SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 476
Understanding Social Engineering and it’s impact on Merchant basedUPI
frauds.
Simran Jain
University of Mumbai Institute of Distance & Open Learning (IDOL)
Information Technology, University of Mumbai
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Social engineering cyberattacks are becoming an
increasing concern in the field of cybersecurity. This attack
uses psychological techniques to trick people into disclosing
sensitive information or performing actions that could
compromise the integrity of the system. In recent decades,
social engineering attacks have become more sophisticated,
making it harder for individuals and organizations to detect
and prevent them. With the increase in UPI based payment
usage, there is an exponential growth in UPI based frauds
primarily by using Social Engineering Techniques. Considering
this, our research was conducted to understand how these
social engineering attacks are executed by malicious party by
keeping merchant users of UPI as a prime target. This was
conducted by taking real examples of OR code manipulation
using watering hole concept of Social Engineering. We also
discuss how these social engineering attacks could be
prevented and UPI based payments could be made safer. This
is one of the studies in India to comprehensively understand
fraud and scams in UPI based payment models focusing
majorly on social engineering-based attacks on merchant
users of UPI-based payment apps and empirically investigate
factors driving the increasing frauds in this adopted model of
payment.
Key Words: Social Engineering, UPI, UPI Frauds, UPI
mechanism
1.INTRODUCTION
Social engineering is a type of attack that involves
manipulating people to obtain information orresources. It
is a kind of psychological tampering used to gain
unauthorized access to private data such as passwords,
credit card numbers, or other personally identifiable
information. Social engineering attacks arebecoming more
frequent since they’re simple to carry out and can be
difficult to detect. Refer Fig-1 to understand the Social
Engineering Lifecycle.
UPI a term that stands for Unified Payments interface.UPI
is a real-time online payments system developed and
maintained by the National Payments Corporationof India.
Its primary working protocol is that it allows users to
transfer funds between bank accounts instantly using an
active mobile device through a payment’s application.
According to Yash Madwanna et.[1],Dominant working
features of UPI is that it is a simple and secure method of
transferring money without the need for entering bank
details or IFSC codes. Users are assigned a virtual ID
(called UPI ID) which is linked to their bank account and
can be usedto make transactions.
Fig-1: Social Engineering Lifecycle
1.1 Banking based social engineering tactics.
This UPI scamming technique using smart social engineering
skills involves an email or text message that appears to be
from a legitimate bank, asking the recipient to click on a link
to log in, leads to a fake website where cybercriminals can
use this information to access the victim's real bank account
and steal money or sensitive information, is a common
example of banking-based phishing.[2]
Fig-2: Fraud phishing message disguised as a bank SMS.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 477
1.2 Phishing of Bank Websites & Emails
Cybercriminals frequently use tactics such as creating fake
email addresses that closely resemble the bank's official
email address, websites or including the bank's logo and
branding in the message to make the phishing message or
webpage appear more legitimate.
Fig-3: A legitimate bank website form.
Fig-4: A fraudster developed fake website form.
Individuals must be vigilant and cautious when receiving
unsolicited emails or communications from banks or
financial institutions. Individuals should never click on
links or download attachments from unsolicited emails or
text messages and should always verify the authenticity of
any requests for personal or financial information to avoid
falling victim to banking-based phishing attacks. Individuals
should also use strong, unique passwords for their online
accounts and enable two-factor authentication whenever
possible.
2. UPI & IT’S WORKING MECHANISM
The low-level working of Unified Payments Interface
payments involves various components and protocols such as
HTTP, SSL, TLS, and 2FA (Two-Factor Authentication) that
work in unison to ensure the secure and error free transfer of
funds between banks. An overview of steps involved is User
Registration where the user is registered and the bank
account is securely verified and linked to the user’s UPI
account, setting up a UPI pin for enabling transactions.
Similar process is followed for a merchant account willing to
setup their UPI account via QR code scanner. Further, a
