Submit Search
Upload
Understanding Social Engineering and it’s impact on Merchant basedUPI frauds.
•
0 likes
•
4 views
IRJET Journal
Follow
https://www.irjet.net/archives/V10/i3/IRJET-V10I374.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET Journal
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
Secure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
ijtsrd
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
IRJET Journal
Recommended
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET Journal
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
Secure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
ijtsrd
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
UNVEILING THE WORLD OF ONLINE PAYMENT GATEWAYS
IRJET Journal
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET Journal
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET Journal
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
IRJET Journal
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
RAHUL KUMAR
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
Eswar Publications
Trends in Banking Part vII
Trends in Banking Part vII
anuppresentations
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET Journal
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
IRJET Journal
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
IRJET Journal
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
Journal For Research
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
IRJET Journal
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
Internet banking
Internet banking
Ranjeet Yadav
e-banking
e-banking
Anmol Marya
Presentation Banking
Presentation Banking
Ria Tandon
Online Secure payment System using shared Images
Online Secure payment System using shared Images
IRJET Journal
IRJET - Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Understanding Social Engineering and it’s impact on Merchant basedUPI frauds.
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET Journal
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET Journal
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
IRJET Journal
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
RAHUL KUMAR
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
Eswar Publications
Trends in Banking Part vII
Trends in Banking Part vII
anuppresentations
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET Journal
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
IRJET Journal
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
IRJET Journal
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
Journal For Research
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
IRJET Journal
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
Internet banking
Internet banking
Ranjeet Yadav
e-banking
e-banking
Anmol Marya
Presentation Banking
Presentation Banking
Ria Tandon
Online Secure payment System using shared Images
Online Secure payment System using shared Images
IRJET Journal
IRJET - Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
IRJET Journal
Similar to Understanding Social Engineering and it’s impact on Merchant basedUPI frauds.
(20)
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction System
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
Unified Payment Interface (UPI) - A Way Towards Cashless Economy
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
Trends in Banking Part vII
Trends in Banking Part vII
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
Internet banking
Internet banking
e-banking
e-banking
Presentation Banking
Presentation Banking
Online Secure payment System using shared Images
Online Secure payment System using shared Images
IRJET - Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kamal Acharya
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Ramkumar k
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
jabtakhaidam7
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
vershagrag
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Employee leave management system project.
Employee leave management system project.
Kamal Acharya
Hospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
drmkjayanthikannan
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
rouholahahmadi9876
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Call Girls Mumbai
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
MuhammadAsimMuhammad6
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
JIT KUMAR GUPTA
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Amil baba
Recently uploaded
(20)
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Employee leave management system project.
Employee leave management system project.
Hospital management system project report.pdf
Hospital management system project report.pdf
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Understanding Social Engineering and it’s impact on Merchant basedUPI frauds.
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 476 Understanding Social Engineering and it’s impact on Merchant basedUPI frauds. Simran Jain University of Mumbai Institute of Distance & Open Learning (IDOL) Information Technology, University of Mumbai ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Social engineering cyberattacks are becoming an increasing concern in the field of cybersecurity. This attack uses psychological techniques to trick people into disclosing sensitive information or performing actions that could compromise the integrity of the system. In recent decades, social engineering attacks have become more sophisticated, making it harder for individuals and organizations to detect and prevent them. With the increase in UPI based payment usage, there is an exponential growth in UPI based frauds primarily by using Social Engineering Techniques. Considering this, our research was conducted to understand how these social engineering attacks are executed by malicious party by keeping merchant users of UPI as a prime target. This was conducted by taking real examples of OR code manipulation using watering hole concept of Social Engineering. We also discuss how these social engineering attacks could be prevented and UPI based payments could be made safer. This is one of the studies in India to comprehensively understand fraud and scams in UPI based payment models focusing majorly on social engineering-based attacks on merchant users of UPI-based payment apps and empirically investigate factors driving the increasing frauds in this adopted model of payment. Key Words: Social Engineering, UPI, UPI Frauds, UPI mechanism 1.INTRODUCTION Social engineering is a type of attack that involves manipulating people to obtain information orresources. It is a kind of psychological tampering used to gain unauthorized access to private data such as passwords, credit card numbers, or other personally identifiable information. Social engineering attacks arebecoming more frequent since they’re simple to carry out and can be difficult to detect. Refer Fig-1 to understand the Social Engineering Lifecycle. UPI a term that stands for Unified Payments interface.UPI is a real-time online payments system developed and maintained by the National Payments Corporationof India. Its primary working protocol is that it allows users to transfer funds between bank accounts instantly using an active mobile device through a payment’s application. According to Yash Madwanna et.