COMMON PHISHING ATTACKS IN KAZAKHSTAN AND WAYS TO PROTECT CITIZENS FROM INTERNET SCAMMERS
Keywords:
phishing attack, social engineering, malware-based phishing, phishing websites, phisher, internet, deceptive phishing, clone phishing.Abstract
This article examines common types of phishing attacks using Kazakhstan as an example, with the goal of raising awareness and suggesting effective protection measures against Internet scammers. The study analyzes the most popular phishing tactics used in the region. By identifying specific threats and vulnerabilities unique to Kazakhstan, the article strives to give readers a thorough understanding of the risks they face in the online environment. In addition to analyzing the situation with phishing, the article discusses preventive measures to protect citizens from such attacks. It provides practical insight into defense strategies, emphasizing both individual and collective efforts to improve cybersecurity resilience. The article is intended to provide readers with the knowledge necessary to recognize and mitigate potential threats. The findings and recommendations presented in this article serve as a valuable resource for individuals and businesses looking to strengthen their defenses against the ever-changing tactics used by online scammers.
References
State Technical Service Joint-stock company of Kazakhstan (2022). Итоговый дайджест АО «ГТС» за 2022 год. https://sts.kz/itogi-goda/
State Technical Service Joint-stock company of Kazakhstan (2023). Итоговый дайджест АО «ГТС» за 2023 год. https://sts.kz/itogi-goda/
Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future internet, 12(10), 168. , https://doi.org/10.3390/fi12100168
Alam, M. N., Sarma, D., Lima, F. F., Saha, I., Ulfath, R.-E.-, & Hossain, S. (2020). Phishing Attacks Detection using Machine Learning Approach. 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT).
https://doi.org/10.1109/icssit48917.2020.9214225
Huang, H., Tan, J., & Liu, L. (2009). Countermeasure Techniques for Deceptive Phishing Attack. 2009 International Conference on New Trends in Information and Service Science. https://doi.org/10.1109/niss.2009.80
Kumar, Mr & Gouda, Sandeepta. (2023). A comprehensive study of phishing attacks and their countermeasures. https://doi.org/10.13140/RG.2.2.36686.13120.
State Technical Service Joint-stock company of Kazakhstan (2023). Технический разбор инцидента с фальшивым обновлением NCALayer. https://sts.kz/2023/09/07/tehnicheskij-razbor-incidenta-s-falshivym-obnovleniem-ncalayer/
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Scientific journal of the Fergana State University

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Most read articles by the same author(s)
- Quvvatali Raximov, Maksadjon Onarkulov, Danagul Karimova, USING CLOUD TECHNOLOGIES IN SOFTWARE VULNERABILITY ANALYSIS , Scientific journal of the Fergana State University: No. 3 (2024): FarDU.Ilmiy xabarlar jurnali (Aniq va tabiiy fanlar)
- Quvvatali Raximov, Kaldijan Bulanov, Shavkat Ibragimov, EXPLORING THE EFFICIENCY OF OPEN-SOURCE TOOLS IN RETRIEVING UNCONVENTIONAL DELETED DATA , Scientific journal of the Fergana State University: No. 3 (2024): FarDU.Ilmiy xabarlar jurnali (Aniq va tabiiy fanlar)