Virtual Payment Address (VPA) is generated by a user’s or
merchant’s bank which is a unique identifier linked to their
bank account. Payment Initiation takes place from a
consumer side via their UPI application by entering merchant
VPA or by scanning their QR code which further queries a
request with order and payment details to the UPI interface.
A payment process is initiated with generation of payment
details. Upon these processes, the QR code scan process is
initiated. This enables direct payment service generation
from user UPI application to the UPI interface via PSP
(Payment service provider). Upon further verification of
payment from user. The NPCI switch receives the payment
request and opts to check for user account balance to ensure
sufficient funds, if sufficient funds are verified, the switch
forwards the user request to the bank for authentication.
Authentication step enables the bank account to send an
authentication request to the user’s mobile device and
prompts them to input their UPI pin. Further an authorization
check takes place where in the linked bank account
authorizes the payment and relays the process back to the
NPCI switch[3]. Further, the UPI initiates a status update
thread via webhook and provides it directly to the merchant.
Final step is generation of update query on the user side
which marks the end of a UPI payment cycle between user
and merchant. Low level working of the payment transaction
can be referred in Fig-5.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 478
Fig-5: Low level working of a UPI payment transcation
UPI (Unified Payments Interface) frauds using social
engineering are becoming a common trend now due to
increase in UPI users in the country. Frauds typically
involvea fraudster tricking a victim or merchant using UPI
QR codes into providing their UPI credentials, such as their
UPI PIN or UPI ID, through some form of social
manipulation. The social engineering-based attack to give
rise to UPI frauds in on high increase day by day. A normal
working of a UPI based socialengineering fraud includes an
attacker to lure the victims into visiting the fake site or
downloading the fake app by sending them phishing emails
or social media messages. Once the victims access the
fake UPI payment app or website, the attackers can steal
theirUPI PIN, password,orothersensitiveinformation. The
attackers can also use the fake app or website to
initiate fraudulent transactions from the victims' bank
accounts.
One trend in UPI frauds using social engineering is
targeted towards merchant accounts opting for UPI
payments usingQR code which is what our research paper
focuses on. A simple working of this technique is that a
user scans the QR code implanted by a merchant and
instantly gets account details of the user after which the
user can opt to enter the amount on their respective UPI
application and proceed to pay the merchant. As the
number of merchants opting for UPI based payments is
increasing, so is the commensurate amount of UPI based
frauds with these merchants.
2.1 How UPI frauds occur via social engineering
Fig-6: UPI id of a normal user
Fig-7: UPI id of a merchant user
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 479
3. The attacker then opts to replicate the QR code scanner
exactly as the shop owner’s scanner, only difference
would be that the attacker would replace the merchant’s
QR code with their own QR code.
4. This shall enable the payments directed for the
merchant to be redirected to the attackers account
instead.
6. The attacker takes advantage of this loophole to
successfully implement the social engineering attack
and thereby scamming the merchant opting for UPI
based payments.
5. One of the points to be noted for why this scam is
not easily detected by Merchants is the UPI name
that the merchant gets. It is a series of random
character set which is usually never readable and
can’t be memorised by a naïve user. Refer fig 7 for
the UPI id that has random characters generated to
maintain uniqueness.
2.2 Watering Hole Social Engineering Attack
Our primary focus is to analyze the trending social
engineering attack called Watering hole attack where the
primary targets are merchants. Thissocial engineering-based
attack works as follows:
1. The attacker locates the merchant shop and figures out
the UPI Scanner that the merchant is using.
2. Next, through a series of manipulation, often pretending
to be a technician from UPI payments company, they get
hold of the QR scanner.
Fig-8: Flow Diagram explaining QR code manipulation using Social Engineering
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 480
To combat social engineering-based UPI fraud, a fusion of
education, awareness, and technological solutions is a
mandatory. A few methodologies that could be followed
are:
1. Education and awareness: A form of combating could be
conducting educational seminars, awareness camps, and
