
Research Article
Preliminary Investigation of Mobile Banking Attacks in West Africa: Feedback from Orange Money Customers in Burkina Faso
@INPROCEEDINGS{10.1007/978-3-031-06374-9_2, author={Arthur D. Sawadogo and Zakaria Sawadogo and Steve T. M. Ataky and Khalid M. Askia and Kalmogo Roland and Issa Boussim}, title={Preliminary Investigation of Mobile Banking Attacks in West Africa: Feedback from Orange Money Customers in Burkina Faso}, proceedings={e-Infrastructure and e-Services for Developing Countries. 13th EAI International Conference, AFRICOMM 2021, Zanzibar, Tanzania, December 1-3, 2021, Proceedings}, proceedings_a={AFRICOMM}, year={2022}, month={5}, keywords={Security Mobile banking Mobile money User experiences Attacks Survey}, doi={10.1007/978-3-031-06374-9_2} }
- Arthur D. Sawadogo
Zakaria Sawadogo
Steve T. M. Ataky
Khalid M. Askia
Kalmogo Roland
Issa Boussim
Year: 2022
Preliminary Investigation of Mobile Banking Attacks in West Africa: Feedback from Orange Money Customers in Burkina Faso
AFRICOMM
Springer
DOI: 10.1007/978-3-031-06374-9_2
Abstract
Mobile banking is used to perform balance checks, account transactions, payments, credit applications, and other banking transactions via a mobile device. Until recently, mobile banking was most often done via SMS or the mobile web. In west African countries, these applications are preferred before all others of the same kind due to their proximity and ease of use. However, in recent years, several end-users have fallen victim of attacks aiming at misappropriating their money. In this scenario of attacks, the end-user is the most affected. Unfortunately, there is a crucial lack of information regarding the tricks used by attackers on them, users, not allowing the victims to protect themselves. In this paper, we propose a comprehensive study on Orange Money attacks in the Burkina Faso context. We analyze the different Facebook forums to identify recurring attack methods from the user’s point of view. In the end, we propose the bests practices that users should follow.