2021 APWG Symposium on Electronic Crime Research (eCrime) 2021
DOI: 10.1109/ecrime54498.2021.9738786
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Effectiveness of Phishing Reports on Twitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 39 publications
1
9
0
Order By: Relevance
“…For example, a recent study showed that 25% of vulnerabilities appear on social media before the National Vulnerability Database (Brettman 2020), and as a result, numerous threat intelligence tools, such as Spider-Foot (spi 2021) and IntelMQ (Int 2021), started collecting intelligence from social media platforms. Another recent study showed that Twitter phishing reports provide detailed information about phishing threats and include more sophisticated phishing threats that remain undetected by anti-phishing tools (Roy, Karanjit, and Nilizadeh 2021a). However, we argue that such tools are vulnerable to poisoning attacks because social media posts (1) can be posted by an adversary and (2) are weakly monitored, as detecting and removing such misinformation is currently not the priority of social media platforms.…”
Section: Introductionmentioning
confidence: 86%
See 1 more Smart Citation
“…For example, a recent study showed that 25% of vulnerabilities appear on social media before the National Vulnerability Database (Brettman 2020), and as a result, numerous threat intelligence tools, such as Spider-Foot (spi 2021) and IntelMQ (Int 2021), started collecting intelligence from social media platforms. Another recent study showed that Twitter phishing reports provide detailed information about phishing threats and include more sophisticated phishing threats that remain undetected by anti-phishing tools (Roy, Karanjit, and Nilizadeh 2021a). However, we argue that such tools are vulnerable to poisoning attacks because social media posts (1) can be posted by an adversary and (2) are weakly monitored, as detecting and removing such misinformation is currently not the priority of social media platforms.…”
Section: Introductionmentioning
confidence: 86%
“…Phishing is a type of social engineering attack through which attackers try to trick victims into disclosing their private and sensitive information (Dhamija, Tygar, and Hearst 2006). To inform other users, some social media users share reports of phishing websites (Roy, Karanjit, and Nilizadeh 2021a). However, false phishing reports can also circulate on these platforms.…”
Section: Introductionmentioning
confidence: 99%
“…Samuel et al discussed comprehensive security threats and available countermeasures related to ChatGPT [93], including its implications for cybersecurity in big data applications and medical information security [94] [95]. Biswas et al investigated the use of ChatGPT models for detecting common security attacks and potential drawbacks [96], while also highlighting negative aspects, such as the creation of phishing attacks using GPT models, despite its benefits [97]. Roy et al further emphasized that employing ChatGPT could facilitate the creation of phishing websites without the need for adversarial vulnerabilities.…”
Section: B Cyber Securitymentioning
confidence: 99%
“…In addition, when users post reports, they often include numerous screenshots of emails and SMSs, and these features can efficiently identify user reports. Related studies [50,55] have shown that these similar features can effectively determine whether a string contains warning information. URL Features.…”
Section: Feature Engineeringmentioning
confidence: 99%
“…It has been demonstrated that the proposed system can detect threats, especially malwarerelated threats, earlier than other threat intelligence systems. Roy et al focused on defanging and phishing attack-related hashtag strings, extracted information about phishing attacks from Twitter, and analyzed the characteristics of the accounts posting information [50]. It has been shown that information that interacts with other accounts, such as replies and retweets to the information posted on Twitter, is reflected more quickly in the block list.…”
Section: Related Workmentioning
confidence: 99%