
Research Article
Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon
@INPROCEEDINGS{10.1007/978-3-031-34896-9_26, author={Alima Nzeket Njoya and Franklin Tchakount\^{e} and Marcellin Atemkeng and Kalum Priyanath Udagepola and Didier Bassol\^{e}}, title={Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon}, proceedings={Towards new e-Infrastructure and e-Services for Developing Countries. 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings}, proceedings_a={AFRICOMM}, year={2023}, month={6}, keywords={Mobile money phishing vulnerabilities taxonomies emotions interactions cybercrimes cameroon}, doi={10.1007/978-3-031-34896-9_26} }
- Alima Nzeket Njoya
Franklin Tchakounté
Marcellin Atemkeng
Kalum Priyanath Udagepola
Didier Bassolé
Year: 2023
Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon
AFRICOMM
Springer
DOI: 10.1007/978-3-031-34896-9_26
Abstract
Mobile Money (MM) technologies are popular in developing countries where people are unbanked, and they are exploited as means of financial transactions in the economy. Sophisticated cyber-phishing techniques successfully target MM accounts. Related countermeasures are rare and the existing ones are so technical that people without minimal knowledge cannot be helped. Making the knowledge around cybercrime facts is therefore relevant since it provides a good basis for further technical research. In this vein, this paper dissects phishing cybercrime strategies observed within the Cameroonian cyberspace. We provide identified vulnerabilities, process design of generic MM attack, taxonomies of attacks, and classification of the latter based on criteria. Findings about commonalities and dissimilarities reveal two aspects to really consider when designing solutions: emotion and interactions.