Uncovering WhatsApp Fraud Modus Operandi Through Digital Artifact Analysis and Cyber Kill Chain Mapping
Abstract
Full Text:
PDFReferences
Oluwaseun Oladeji Olaniyi and Dagogo Sopriala Omubo, “WhatsApp Data Policy, Data Security and Users’ Vulnerability,” ijird, May 2023, doi: 10.24940/ijird/2023/v12/i4/apr23021.
N. Subramanian, G. Shobana, S. N. Bushra, and K. U. Maheswari, “A way to explore SMS: Social Media Scams for a secure Digi-world,” 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, pp. 647–651, Dec. 02, 2021. doi: 10.1109/iceca52323.2021.9676155.
S. Nishchal, “Forensic Analysis of WhatsApp: A Review of Techniques, Challenges, and Future Directions,” J Forensic Sci Res, vol. 8, no. 1, pp. 019–024, June 2024, doi: 10.29328/journal.jfsr.1001059.
A. Dimitriadis, N. Ivezic, B. Kulvatunyou, and I. Mavridis, “D4I - Digital forensics framework for reviewing and investigating cyber attacks,” Array, vol. 5, p. 100015, Mar. 2020, doi: 10.1016/j.array.2019.100015.
Y. Y. Lee, C. L. Gan, and T. W. Liew, “Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information,” IJERPH, vol. 20, no. 4, p. 3514, Feb. 2023, doi: 10.3390/ijerph20043514.
W. Meng, T. Giannetsos, and C. D. Jensen, “Information and Future Internet Security, Trust and Privacy,” Future Internet, vol. 14, no. 12, p. 372, Dec. 2022, doi: 10.3390/fi14120372.
G. Kim, U. Hur, S. Kang, and J. Kim, “Analyzing the Web and UWP versions of WhatsApp for digital forensics,” Forensic Science International: Digital Investigation, vol. 52, p. 301861, Mar. 2025, doi: 10.1016/j.fsidi.2024.301861.
J. Son, Y. W. Kim, D. B. Oh, and K. Kim, “Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema,” Forensic Science International: Digital Investigation, vol. 40, p. 301347, Mar. 2022, doi: 10.1016/j.fsidi.2022.301347.
D. Schmutz, R. Rapp, and B. Fehrensen, “Forensic analysis of hook Android malware,” Forensic Science International: Digital Investigation, vol. 49, p. 301769, June 2024, doi: 10.1016/j.fsidi.2024.301769.
P. Faruki, R. Bhan, V. Jain, S. Bhatia, N. El Madhoun, and R. Pamula, “A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks,” Information, vol. 14, no. 7, p. 374, June 2023, doi: 10.3390/info14070374.
C. Palma, A. Ferreira, and M. Figueiredo, “Explainable Machine Learning for Malware Detection on Android Applications,” Information, vol. 15, no. 1, p. 25, Jan. 2024, doi: 10.3390/info15010025.
T. Al lelah, G. Theodorakopoulos, P. Reinecke, A. Javed, and E. Anthi, “Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review,” JCP, vol. 3, no. 3, pp. 558–590, Sept. 2023, doi: 10.3390/jcp3030027.
H. Heath, Á. MacDermott, and A. Akinbi, “Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data?,” Forensic Science International: Digital Investigation, vol. 46, p. 301585, Sept. 2023, doi: 10.1016/j.fsidi.2023.301585.
DOI: https://doi.org/10.29040/ijcis.v6i3.254
Article Metrics
Abstract view : 9 timesPDF - 5 times
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License
















