2022
DOI: 10.1109/access.2022.3217795
|View full text |Cite
|
Sign up to set email alerts
|

Smishing Strategy Dynamics and Evolving Botnet Activities in Japan

Abstract: XLoader and FakeSpy, the two major smishing botnets targeting Japan, change their attack strategies over various timescales. Based on recent observations of the botnets and Twitter data, we present empirical facts about their strategies and activity patterns and applied some of these strategic and activity patterns to malware detection and malicious domain detection. All the proposed methods yielded small false positive and negative rates, and are expected to run on user devices owing to their small computatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 42 publications
(47 reference statements)
0
2
0
Order By: Relevance
“…In this study, we propose an approach that uses Twitter as a new observation point to immediately collect actual phishing situations encountered by users that have bypassed existing countermeasures and to understand the characteristics of such phishing. Some previous studies have also used Twitter as a source to extract nonphishing cyberattack information (e.g., vulnerability information and malware behavior information) [16,51,54,55] and limited phishing cyberattack information (e.g., search by fixed keywords or monitor only specific users) [52,55,58]. Specifically, these previous studies used Twitter posts of the cyberattack information by security experts, which allowed them to identify vulnerability information and indicator of compromises (IOCs) before they were published on the National Vulnerability Database [42] and Virus-Total [10].…”
Section: Introductionmentioning
confidence: 99%
“…In this study, we propose an approach that uses Twitter as a new observation point to immediately collect actual phishing situations encountered by users that have bypassed existing countermeasures and to understand the characteristics of such phishing. Some previous studies have also used Twitter as a source to extract nonphishing cyberattack information (e.g., vulnerability information and malware behavior information) [16,51,54,55] and limited phishing cyberattack information (e.g., search by fixed keywords or monitor only specific users) [52,55,58]. Specifically, these previous studies used Twitter posts of the cyberattack information by security experts, which allowed them to identify vulnerability information and indicator of compromises (IOCs) before they were published on the National Vulnerability Database [42] and Virus-Total [10].…”
Section: Introductionmentioning
confidence: 99%
“…To counter this growing threat, creating new publicly available datasets becomes imperative to develop effective models and strategies. However, there are limited publicly available SMS phishing datasets [9,18]. These datasets also face relevance challenges due to various factors.…”
Section: Introductionmentioning
confidence: 99%