Figure 2 - uploaded by Dhruv Kuchhal
Content may be subject to copyright.
Comparison of campaigns running in the top 4 countries-Indonesia, USA, India, and UAE across different campaign categories. While visibility that a post receives is positively correlated with volume, account suspension in a campaign is not. Escort service and Tech Support campaigns had largest percentage of suspended accounts. The number of users suspended is represented by * and # denotes the fraction of posts getting visibility. 

Comparison of campaigns running in the top 4 countries-Indonesia, USA, India, and UAE across different campaign categories. While visibility that a post receives is positively correlated with volume, account suspension in a campaign is not. Escort service and Tech Support campaigns had largest percentage of suspended accounts. The number of users suspended is represented by * and # denotes the fraction of posts getting visibility. 

Source publication
Conference Paper
Full-text available
Cybercriminals abuse Online Social Networks (OSNs) to lure victims into a variety of spam. Among different spam types, a less explored area is OSN abuse that leverages the telephony channel to defraud users. Phone numbers are advertized via OSNs, and users are tricked into calling these numbers. To expand the reach of such scam / spam campaigns, ph...

Similar publications

Chapter
Full-text available
The trust evaluation of information and people is crucial for maintaining an open and healthy Online Social Networks (OSN) platform for society. In this work, we develop a Coupled Dual Networks Trust Ranking (CoRank) method to measure the trustworthiness of users and tweets by analysing user/tweet behaviour on Twitter. This method goes beyond the e...
Chapter
Full-text available
Evolving behaviours by spammers on online social networks continue to be a big challenge; this phenomenon has consistently received attention from researchers in terms of how it can be combated. On micro-blogging communities, such as Twitter, spammers intentionally change their behavioral patterns and message contents to avoid detection. Many exist...

