Skip to main navigation menu Skip to main content Skip to site footer

Physics and technology

No. 3 (2024): FarDU.Ilmiy xabarlar jurnali (Aniq va tabiiy fanlar)

COMMON PHISHING ATTACKS IN KAZAKHSTAN AND WAYS TO PROTECT CITIZENS FROM INTERNET SCAMMERS

Submitted
July 27, 2024
Published
2024-07-29

Abstract

This article examines common types of phishing attacks using Kazakhstan as an example, with the goal of raising awareness and suggesting effective protection measures against Internet scammers. The study analyzes the most popular phishing tactics used in the region. By identifying specific threats and vulnerabilities unique to Kazakhstan, the article strives to give readers a thorough understanding of the risks they face in the online environment. In addition to analyzing the situation with phishing, the article discusses preventive measures to protect citizens from such attacks. It provides practical insight into defense strategies, emphasizing both individual and collective efforts to improve cybersecurity resilience. The article is intended to provide readers with the knowledge necessary to recognize and mitigate potential threats. The findings and recommendations presented in this article serve as a valuable resource for individuals and businesses looking to strengthen their defenses against the ever-changing tactics used by online scammers.

References

  1. State Technical Service Joint-stock company of Kazakhstan (2022). Итоговый дайджест АО «ГТС» за 2022 год. https://sts.kz/itogi-goda/
  2. State Technical Service Joint-stock company of Kazakhstan (2023). Итоговый дайджест АО «ГТС» за 2023 год. https://sts.kz/itogi-goda/
  3. Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future internet, 12(10), 168. , https://doi.org/10.3390/fi12100168
  4. Alam, M. N., Sarma, D., Lima, F. F., Saha, I., Ulfath, R.-E.-, & Hossain, S. (2020). Phishing Attacks Detection using Machine Learning Approach. 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT).
  5. https://doi.org/10.1109/icssit48917.2020.9214225
  6. Huang, H., Tan, J., & Liu, L. (2009). Countermeasure Techniques for Deceptive Phishing Attack. 2009 International Conference on New Trends in Information and Service Science. https://doi.org/10.1109/niss.2009.80
  7. Kumar, Mr & Gouda, Sandeepta. (2023). A comprehensive study of phishing attacks and their countermeasures. https://doi.org/10.13140/RG.2.2.36686.13120.
  8. State Technical Service Joint-stock company of Kazakhstan (2023). Технический разбор инцидента с фальшивым обновлением NCALayer. https://sts.kz/2023/09/07/tehnicheskij-razbor-incidenta-s-falshivym-obnovleniem-ncalayer/