Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover

The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities using their mobile gadgets. Penetration of the Internet and mobile use is increased as lockdowns or restrictions on meeting face to face are getting used to. This has become a new market for cyber cri...

Full description

Bibliographic Details
Main Authors: Aldiansah Prayogi, Rizal Fathoni Aji
Format: Article
Language:English
Published: Ikatan Ahli Informatika Indonesia 2023-08-01
Series:Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
Subjects:
Online Access:http://jurnal.iaii.or.id/index.php/RESTI/article/view/5025
_version_ 1797330448816275456
author Aldiansah Prayogi
Rizal Fathoni Aji
author_facet Aldiansah Prayogi
Rizal Fathoni Aji
author_sort Aldiansah Prayogi
collection DOAJ
description The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities using their mobile gadgets. Penetration of the Internet and mobile use is increased as lockdowns or restrictions on meeting face to face are getting used to. This has become a new market for cyber criminals to carry out their actions, such as spreading Social Engineering, sending Phishing, doing Account Takeover, and ending in theft of money in Financial Mobile Applications. Application protection with OTP SMS and Magic Link SMS still has vulnerabilities, with several examples of cases that have occurred. For this reason, this problem was raised to find a solution using the Mobile Network Infrastructure. The method used is to compare the congruence between the phone numbers registered in the application and the phone numbers used. Every time a user signs in or signs up, the Financial Mobile Application will perform Mobile Network Verification to cellular operators via API. Verification is carried out by utilizing the header enrichment in the background of the application process that was installed on the user's smartphone or tablet to the Mobile Network Verification Server. The Financial Mobile Applications can then determine whether the user is using a valid or invalid telephone number. Therefore, the target account cannot be taken over because the cyber criminal's mobile device does not have the phone number attached to the victim’s mobile device. This proof is carried out with four test case scenarios with the sign-up and sign-in processes on the same phone number and different phone numbers between devices and applications. It is hoped that this kind of protection model can reduce losses experienced by users of Financial Mobile Applications due to Account Takeover.
first_indexed 2024-03-08T07:19:59Z
format Article
id doaj.art-06470978cbc24e4bac2ce941c6195c08
institution Directory Open Access Journal
issn 2580-0760
language English
last_indexed 2024-03-08T07:19:59Z
publishDate 2023-08-01
publisher Ikatan Ahli Informatika Indonesia
record_format Article
series Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
spelling doaj.art-06470978cbc24e4bac2ce941c6195c082024-02-02T23:44:04ZengIkatan Ahli Informatika IndonesiaJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)2580-07602023-08-017479780810.29207/resti.v7i4.50255025Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account TakeoverAldiansah Prayogi0Rizal Fathoni Aji1Universitas IndonesiaUniversitas IndonesiaThe Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities using their mobile gadgets. Penetration of the Internet and mobile use is increased as lockdowns or restrictions on meeting face to face are getting used to. This has become a new market for cyber criminals to carry out their actions, such as spreading Social Engineering, sending Phishing, doing Account Takeover, and ending in theft of money in Financial Mobile Applications. Application protection with OTP SMS and Magic Link SMS still has vulnerabilities, with several examples of cases that have occurred. For this reason, this problem was raised to find a solution using the Mobile Network Infrastructure. The method used is to compare the congruence between the phone numbers registered in the application and the phone numbers used. Every time a user signs in or signs up, the Financial Mobile Application will perform Mobile Network Verification to cellular operators via API. Verification is carried out by utilizing the header enrichment in the background of the application process that was installed on the user's smartphone or tablet to the Mobile Network Verification Server. The Financial Mobile Applications can then determine whether the user is using a valid or invalid telephone number. Therefore, the target account cannot be taken over because the cyber criminal's mobile device does not have the phone number attached to the victim’s mobile device. This proof is carried out with four test case scenarios with the sign-up and sign-in processes on the same phone number and different phone numbers between devices and applications. It is hoped that this kind of protection model can reduce losses experienced by users of Financial Mobile Applications due to Account Takeover.http://jurnal.iaii.or.id/index.php/RESTI/article/view/5025sms otp vulnerabilitymobile network verificationheader enrichmentaccount takeover prevention
spellingShingle Aldiansah Prayogi
Rizal Fathoni Aji
Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
sms otp vulnerability
mobile network verification
header enrichment
account takeover prevention
title Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover
title_full Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover
title_fullStr Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover
title_full_unstemmed Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover
title_short Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover
title_sort utilization of mobile network infrastructure to prevent financial mobile application account takeover
topic sms otp vulnerability
mobile network verification
header enrichment
account takeover prevention
url http://jurnal.iaii.or.id/index.php/RESTI/article/view/5025
work_keys_str_mv AT aldiansahprayogi utilizationofmobilenetworkinfrastructuretopreventfinancialmobileapplicationaccounttakeover
AT rizalfathoniaji utilizationofmobilenetworkinfrastructuretopreventfinancialmobileapplicationaccounttakeover