1. Phishing through social bots on Twitter
- Author
-
Shafahi, M., Kempers, L., Afsarmanesh, H., Joshi, J., Karypis, G., Liu, L., Hu, X., Ak, R., Xia, Y., Xu, W., Sato, A.-H., Rachuri, S., Ungar, L., Yu, P.S., Govindaraju, R., Suzumura, T., Federated Collaborative Networks (IVI, FNWI), and IvI Research (FNWI)
- Subjects
business.industry ,Computer science ,Internet privacy ,Subject (documents) ,02 engineering and technology ,Phishing ,Electronic mail ,World Wide Web ,Work (electrical) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Social media ,business - Abstract
This work investigates how social bots can phish employees of organizations, and thus endanger corporate network security. Current literature mostly focuses on traditional phishing methods (through e-mail, phone calls, and USB sticks). We address the serious organizational threats and security risks caused by phishing through online social media, specifically through Twitter. This paper first provides a review of current work. It then describes our experimental development, in which we created and deployed eight social bots on Twitter, each associated with one specific subject. For a period of four weeks, each bot published tweets about its subject and followed people with similar interests. In the final two weeks, our experiment showed that 437 unique users could have been phished, 33 of which visited our website through the network of an organization. Without revealing any sensitive or real data, the paper analyses some findings of this experiment and addresses further plans for research in this area.
- Published
- 2016