@inproceedings{10.1007/978-3-031-64171-8_6, author = {Tofighi, Mohammad Ali and Ousat, Behzad and Zandi, Javad and Schafir, Esteban and Kharraz, Amin}, title = {Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks}, year = {2024}, isbn = {978-3-031-64170-1}, publisher = {Springer-Verlag}, address = {Berlin, Heidelberg}, url = {https://doi.org/10.1007/978-3-031-64171-8_6}, doi = {10.1007/978-3-031-64171-8_6}, abstract = {Despite the increasing effort in the defense community to develop robust security solutions, social engineering attacks are getting more prevalent every year. Detecting fraudulent websites has been a concurrent task of both academia and industry in combating this type of attack. A common approach is to use supervised methods and labeled data to locate suspicious cases. In this paper, we evaluate a set of more common features related to the development and deployment aspects of websites that have been widely used in detecting scam and phishing websites over the years. As threat actors and the defense community are in a cat-and-mouse game, we aim to investigate whether such features are still prevalent or how to move forward in determining signs of malice when looking at the problem space at scale. Our study challenges the efficacy of deployment-based features, such as infrastructure providers or certificate issuers, in detecting fraudulent websites. Additionally, we perform an empirical analysis of the development aspects of websites that can be utilized in the detection pipeline.}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment: 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17–19, 2024, Proceedings}, pages = {107–127}, numpages = {21}, location = {Lausanne, Switzerland} }