Citations

... The recruitment dataset of 17,880 annotated job ads are collected and released for public. Srishti et al. [20] performed a study on large scale social media campaigns used to distribute the scammer phone numbers in the social media networks. They identified that 202 campaign groups actively posting phone numbers on the web and also mentioned that some social network (twitter) can red flag as spam campaign better than the other popular social media network (Facebook). ...
... Social engineering scammer identification is much more challenging than one can think of, as the scams involve intricate steps to trace out and multiple stakeholders involves [16] Nigerian check larger amount check The check scam protection discussion Only two ways of performing check scam mentioned Youngsam et al. [14] Nigerian Craigslist magnetic honeypot advertisements better understand Nigerian scammer patterns, tools, email usage etc. 10 groups responsible for most of the activity Aude et al. [17] Telephone scams Honeypot, Audio machine learning Able to group the scammers Identified one third of the calls are robocalls Ting-Fang et al. [15] Romance scams Simulated spam filter to track the scammers Discussed different types of romance scam Affiliated market scams using online dating apps Najmeh et al. [13] Technical support Discovering advertisement in web Automated discovery Still considered as most dangerous scam Youngsam et al. [18] Craigslist Rental Web crawling, automated responses Able to identify the scammer infrastructure used less than half of the scams Craigslist identified and removed from portal Vidros et al. [19] Recruitment fraud Automated web page crawling first dataset available in public ML based techniques used for detection Srishti et al. [20] Spam campaigns Automated crawling of webpages large scale study covering posts on multiple social networks Twitter can suspend spam accounts better than Facebook Yangyu et al. [21] Dating App scam Crawling dating apps in Android store Large scale analysis and fraud app detection The chatbot accounts influence the users buy premium Suarez et al. [22] Dating fraud ML classifier Achieved 96% correct identification Online profile based analysis efficient compared to bot based Agari [23] Romance scams Phishing emails -target divorced, farmer, disabled people Pastrana et al. [24] eWhoring scam Crawl Underground forum Pipeline framework to identify these scams Performed URL and image analysis during the investigation during the scam lifecycle. So, a common language and criteria is required to identify the scammers and reduce the scope of the scammer presence for catching them. ...
Preprint
Full-text available
Social engineering scams (SES) has been existed since the adoption of the telecommunications by humankind. An earlier version of the scams include leveraging premium phone service to charge the consumers and service providers but not limited to. There are variety of techniques being considered to scam the people due to the advancements in digital data access capabilities and Internet technology. A lot of research has been done to identify the scammer methodologies and characteristics of the scams. However, the scammers finding new ways to lure the consumers and stealing their financial assets. An example would be a recent circumstance of Covid-19 unemployment, which was used as a weapon to scam the US citizens. These scams will not be stopping here, and will keep appearing with new social engineering strategies in the near future. So, to better prepare these kind of scams in ever-changing world, we describe the recent trends of various social engineering scams targeting the innocent people all over the world, who oversight the consequences of scams, and also give detailed description of recent social engineering scams including Covid scams. The social engineering scan threat model architecture is also proposed to map various scams. In addition, we discuss the case study of real-time gift card scam targeting various enterprise organization customers to steal their money and put the organization reputation in stake. We also provide recommendations to internet users for not falling a victim of social engineering scams. In the end, we provide insights on how to prepare/respond to the social engineering scams by following the security incident detection and response life cycle in enterprises.
... A study [21] investigated spammers' strategies to enhance their influence scores by following real users as well as each other on Twitter. Lastly, Gupta et al. [22] conducted a large-scale analysis study of spam campaigns on multiple social platforms that used telephone numbers to lure victims. ...
... To investigate malicious campaigns, a collection of accounts exhibiting spam-like behaviors such as sharing duplicate tweets and URLs were also gathered from trending topics in Saudi Arabia. Following that, we looked at the content and practices of these accounts, classifying individuals with similar or duplicate materials as a group, which is a sample strategy used by several previous studies [22], [28], [29]. The dataset eventually located two campaigns that stood out significantly from the rest of the collected groups. ...
Article
Full-text available
Fake malicious accounts are one of the primary causes of the deterioration of social network content quality. Numerous such accounts are generated by attackers to achieve multiple nefarious goals, including phishing, spamming, spoof- ing, and promotion. These practices pose significant challenges regarding the availability of credible data that reflect real- world social media interactions. This has led to the development of various methods and approaches to combat spammers on social media networks. Previous studies, however, have almost exclusively focused on studying and identifying English-language spam profiles, whereas the problem of malicious Arabic-language accounts remains under-addressed in the literature. In this paper, therefore, we conduct a comprehensive investigation of malicious Arabic-language campaigns on Twitter. The study involves analyzing the accounts of these campaigns from several perspectives, including their number, content, social interaction graphs, lifespans, and day-to-day activities. In addition to expos- ing their spamming tactics, we find that these spam accounts are more successful in avoiding Twitter suspensions than has been previously reported in the literature.
... Moreover, 66% of males, in comparison to 48.9% of females, agree that they feel confident about who they are as a person. This suggests that a smaller number of females feel confident, which corresponds to the stereotype that females have lower self-esteem than males [22]. Figure 1 shows the overall analysis of frequency of each participant's tweets over the span of one week. ...
Article
Full-text available
