SOCIAL ENGINEERING IN MODERN MESSENGERS: APPLICATIONS FOR OFFENSIVE SECURITY

Authors

DOI:

https://doi.org/10.32782/IT/2023-2-10

Keywords:

social engineering, messengers, Telegram, bot, ChatGPT.

Abstract

The work considers the problems of social engineering in modern messengers, and provides classification indicators for modern attacks. Attention is focused on the Telegram messenger, whose channel owners and visitors to these channels may suffer from the intervention of fraudsters who cannot always be identified in time. Fraudsters or malicious bots are exposed and removed as a result of certain user complaints, very often when the purpose of the malicious intervention has already been realized. This indicates the need to develop new proactive solutions. The purpose of this work is to enrich offensive security mechanisms for social messengers by using bots and artificial intelligence using specially created prompts. The novelty of the work. It is proposed to place a kind of honeypot analogues in the space of communication. The role of the decoy victim is given to a specially configured bot disguised as a user, capable of carrying out a conversation according to a given scenario. The bot’s algorithm has been developed. Methodology. Social engineering is seen as a proactive security tool aimed at identifying vulnerabilities that attackers can exploit, as well as a reverse defense by obtaining information from fraudsters that compromises them. Main results. The work successfully combined developed offensive security scenarios for real Ukrainian chats at the time of the research, with the capabilities of ChatGPT, which made it possible to implement a bot, with the ability to communicate according to the scenario specified by the security specialist. Testing of the bot and the corresponding application in the Telegram channel was carried out, with the consent of real users, which proved the workability of the solution. Conclusions. The modern level of artificial intelligence tools allows one to obtain valuable information about attackers in the information space, conduct automated security testing, and implement other offensive security scenarios. Channel administrators can use the solution as a channel subscribers filtering tool.

References

Jory MacKay. The 11 Latest Telegram App Scams To Watch Out For. 2023. URL: https://www.aura.com/ learn/telegram-app-scams.

Telegram/bots. 2023. URL: https://core.telegram.org/bots.

Cofense Intelligence™ Strategic Analysis. Abuse of Telegram Bots. 2023. URL: https://cofense.com/ blog/cofense-intelligence-strategic-analysis/.

Abel Toro. Tapping Telegram Bots. 2019. URL: https://www.forcepoint.com/blog/x-labs/tapping-telegrambots

Fabrizio Rendina. A Social Engineering attack using Telegram. 2019. URL: https://www.linkedin.com/ pulse/social-engineering-attack-using-telegram-fabrizio-rendina/.

David Edwards. Social Engineering Taxonomy. 2019. URL: https://www.linkedin.com/pulse/socialengineering- taxonomy-david-edwards/

Huang, Ling, et al. Adversarial machine learning. 2011. Proceedings of the 4th ACM workshop on Security and artificial intelligence.

Zeadally S., Adi E., Baig Z., Khan I. A. 2020. Harnessing artificial intelligence capabilities to improve cybersecurity, IEEE Access, vol. 8, pp. 23817–23837, doi: 10.1109/ACCESS.2020.2968045.

Adi E., Baig Z., Zeadally Sh. 2022. Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions, doi: 10.5604/01.3001.0016.0800.

Hobbs J. 2018. AI Enters the Cyber Attack Realm [Online]. Available: https://www.afcea.org/content/ aienters-cyber-attack-realm.

Downloads

Published

2023-09-12