[1],Dominant working features of UPI is that it is a simple and secure method of transferring money without the need for entering bank details or IFSC codes. Users are assigned a virtual ID (called UPI ID) which is linked to their bank account and can be usedto make transactions. Fig-1: Social Engineering Lifecycle 1.1 Banking based social engineering tactics. This UPI scamming technique using smart social engineering skills involves an email or text message that appears to be from a legitimate bank, asking the recipient to click on a link to log in, leads to a fake website where cybercriminals can use this information to access the victim's real bank account and steal money or sensitive information, is a common example of banking-based phishing.[2] Fig-2: Fraud phishing message disguised as a bank SMS.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 477 1.2 Phishing of Bank Websites & Emails Cybercriminals frequently use tactics such as creating fake email addresses that closely resemble the bank's official email address, websites or including the bank's logo and branding in the message to make the phishing message or webpage appear more legitimate. Fig-3: A legitimate bank website form. Fig-4: A fraudster developed fake website form. Individuals must be vigilant and cautious when receiving unsolicited emails or communications from banks or financial institutions. Individuals should never click on links or download attachments from unsolicited emails or text messages and should always verify the authenticity of any requests for personal or financial information to avoid falling victim to banking-based phishing attacks. Individuals should also use strong, unique passwords for their online accounts and enable two-factor authentication whenever possible. 2. UPI & IT’S WORKING MECHANISM The low-level working of Unified Payments Interface payments involves various components and protocols such as HTTP, SSL, TLS, and 2FA (Two-Factor Authentication) that work in unison to ensure the secure and error free transfer of funds between banks. An overview of steps involved is User Registration where the user is registered and the bank account is securely verified and linked to the user’s UPI account, setting up a UPI pin for enabling transactions. Similar process is followed for a merchant account willing to setup their UPI account via QR code scanner. Further, a Virtual Payment Address (VPA) is generated by a user’s or merchant’s bank which is a unique identifier linked to their bank account. Payment Initiation takes place from a consumer side via their UPI application by entering merchant VPA or by scanning their QR code which further queries a request with order and payment details to the UPI interface. A payment process is initiated with generation of payment details. Upon these processes, the QR code scan process is initiated. This enables direct payment service generation from user UPI application to the UPI interface via PSP (Payment service provider). Upon further verification of payment from user. The NPCI switch receives the payment request and opts to check for user account balance to ensure sufficient funds, if sufficient funds are verified, the switch forwards the user request to the bank for authentication. Authentication step enables the bank account to send an authentication request to the user’s mobile device and prompts them to input their UPI pin. Further an authorization check takes place where in the linked bank account authorizes the payment and relays the process back to the NPCI switch[3]. Further, the UPI initiates a status update thread via webhook and provides it directly to the merchant. Final step is generation of update query on the user side which marks the end of a UPI payment cycle between user and merchant. Low level working of the payment transaction can be referred in Fig-5.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 478 Fig-5: Low level working of a UPI payment transcation UPI (Unified Payments Interface) frauds using social engineering are becoming a common trend now due to increase in UPI users in the country. Frauds typically involvea fraudster tricking a victim or merchant using UPI QR codes into providing their UPI credentials, such as their UPI PIN or UPI ID, through some form of social manipulation. The social engineering-based attack to give rise to UPI frauds in on high increase day by day. A normal working of a UPI based socialengineering fraud includes an attacker to lure the victims into visiting the fake site or downloading the fake app by sending them phishing emails or social media messages. Once the victims access the fake UPI payment app or website, the attackers can steal theirUPI PIN, password,orothersensitiveinformation. The attackers can also use the fake app or website to initiate fraudulent transactions from the victims' bank accounts. One trend in UPI frauds using social engineering is targeted towards merchant accounts opting for UPI payments usingQR code which is what our research paper focuses on. A simple working of this technique is that a user scans the QR code implanted by a merchant and instantly gets account details of the user after which the user can opt to enter the amount on their respective UPI application and proceed to pay the merchant. As the number of merchants opting for UPI based payments is increasing, so is the commensurate amount of UPI based frauds with these merchants. 2.1 How UPI frauds occur via social engineering Fig-6: UPI id of a normal user Fig-7: UPI id of a merchant user