educational camps for merchants for safer usage of UPI
application daily. This would enable the merchants to be
vigilant and aware users of UPI based payment
applications.
2. Two-factor authentication: An added layer of security in
the form of 2FA can be implied by the user which will give
an extra step of security in form of authentication and will
ensure that the added layer works to provide security to
the merchant account and prevent any fraudulent
transfers.
4. Collaboration & Use of technology: Collaboration
between individuals, merchant organizations, and law
enforcement agencies can help prevent and detect social
engineering-based UPI frauds. This includes sharing
information about new threats and collaborating on
strategies to identify and prevent these types of frauds.
Merchants can opt to use various technological solutions
such as Paytm soundbox, which upon successful
transaction, recites a full audio message of the amount
received thereby making the merchant aware and verify
the transaction that took place.
2.3 Defense against such social engineering attacks
3. Manual Verification: One of the loopholes that a hacker
takes advantage of using social engineering is the random
character generation upon payment, this could be
fraudulent transfer and can take advantage of the
merchant’s naivety. To ensure this doesn’t happen,
the merchant must ensure manual verification of the
payment received from the consumer, if any
suspicious activity is detected they should immediately
raise an issue at the UPI help center.
Individuals and organizations can reduce their risk
of falling victim to social engineering-based UPI
frauds and protect themselves from financial losses and
other negative consequences by implementing these
defense strategies.
3. CONCLUSION
In recent decades, UPI-based social engineering fraud has
become a growing concern. As more people depend on UPI-
based payment systems for financial transactions,
cybercriminals are developing new methods to exploit
vulnerabilities in these systems to commit fraud.
Additionally, UPI-based social engineering frauds can have
serious financial and personal consequences for victims.
Private citizens must be aware of the risks and take
precautions, such as verifying the authenticity of payment
requests and keeping their personal information secure.
Organizations and financial institutions should also take an
immediate measure to prevent and detectsocial engineering
fraud, such as monitoring for suspicious activity and
providing employees and customers with education and
training.
UPI-based social engineering cases of fraud are likely to
remain a severe risk as the digital economy continues to
grow. Individuals and organizations, on the other hand, can
minimize the likelihood of falling victim to these types of
scams by remaining vigilant and taking proactive measures.
[1] Yash Madwanna, Mayur Khadse, B R Chandavarkar,
"Security Issues of Unified Payments Interface and
Challenges: Case Study", 2021 2nd International
Conference on Secure Cyber Computing and
Communications (ICSCCC), pp.150-154, 2021.
[2] IANS. Attention! UPI, payments frauds soar high in
eastern Indian states: Report.
https://www.indiatvnews.com/business/news-upi-
paymentsfrauds-soar-high-in-eastern-indian-states-
report-701790, May 2021.
[3] NPCI. UPI live members. https://www.npci.org.in/
what-we-do/upi/live-members, 2022.
[4] NPCI. UPI third party apps. https://www.npci.org.in/
what-we-do/upi/3rd-party-apps, 2022.
[5] Aburrous, M., Hossain, M., Dahal, K., & Thabtah, F.
(2010). Intelligent phishing detection system for e-
banking using fuzzy data mining. Expert Systems with
Applications, 37(12), 7913-7921.
https://doi.org/10.1016/j.eswa.2010.04.044
REFERENCES
[6] Gupta, Nakul , Jhamb, Dharmender, “How India can
develop it’s fraud prevention model Journal of
Payments Strategy & Systems, Volume 14/Number3
/Autumn/Fall 2020, pp. 237-255(19)
[7] https://www.npci.org.in/
[8] Kumar, A., Choudhary, R. K., Mishra, S. K., Kar, S. K., &
Bansal, R. (2022). THE GROWTH TRAJECTORY OF UPI-
BASED MOBILE PAYMENTS IN INDIA: ENABLERS AND
INHIBITORS. Indian Journal of Finance and
Banking, 11(1), 45-59.
https://doi.org/10.46281/ijfb.v11i1.1855.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 481
[9] Zulkurnain, A.U.; Hamidy, A.K.B.; Husain, A.B.; Chizari, H.
Social engineering attack mitigation. Int. J. Math. Comput.
Sci. 2015, 1, 188–198.
[10] Parekh, S.; Parikh, D.; Kotak, S.; Sankhe, S. A new method
for detection of phishing websites: Url detection. In
Proceedings of the Second IEEE International
Conference on Inventive Communication and
Computational Technologies, Coimbatore, India, 20–21
April 2018; pp. 949–952.
[11] Charvi Vij, Shruti Keshari, "Study on Lexical Analysis of
Malicious URLs using Machine Learning", 2022 Fifth
International Conference on Computational Intelligence
and Communication Technologies (CCICT), pp.120-127,
2022.

