|
Attack type | Definition | Purpose | Target network | References |
|
(A) Phishing attack | Phishing is a type of social engineering attack where attackers convince users to give their credential information through fake emails, fake messages, and phone calls | Steal users’ personal information, such as username, password, and financial information | WhatsApp, Facebook, and Instagram | [15] |
(B) Fake profile attack | False identities are used in sophisticated threats and are also used to launch other malicious operations | To establish trust with the victim and launch other malicious activities | WhatsApp, Facebook, Instagram, Twitter | [16] |
(C) Account compromise attack | By attacking users’ accounts, cybercriminals can spread their destructive messages or fake information to a big user base by taking control of the victim’s account | Attackers exploit the trust by compromising accounts and spreading malicious information from accounts that the victim trusts | WhatsApp, Facebook, Instagram, Twitter | [17] |
(D) Cyberbullying attack | Cyberbullying is the use of the internet, phone, or any other technology to send text or upload photos that embarrass or hurt a person | Intended to frighten, enrage, or shame individuals who are being targeted | WhatsApp, Facebook, Instagram, Twitter | [18] |
|