Social Engineering Based Cyber-Attacks in Kenya: Africa Nazarene University, P.O. Box 53067, Nairobi, 00200, Kenya
Social Engineering Based Cyber-Attacks in Kenya: Africa Nazarene University, P.O. Box 53067, Nairobi, 00200, Kenya
Social Engineering Based Cyber-Attacks in Kenya: Africa Nazarene University, P.O. Box 53067, Nairobi, 00200, Kenya
1. Introduction
The Fourth Industrial Revolution is the current and developing environment in which
disruptive technologies and trends are changing the way we live and work. These include
the Internet of Things (IoT), robotics, virtual reality (VR) and artificial intelligence (AI)
among others. The question of how cyber resilient we are with all these disruptive
technologies is a concern for relatively every organization globally. Cyber-attacks are
perceived from a complex sophisticated perspective. The commonly notable forms of
attacks that come into our minds at the mention of cybercrime include password attacks,
Denial of Service (DoS) and Distributed Denial of Service (DDOS) attacks, man-in-the-
middle attacks, phishing and spear-phishing attacks, Drive-by attacks, SQL injection
attacks, cross-site scripting (XSS) attacks, eavesdropping attacks and malware attacks. One
other form of attack that is always overlooked is Social Engineering [1]. Social Engineering
can be described as the art of exploiting the weakest layer of Information Security Systems,
the people who use the systems [2], [3]. The victims are usually deceived to release
information or perform malicious actions on behalf of the attackers. While technical
security of most critical systems is high, the systems remain vulnerable to attacks from
social engineers [1]. Social Engineering is non-technical, hence, does not require any
advanced technical tools, can be used by anyone and is cheap [1]. The technique consists of
2. Social Engineering
Social Engineering is a psychological form of attack normally targeted towards users
perceived to possess rich knowledge or access rights to sensitive information. However, due
to varied intentions by attackers, any person can still fall victim to Social Engineering.
Social Engineering could best be viewed as an indirect attack [6] aimed at having people
reveal information by using psychosomatic techniques. Social engineers have three key
tasks to undertake, namely, understanding the targeted victim, developing a perfect plan,
and launching that plan [7]. Hence, Social Engineering attacks occur in two main phases,
namely, the information-gathering phase and the exploit phase. During the information-
gathering phase, crucial information such as organization details including internal
documents, organization structure, client details and telephone directories or individual
details like date of birth, contact number, address, and marital status and so on are collected
[3]. The information is later used in the exploit phase to perform an attack. The nature of
exploit depends on the nature of information gathered from the user.
Social Engineering can be accomplished through many forms, three of which are,
phishing, vishing and smishing. Phishing is a network type of attack where the attacker
fakes something, for instance, a webpage, to fool an online user to elicit personal
information [8]. Phishing attacks are very difficult to detect because they occur in many
ways that people are unaware of [8]. These include spoofing emails, fake social network
accounts, hacking, and Trojan horses. Many tools can identify phishing websites and warn
clients about the malware present on the websites, but most of the users tend to ignore such
warnings [8]. Karakasiliotis, Furnell and Papadaki [9] investigated whether users could
identify legitimate phishing emails amongst a set of legitimate and illegitimate emails.
Findings from the study depict a need for increased security awareness. This is however a
great challenge due to the technical unfamiliarity or the behavioural traits of each
information system user. Conversely, vishing is the fraudulent practice of making phone
3. Research Objectives
The main objective of this study was to present and demonstrate an analytical approach
towards Social Engineering in Kenya, then further develop a model for controlling Social
Engineering. To achieve this objective, the following specific objectives were put into
consideration: to explore the level of understanding of the various forms of Social
Engineering in Kenya; to determine the prevalence of Social Engineering attacks in Kenya
and to propose a model that could act as a countermeasure for Social Engineering.
4. Methodology
The study used random sampling to select 73 participants. Qualitative and quantitative data
was collected from the sample through an online survey and face to face interviews. The
data was then analysed using MS-Excel data analysis tools. Charts and descriptive
narratives were used to outline results based on the analysed data.
8. Conclusion
This paper examined the level of resilience by Kenyan against Social Engineering attacks.
Vishing stands out as the most commonly used form of Social Engineering, closely
followed by smishing attacks. Some of the outstanding reasons behind the prevalence of the
two forms include: the growth in mobile phone users, the blooming of mobile money
transfer, availability of massive unprotected personal data and the ease of convincing
potential victims via phone conversations. Alongside financial gain as the striking motive
behind these attacks, the success rate was noted to remain drastically minimum, although,
attack persistence is maintained at a high rate. Authority featured in the reviewed studies as
the leading persuasion principle used by social engineers to convince their target victims.
References
[1] K. Beckers and S. Pape, “A Serious Game for Eliciting Social Engineering Security Requirements,”
Proc. - 2016 IEEE 24th Int. Requir. Eng. Conf. RE 2016, pp. 16–25, 2016.
[2] M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa, “Towards automating social engineering using
social networking sites,” in Proceedings - 12th IEEE International Conference on Computational
Science and Engineering, CSE 2009, 2009, vol. 3, pp. 117–124.
[3] A. Chitrey, D. Singh, and V. Singh, “A Comprehensive Study of Social Engineering Based Attacks in
India to Develop a Conceptual Model,” Int. J. Inf. Netw. Secur., vol. 1, no. 2, 2012.
[4] J. W. H. Bullée, L. Montoya, W. Pieters, M. Junger, and P. Hartel, “On the anatomy of social
engineering attacks—A literature-based dissection of successful attacks,” J. Investig. Psychol. Offender
Profiling, vol. 15, no. 1, pp. 20–45, Jan. 2018.
[5] I. Ghafir, V. Prenosil, A. Alhejailan, and M. Hammoudeh, “Social engineering attack strategies and
defence approaches,” Proc. - 2016 IEEE 4th Int. Conf. Futur. Internet Things Cloud, FiCloud 2016, pp.
145–149, 2016.
[6] A. M. Fathollahi-Fard, M. Hajiaghaei-Keshteli, and R. Tavakkoli-Moghaddam, “The Social
Engineering Optimizer (SEO) Facilities Interdiction Problem View project Metaheuristic View project
The Social Engineering Optimizer (SEO),” Eng. Appl. Artif. Intell., vol. 72, pp. 267–293, 2018.
[7] A. Algarni, Y. Xu, T. Chan, and Y. C. Tian, “Social engineering in social networking sites: Affect-
based model,” 2013 8th Int. Conf. Internet Technol. Secur. Trans. ICITST 2013, pp. 508–515, 2013.
[8] S. Gupta, A. Singhal, and A. Kapoor, “A literature survey on social engineering attacks: Phishing
attack,” Proceeding - IEEE Int. Conf. Comput. Commun. Autom. ICCCA 2016, pp. 537–540, 2017.
[9] A. Karakasiliotis, S. M. Furnell, and M. Papadaki, “Assessing end-user awareness of social engineering
and phishing,” pp. 4–5, 2006.
[10] E. O. Yeboah-Boateng and P. M. Amanor, “Phishing , SMiShing & Vishing : An Assessment of
Threats against Mobile Devices,” J. Emerg. Trends Comput. Inf. Sci., vol. 5, no. 4, pp. 297–307, 2014.
[11] W. Wosinska, R. Cialdini, D. Barrett, and J. Reykowski, The practice of social influence in multiple
cultures. 2000.
[12] K. Ivaturi and L. Janczewski, “A Taxonomy for Social Engineering attacks,” Proc. CONF-IRM, 2011.