More Related Content

Similar to Understanding Social Engineering and it’s impact on Merchant basedUPI frauds.

IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET-  	  Digital Tranquillity in Cheque Transaction SystemIRJET-  	  Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction SystemIRJET Journal
 
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
Unified Payment Interface (UPI) - A Way Towards Cashless EconomyUnified Payment Interface (UPI) - A Way Towards Cashless Economy
Unified Payment Interface (UPI) - A Way Towards Cashless EconomyIRJET Journal
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISRAHUL KUMAR
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSJournal For Research
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmIRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
Presentation Banking
Presentation BankingPresentation Banking
Presentation BankingRia Tandon
 
Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared ImagesIRJET Journal
 
IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form FillingIRJET Journal
 

Similar to Understanding Social Engineering and it’s impact on Merchant basedUPI frauds. (20)

IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET-  	  Digital Tranquillity in Cheque Transaction SystemIRJET-  	  Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction System
 
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
Unified Payment Interface (UPI) - A Way Towards Cashless EconomyUnified Payment Interface (UPI) - A Way Towards Cashless Economy
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Trends in Banking Part vII
Trends in Banking Part vIITrends in Banking Part vII
Trends in Banking Part vII
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Internet banking
Internet bankingInternet banking
Internet banking
 
e-banking
e-bankinge-banking
e-banking
 
Presentation Banking
Presentation BankingPresentation Banking
Presentation Banking
 
Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared Images
 
IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 

Recently uploaded (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 

Understanding Social Engineering and it’s impact on Merchant basedUPI frauds.