Distinct polarities of gender stereotypes ascertain that communicative styles demonstrated by men and women are fundamentally disparate. Numerous researches have established varying communicative styles and methods involved in interpersonal communication, predominantly in the analysis of conversational styles as well as etymological strategies. Nevertheless, the widespread of social media has contributed to a pivotal, fascinating shift in the utilization of lexes, encompassing less conventional gender-based articulacy and distinctness amongst youths within virtual setting. Drawing on the data from disseminated survey and purposive observations on sampled Twitter accounts, this study probed on the correlation between gender stereotypes, communicative styles and linguistic features, manifesting the aggressive, assertive, passive-aggressive and passive traits which are associated with gender-based, stereotypical communicative styles. The findings yielded dominating percentages of males against females in which males possess and exhibit all four traits of communicative styles whereas the observations revealed that both genders demonstrate passive-aggressive and assertive traits.
... Moreover, 66% of males, in comparison to 48.9% of females, agree that they feel confident about who they are as a person. This suggests that a smaller number of females feel confident, which corresponds to the stereotype that females have lower self-esteem than males [22]. Figure 1 shows the overall analysis of frequency of each participant's tweets over the span of one week. ...
Article
Full-text available
Distinct polarities of gender stereotypes ascertain that communicative styles demonstrated by men and women are fundamentally disparate. Numerous researches have established varying communicative styles and methods involved in interpersonal communication, predominantly in the analysis of conversational styles as well as etymological strategies. Nevertheless, the widespread of social media has contributed to a pivotal, fascinating shift in the utilization of lexes, encompassing less conventional gender-based articulacy and distinctness amongst youths within virtual setting. Drawing on the data from disseminated survey and purposive observations on sampled Twitter accounts, this study probed on the correlation between gender stereotypes, communicative styles and linguistic features, manifesting the aggressive, assertive, passive-aggressive and passive traits which are associated with gender-based, stereotypical communicative styles. The findings yielded dominating percentages of males against females in which males possess and exhibit all four traits of communicative styles whereas the observations revealed that both genders demonstrate passive-aggressive and assertive traits. (PDF) Theorizing communicative styles on social media: an etymological shift. Available from: https://www.researchgate.net/publication/333573166_Theorizing_communicative_styles_on_social_media_an_etymological_shift [accessed Aug 21 2019].
Conference Paper
Twitter trending hashtags are a primary feature, where users regularly visit to get news or chat with each other. However, this valuable feature has been abused by malicious campaigns that use Twitter hashtags to disseminate religious hatred, promote terrorist propaganda, distribute fake financial news, and spread healthcare rumours. In recent years, some health-related campaigns flooded Arabic trending hashtags in Twitter. These campaigns not only irritate users, but they also distribute malicious content. In this paper, a comprehensive empirical analysis of the ongoing health-related campaigns on Twitter Arabic hashtags is presented. After collecting and an-notating tweets posted by these campaigns, we qualitatively analyzed the characteristics and behaviours of these tweets. We seek to find out what makes some of the tweets posted by these campaigns difficult to detect. Two main findings were identified: (1) these campaigns exhibit some spamming activities, such as using bots and trolls, (2) they use unique hijacked accounts as adversarial examples to obfuscate detection. This study is the first to qualitatively analyze health-related campaigns on Twitter Arabic hashtags from security point of view. Our findings suggest that some of the tweets posted by these campaigns need to be treated as adversarial examples that have not only been crafted to evade detection but also to undermine the deployed detection system.
Conference Paper
Online Social Networks (OSNs) are platforms that have gained immense traction from society today. Social media has reshaped our social world and has been playing a pivotal role in sculpting our personal and professional goals. While it provides invaluable information to millions of individuals daily, it has also become one of the most popular places for spam campaigns. In this paper, we design an algorithm for the recognition of spam campaigns, specifically focusing on a phone-numbers based approach. We build a system for spam campaign recognition with an emphasis on phone numbers in the light of the malicious activity that is vandalizing our online experience. This research focuses on data extracted from monitoring the following social networking channels: Tumblr, Twitter, and Flickr. The paper serves as an analytical lens for spam posts accumulated over four months. Regular expressions are used for data cleaning to identify posts containing phone numbers. We collected over 18 million spam posts and filtered the spam-containing posts using regular expressions. Next, we used a Bayesian Model called Latent Dirichlet Allocation (LDA) to perform a statistical model for detecting the category of the posts. We further use the bag-of-words and the tf-idf means to this data and apply cosine similarity for the similarity measure.
Article
Social networks have generated immense amounts of data that have been successfully utilized for research and business purposes. The approachability and immediacy of social media have also allowed ill-intentioned users to perform several harmful activities that include spamming, promoting, and phishing. These activities generate massive amounts of low-quality content that often exhibits duplicate, automated, inappropriate, or irrelevant content that subsequently affects users’ satisfaction and imposes a significant challenge for other social media-based systems. Several real-time systems were developed to tackle this problem by focusing on filtering a specific kind of low-quality content. In this paper, we present a fine-grained real-time classification approach to identify several types of low-quality tweets (i.e., phishing, promoting, and spam tweets) written in Arabic. The system automatically extracts textual features using deep learning techniques without relying on hand-crafted features that are often time-consuming to be obtained and are tailored for a single type of low-quality content. This paper also proposes a lightweight model that utilizes a subset of the textual features to identify spamming Twitter accounts in a real-time setting. The proposed methods are evaluated on a real-world dataset (40, 000 tweets and 1, 000 accounts), showing superior performance in both models with accuracy and F1-scores of 0.98. The proposed system classifies a tweet in less than five milliseconds and an account in less than a second.