Abstract: This paper presents a practical simulation of phishing-based financial fraud designed to replicate the attack flow typically used to compromise Unified Payments Interface (UPI) users. The simulation environment was developed within the Digital Forensics Division at CFSL, Hyderabad, and models a cloned interface of the PhonePe application to demonstrate how cybercriminals manipulate visual trust and interface mimicry to collect sensitive user data. The system is built using Python and the Flask framework for backend handling, with HTML and CSS for replicating the user-facing interface. Key features include real-time data capture of mobile numbers and OTPs, monitored......
Keywords: Phishing simulation; digital payment security; UPI phishing; cybersecurity awareness; OTP exploitation; ethical hacking; user credential harvesting; web-based fraud; tunnel-based spoofing; interface impersonation.
[1]
S. Sharma, “A Study On Factors Influencing The User Trust Towards Google Pay,”.
[2]
L. Burita, P. Matoulek, K. Halouzka, And P. Kozak, “Analysis Of Phishing Emails,” Aims Electron. Electr. Eng., Vol. 5, No. 1, Pp. 93–116, Mar. 2021, Doi: 10.3934/Electreng.2021006.
[3]
A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil, And K. Kifayat, “A Comprehensive Survey Of Ai-Enabled Phishing Attacks Detection Techniques,” Telecommun. Syst., Vol. 76, No. 1, Pp. 139–154, Jan. 2021, Doi: 10.1007/S11235-020-00733-2.
[4]
S. H. Apandi, J. Sallim, And R. M. Sidek, “Types Of Anti-Phishing Solutions For Phishing Attack,” In Iop Conf. Ser.: Mater. Sci. Eng., Vol. 769, Jun. 2020, Doi: 10.1088/1757-899x/769/1/012072.
[5]
A. Chaudhuri, “Clone Phishing: Attacks And Defenses,” Int. J. Sci. Res. Publ., Vol. 13, No. 4, Apr. 2023,
Doi: 10.29322/Ijsrp.13.04.2023.P13626.