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 476 Understanding Social Engineering and it’s impact on Merchant basedUPI frauds. Simran Jain University of Mumbai Institute of Distance & Open Learning (IDOL) Information Technology, University of Mumbai ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Social engineering cyberattacks are becoming an increasing concern in the field of cybersecurity. This attack uses psychological techniques to trick people into disclosing sensitive information or performing actions that could compromise the integrity of the system. In recent decades, social engineering attacks have become more sophisticated, making it harder for individuals and organizations to detect and prevent them. With the increase in UPI based payment usage, there is an exponential growth in UPI based frauds primarily by using Social Engineering Techniques. Considering this, our research was conducted to understand how these social engineering attacks are executed by malicious party by keeping merchant users of UPI as a prime target. This was conducted by taking real examples of OR code manipulation using watering hole concept of Social Engineering. We also discuss how these social engineering attacks could be prevented and UPI based payments could be made safer. This is one of the studies in India to comprehensively understand fraud and scams in UPI based payment models focusing majorly on social engineering-based attacks on merchant users of UPI-based payment apps and empirically investigate factors driving the increasing frauds in this adopted model of payment. Key Words: Social Engineering, UPI, UPI Frauds, UPI mechanism 1.INTRODUCTION Social engineering is a type of attack that involves manipulating people to obtain information orresources. It is a kind of psychological tampering used to gain unauthorized access to private data such as passwords, credit card numbers, or other personally identifiable information. Social engineering attacks arebecoming more frequent since they’re simple to carry out and can be difficult to detect. Refer Fig-1 to understand the Social Engineering Lifecycle. UPI a term that stands for Unified Payments interface.UPI is a real-time online payments system developed and maintained by the National Payments Corporationof India. Its primary working protocol is that it allows users to transfer funds between bank accounts instantly using an active mobile device through a payment’s application. According to Yash Madwanna et.[1],Dominant working features of UPI is that it is a simple and secure method of transferring money without the need for entering bank details or IFSC codes. Users are assigned a virtual ID (called UPI ID) which is linked to their bank account and can be usedto make transactions. Fig-1: Social Engineering Lifecycle 1.1 Banking based social engineering tactics. This UPI scamming technique using smart social engineering skills involves an email or text message that appears to be from a legitimate bank, asking the recipient to click on a link to log in, leads to a fake website where cybercriminals can use this information to access the victim's real bank account and steal money or sensitive information, is a common example of banking-based phishing.[2] Fig-2: Fraud phishing message disguised as a bank SMS.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 477 1.2 Phishing of Bank Websites & Emails Cybercriminals frequently use tactics such as creating fake email addresses that closely resemble the bank's official email address, websites or including the bank's logo and branding in the message to make the phishing message or webpage appear more legitimate. Fig-3: A legitimate bank website form. Fig-4: A fraudster developed fake website form. Individuals must be vigilant and cautious when receiving unsolicited emails or communications from banks or financial institutions. Individuals should never click on links or download attachments from unsolicited emails or text messages and should always verify the authenticity of any requests for personal or financial information to avoid falling victim to banking-based phishing attacks. Individuals should also use strong, unique passwords for their online accounts and enable two-factor authentication whenever possible. 2. UPI & IT’S WORKING MECHANISM The low-level working of Unified Payments Interface payments involves various components and protocols such as HTTP, SSL, TLS, and 2FA (Two-Factor Authentication) that work in unison to ensure the secure and error free transfer of funds between banks. An overview of steps involved is User Registration where the user is registered and the bank account is securely verified and linked to the user’s UPI account, setting up a UPI pin for enabling transactions. Similar process is followed for a merchant account willing to setup their UPI account via QR code scanner. Further, a Virtual Payment Address (VPA) is generated by a user’s or merchant’s bank which is a unique identifier linked to their bank account. Payment Initiation takes place from a consumer side via their UPI application by entering merchant VPA or by scanning their QR code which further queries a request with order and payment details to the UPI interface. A payment process is initiated with generation of payment details. Upon these processes, the QR code scan process is initiated. This enables direct payment service generation from user UPI application to the UPI interface via PSP (Payment service provider). Upon further verification of payment from user. The NPCI switch receives the payment request and opts to check for user account balance to ensure sufficient funds, if sufficient funds are verified, the switch forwards the user request to the bank for authentication. Authentication step enables the bank account to send an authentication request to the user’s mobile device and prompts them to input their UPI pin. Further an authorization check takes place where in the linked bank account authorizes the payment and relays the process back to the NPCI switch[3]. Further, the UPI initiates a status update thread via webhook and provides it directly to the merchant. Final step is generation of update query on the user side which marks the end of a UPI payment cycle between user and merchant. Low level working of the payment transaction can be referred in Fig-5.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 478 Fig-5: Low level working of a UPI payment transcation UPI (Unified Payments Interface) frauds using social engineering are becoming a common trend now due to increase in UPI users in the country. Frauds typically involvea fraudster tricking a victim or merchant using UPI QR codes into providing their UPI credentials, such as their UPI PIN or UPI ID, through some form of social manipulation. The social engineering-based attack to give rise to UPI frauds in on high increase day by day. A normal working of a UPI based socialengineering fraud includes an attacker to lure the victims into visiting the fake site or downloading the fake app by sending them phishing emails or social media messages. Once the victims access the fake UPI payment app or website, the attackers can steal theirUPI PIN, password,orothersensitiveinformation. The attackers can also use the fake app or website to initiate fraudulent transactions from the victims' bank accounts. One trend in UPI frauds using social engineering is targeted towards merchant accounts opting for UPI payments usingQR code which is what our research paper focuses on. A simple working of this technique is that a user scans the QR code implanted by a merchant and instantly gets account details of the user after which the user can opt to enter the amount on their respective UPI application and proceed to pay the merchant. As the number of merchants opting for UPI based payments is increasing, so is the commensurate amount of UPI based frauds with these merchants. 2.1 How UPI frauds occur via social engineering Fig-6: UPI id of a normal user Fig-7: UPI id of a merchant user
