial Transaction Act because of the sharp increase of electronic bank frauds. However, the methods of electronic bank frauds also developed and changed accordingly so much it becomes hard to cope with them. In contrast to earlier voice phishing targeted randomizing object, these new methods find out the personal information of targets and analyze them in detail making a big data base. And they are progressed into new kind of electronic bank frauds using those analyzed informations for voice phishing. This study analyze the attack method of voice phishing blended with the Big Data of personal informations and suggests response procedures for electronic bank frauds increasingly developed. Using the method to save meaningless data in a memory, attackers cannot deduct accurate information and try voice phishing properly even though they obtain personal information based on the Big Data. This study analyze newly developed social technologic attacks and suggests response procedures for them.

A Study on National Economic Loss and Economic Effects of Security Measures against (Voice)Phishing ((보이스)피싱의 국가경제손실과 보안효과 연구)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.157-160
    • /
    • 2012
  • (Voice)Phishing against the old or weak person used the method which is social engineering in the object and financial structure and function. Until recently (voice)Phishing from Chaina caused economic devastation and the economic loss by Phishing grows with the South Korean whole. Korean government and organizations involved have been strengthening protection system and a financial security device. But it is not easy to verify how much effects of security measures are. In this paper we will study the economic loss caused by (voice)Phishing and economic efficiency of security measures and security device reinforcement of the Republic of Korea.

  • PDF

Analysis on National Economic Loss of Cyber Attack: Voice Phishing Case (사이버공격의 국가 경제적 손실분석 - 보이스 피싱을 중심으로)

  • Shin, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2341-2346
    • /
    • 2012
  • Voice phishing against the old or weak persons have used the methods which are social engineering in the object and financial structure and function. Until recently Voice phishing from Chaina caused economic devastation and the economic loss by phishing grows with the South Koreans in the whole. Korean government and public organizations involved have been strengthening protection system and a financial security devices. But it is not easy to verify how much effects of security measures are. In this paper I will study the economic loss caused by voice phishing and potential economic effects of security measures and security device reinforcements of the Republic of Korea. Direct costs are reported about 100 million dollars and potential economic effects of voice phinshing secure measures may be around 320 million dollars.

A Study on Countermeasures through Messenger Phishing Experience Analysis (메신저피싱 경험사례 분석을 통한 대응방안 연구)

  • Nam, Sowon;Lee, Haksun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.791-805
    • /
    • 2022
  • In recent years, the number of scams related to voice phishing has been on the decline, but the number of messenger phishing attacks, a new type of crime, is increasing. In this study, by analyzing SNS posts containing messenger phishing cases, criminal trends of the main methods, imposture of trusted relative and fake payment were identified. Through the analysis, main words and patterns composing the message and the similarity and continuity of the phone numbers used were derived as criminal attributes, and criminal organizations were grouped. As the results of the analysis, we propose a cooperative system to prevent damage from messenger phishing by disseminating the criminal information collected by investigative agencies to private operators, and a plan to respond to messenger phishing predicted through grouping of criminal organizations.