EconPapers    
Economics at your fingertips  
 

Leveraging Storm-breaker as a social Engineering Tool to Assess Penetration Levels and Develop Attack Prevention Strategies for Android and iOS Devices

Muhammed Umar Nmakatun, Salim Jibrin Danbatta, Umar Usman and Abdulwaheed Tawakaltu Opeyemi
Additional contact information
Muhammed Umar Nmakatun: Department of Computer Engineering Uskudar University, Turkey.
Salim Jibrin Danbatta: Department of Computer Engineering Uskudar University, Turkey.
Umar Usman: Department of Economics Usmanu Danfodiyo University Sokoto, Nigeria.
Abdulwaheed Tawakaltu Opeyemi: Ibrahim Badamasi Babangida University Lapai (IBBUL), Niger state, Nigeria.

Journal of Scientific Reports, 2025, vol. 9, issue 1, 251-260

Abstract: The internet has played a crucial role in fostering not just the local communication alone, but also international communication and is now dominated in people's daily communication channel all around the world. On the other hand, social engineering assaults have emerged as a key security concern in both the real and virtual spheres of cyber space. However, through some malicious programs, individuals are targeted by convincing them to reveal private information or do other activities that compromise security. This research uses online survey to assess the public level of awareness on the social attacks through malware programs. Out of 52 participants, only 42% recognizes the implication of the URL, in which most are educated and within the age of 25 years and above, the other 55.77% who are the victims are those whose educational levels are little or no educated at all, some of which are adult less than 25 years. Thus, the researchers suggest setting up a firewall to improve network security and motivate users to exercise greater caution when using the internet. The research also suggests how crucial it is to implement stronger security measures and increase user awareness. Collaboration with app developers, behavioral analysis, technical solutions, and user education are important initiatives. In order to teach people how to recognize and avoid free of suspicious activity, educational programs should emphasize raising awareness of social engineering and phishing attempts.

Keywords: Cyber-Attack; Cyber security; Social Engineering; Cyber Crime; Cyber Criminal; Storm-Breaker; Ethical Hacking (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://ijsab.com/wp-content/uploads/1107.pdf (application/pdf)
https://www.ijsab.com/jsr-volume-9-issue-1/8217 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aif:report:v:9:y:2025:i:1:p:251-260

DOI: 10.58970/JSR.1101

Access Statistics for this article

Journal of Scientific Reports is currently edited by Dr. Md Shamim Hossain

More articles in Journal of Scientific Reports from IJSAB International
Bibliographic data for series maintained by Farjana Rahman ().

 
Page updated 2025-09-18
Handle: RePEc:aif:report:v:9:y:2025:i:1:p:251-260