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 479 3. The attacker then opts to replicate the QR code scanner exactly as the shop owner’s scanner, only difference would be that the attacker would replace the merchant’s QR code with their own QR code. 4. This shall enable the payments directed for the merchant to be redirected to the attackers account instead. 6. The attacker takes advantage of this loophole to successfully implement the social engineering attack and thereby scamming the merchant opting for UPI based payments. 5. One of the points to be noted for why this scam is not easily detected by Merchants is the UPI name that the merchant gets. It is a series of random character set which is usually never readable and can’t be memorised by a naïve user. Refer fig 7 for the UPI id that has random characters generated to maintain uniqueness. 2.2 Watering Hole Social Engineering Attack Our primary focus is to analyze the trending social engineering attack called Watering hole attack where the primary targets are merchants. Thissocial engineering-based attack works as follows: 1. The attacker locates the merchant shop and figures out the UPI Scanner that the merchant is using. 2. Next, through a series of manipulation, often pretending to be a technician from UPI payments company, they get hold of the QR scanner. Fig-8: Flow Diagram explaining QR code manipulation using Social Engineering
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 480 To combat social engineering-based UPI fraud, a fusion of education, awareness, and technological solutions is a mandatory. A few methodologies that could be followed are: 1. Education and awareness: A form of combating could be conducting educational seminars, awareness camps, and educational camps for merchants for safer usage of UPI application daily. This would enable the merchants to be vigilant and aware users of UPI based payment applications. 2. Two-factor authentication: An added layer of security in the form of 2FA can be implied by the user which will give an extra step of security in form of authentication and will ensure that the added layer works to provide security to the merchant account and prevent any fraudulent transfers. 4. Collaboration & Use of technology: Collaboration between individuals, merchant organizations, and law enforcement agencies can help prevent and detect social engineering-based UPI frauds. This includes sharing information about new threats and collaborating on strategies to identify and prevent these types of frauds. Merchants can opt to use various technological solutions such as Paytm soundbox, which upon successful transaction, recites a full audio message of the amount received thereby making the merchant aware and verify the transaction that took place. 2.3 Defense against such social engineering attacks 3. Manual Verification: One of the loopholes that a hacker takes advantage of using social engineering is the random character generation upon payment, this could be fraudulent transfer and can take advantage of the merchant’s naivety. To ensure this doesn’t happen, the merchant must ensure manual verification of the payment received from the consumer, if any suspicious activity is detected they should immediately raise an issue at the UPI help center. Individuals and organizations can reduce their risk of falling victim to social engineering-based UPI frauds and protect themselves from financial losses and other negative consequences by implementing these defense strategies. 3. CONCLUSION In recent decades, UPI-based social engineering fraud has become a growing concern. As more people depend on UPI- based payment systems for financial transactions, cybercriminals are developing new methods to exploit vulnerabilities in these systems to commit fraud. Additionally, UPI-based social engineering frauds can have serious financial and personal consequences for victims. Private citizens must be aware of the risks and take precautions, such as verifying the authenticity of payment requests and keeping their personal information secure. Organizations and financial institutions should also take an immediate measure to prevent and detectsocial engineering fraud, such as monitoring for suspicious activity and providing employees and customers with education and training. UPI-based social engineering cases of fraud are likely to remain a severe risk as the digital economy continues to grow. Individuals and organizations, on the other hand, can minimize the likelihood of falling victim to these types of scams by remaining vigilant and taking proactive measures. [1] Yash Madwanna, Mayur Khadse, B R Chandavarkar, "Security Issues of Unified Payments Interface and Challenges: Case Study", 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), pp.150-154, 2021. [2] IANS. Attention! UPI, payments frauds soar high in eastern Indian states: Report. https://www.indiatvnews.com/business/news-upi- paymentsfrauds-soar-high-in-eastern-indian-states- report-701790, May 2021. [3] NPCI. UPI live members. https://www.npci.org.in/ what-we-do/upi/live-members, 2022. [4] NPCI. UPI third party apps. https://www.npci.org.in/ what-we-do/upi/3rd-party-apps, 2022. [5] Aburrous, M., Hossain, M., Dahal, K., & Thabtah, F. (2010). Intelligent phishing detection system for e- banking using fuzzy data mining. Expert Systems with Applications, 37(12), 7913-7921. https://doi.org/10.1016/j.eswa.2010.04.044 REFERENCES [6] Gupta, Nakul , Jhamb, Dharmender, “How India can develop it’s fraud prevention model Journal of Payments Strategy & Systems, Volume 14/Number3 /Autumn/Fall 2020, pp. 237-255(19) [7] https://www.npci.org.in/ [8] Kumar, A., Choudhary, R. K., Mishra, S. K., Kar, S. K., & Bansal, R. (2022). THE GROWTH TRAJECTORY OF UPI- BASED MOBILE PAYMENTS IN INDIA: ENABLERS AND INHIBITORS. Indian Journal of Finance and Banking, 11(1), 45-59. https://doi.org/10.46281/ijfb.v11i1.1855.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 481 [9] Zulkurnain, A.U.; Hamidy, A.K.B.; Husain, A.B.; Chizari, H. Social engineering attack mitigation. Int. J. Math. Comput. Sci. 2015, 1, 188–198. [10] Parekh, S.; Parikh, D.; Kotak, S.; Sankhe, S. A new method for detection of phishing websites: Url detection. In Proceedings of the Second IEEE International Conference on Inventive Communication and Computational Technologies, Coimbatore, India, 20–21 April 2018; pp. 949–952. [11] Charvi Vij, Shruti Keshari, "Study on Lexical Analysis of Malicious URLs using Machine Learning", 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT), pp.120-127, 2022.