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 479 3. The attacker then opts to replicate the QR code scanner exactly as the shop owner’s scanner, only difference would be that the attacker would replace the merchant’s QR code with their own QR code. 4. This shall enable the payments directed for the merchant to be redirected to the attackers account instead. 6. The attacker takes advantage of this loophole to successfully implement the social engineering attack and thereby scamming the merchant opting for UPI based payments. 5. One of the points to be noted for why this scam is not easily detected by Merchants is the UPI name that the merchant gets. It is a series of random character set which is usually never readable and can’t be memorised by a naïve user. Refer fig 7 for the UPI id that has random characters generated to maintain uniqueness. 2.2 Watering Hole Social Engineering Attack Our primary focus is to analyze the trending social engineering attack called Watering hole attack where the primary targets are merchants. Thissocial engineering-based attack works as follows: 1. The attacker locates the merchant shop and figures out the UPI Scanner that the merchant is using. 2. Next, through a series of manipulation, often pretending to be a technician from UPI payments company, they get hold of the QR scanner. Fig-8: Flow Diagram explaining QR code manipulation using Social Engineering
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 480 To combat social engineering-based UPI fraud, a fusion of education, awareness, and technological solutions is a mandatory. A few methodologies that could be followed are: 1. Education and awareness: A form of combating could be conducting educational seminars, awareness camps, and educational camps for merchants for safer usage of UPI application daily. This would enable the merchants to be vigilant and aware users of UPI based payment applications. 2. Two-factor authentication: An added layer of security in the form of 2FA can be implied by the user which will give an extra step of security in form of authentication and will ensure that the added layer works to provide security to the merchant account and prevent any fraudulent transfers. 4. Collaboration & Use of technology: Collaboration between individuals, merchant organizations, and law enforcement agencies can help prevent and detect social engineering-based UPI frauds. This includes sharing information about new threats and collaborating on strategies to identify and prevent these types of frauds. Merchants can opt to use various technological solutions such as Paytm soundbox, which upon successful transaction, recites a full audio message of the amount received thereby making the merchant aware and verify the transaction that took place. 2.3 Defense against such social engineering attacks 3. Manual Verification: One of the loopholes that a hacker takes advantage of using social engineering is the random character generation upon payment, this could be fraudulent transfer and can take advantage of the merchant’s naivety. To ensure this doesn’t happen, the merchant must ensure manual verification of the payment received from the consumer, if any suspicious activity is detected they should immediately raise an issue at the UPI help center. Individuals and organizations can reduce their risk of falling victim to social engineering-based UPI frauds and protect themselves from financial losses and other negative consequences by implementing these defense strategies. 3. CONCLUSION In recent decades, UPI-based social engineering fraud has become a growing concern. As more people depend on UPI- based payment systems for financial transactions, cybercriminals are developing new methods to exploit vulnerabilities in these systems to commit fraud. Additionally, UPI-based social engineering frauds can have serious financial and personal consequences for victims. Private citizens must be aware of the risks and take precautions, such as verifying the authenticity of payment requests and keeping their personal information secure. Organizations and financial institutions should also take an immediate measure to prevent and detectsocial engineering fraud, such as monitoring for suspicious activity and providing employees and customers with education and training. UPI-based social engineering cases of fraud are likely to remain a severe risk as the digital economy continues to grow. Individuals and organizations, on the other hand, can minimize the likelihood of falling victim to these types of scams by remaining vigilant and taking proactive measures. [1] Yash Madwanna, Mayur Khadse, B R Chandavarkar, "Security Issues of Unified Payments Interface and Challenges: Case Study", 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), pp.150-154, 2021. [2] IANS. Attention! UPI, payments frauds soar high in eastern Indian states: Report. https://www.indiatvnews.com/business/news-upi- paymentsfrauds-soar-high-in-eastern-indian-states- report-701790, May 2021. [3] NPCI. UPI live members. https://www.npci.org.in/ what-we-do/upi/live-members, 2022. [4] NPCI. UPI third party apps. https://www.npci.org.in/ what-we-do/upi/3rd-party-apps, 2022. [5] Aburrous, M., Hossain, M., Dahal, K., & Thabtah, F. (2010). Intelligent phishing detection system for e- banking using fuzzy data mining. Expert Systems with Applications, 37(12), 7913-7921. https://doi.org/10.1016/j.eswa.2010.04.044 REFERENCES [6] Gupta, Nakul , Jhamb, Dharmender, “How India can develop it’s fraud prevention model Journal of Payments Strategy & Systems, Volume 14/Number3 /Autumn/Fall 2020, pp. 237-255(19) [7] https://www.npci.org.in/ [8] Kumar, A., Choudhary, R. K., Mishra, S. K., Kar, S. K., & Bansal, R. (2022). THE GROWTH TRAJECTORY OF UPI- BASED MOBILE PAYMENTS IN INDIA: ENABLERS AND INHIBITORS. Indian Journal of Finance and Banking, 11(1), 45-59. https://doi.org/10.46281/ijfb.v11i1.1855.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 481 [9] Zulkurnain, A.U.; Hamidy, A.K.B.; Husain, A.B.; Chizari, H. Social engineering attack mitigation. Int. J. Math. Comput. Sci. 2015, 1, 188–198. [10] Parekh, S.; Parikh, D.; Kotak, S.; Sankhe, S. A new method for detection of phishing websites: Url detection. In Proceedings of the Second IEEE International Conference on Inventive Communication and Computational Technologies, Coimbatore, India, 20–21 April 2018; pp. 949–952. [11] Charvi Vij, Shruti Keshari, "Study on Lexical Analysis of Malicious URLs using Machine Learning", 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT), pp.120-127, 2022.
Download now