{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:22:02Z","timestamp":1776097322725,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research (BMBF grant)","award":["BMBF Grant 16KIS1900 (UbiTrans)"],"award-info":[{"award-number":["BMBF Grant 16KIS1900 (UbiTrans)"]}]},{"name":"EU?NGEU National Sustainable Mobility Center","award":["CN00000023"],"award-info":[{"award-number":["CN00000023"]}]},{"name":"Italian Ministry of University and Research","award":["Decree n. 1033?17\/06\/2022 (Spoke 10)"],"award-info":[{"award-number":["Decree n. 1033?17\/06\/2022 (Spoke 10)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714634","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:47:11Z","timestamp":1745362031000},"page":"3968-3981","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Pirates of Charity: Exploring Donation-based Abuses in Social Media Platforms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3663-152X","authenticated-orcid":false,"given":"Bhupendra","family":"Acharya","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5125-2290","authenticated-orcid":false,"given":"Dario","family":"Lazzaro","sequence":"additional","affiliation":[{"name":"University of Genoa, Genoa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3807-6417","authenticated-orcid":false,"given":"Antonio Emanuele","family":"Cin\u00e0","sequence":"additional","affiliation":[{"name":"University of Genoa, Genoa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2783-1264","authenticated-orcid":false,"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Antonio Emanuele Cin\u00e0, and Thorsten Holz","author":"Acharya Bhupendra","year":"2024","unstructured":"Bhupendra Acharya, Dario Lazzaro, Antonio Emanuele Cin\u00e0, and Thorsten Holz. 2024. Pirates of Charity: Exploring Donation-based Abuses in Social Media Platforms (extended version). In arXiv 2412.15621."},{"key":"e_1_3_2_1_2_1","volume-title":"Lea Sch\u00f6nherr, and Thorsten Holz.","author":"Acharya Bhupendra","year":"2024","unstructured":"Bhupendra Acharya, Dario Lazzaro, Efr\u00e9n L\u00f3pez-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cin\u00e0, Lea Sch\u00f6nherr, and Thorsten Holz. 2024. The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms. In USENIX Security."},{"key":"e_1_3_2_1_3_1","volume-title":"Lea Sch\u00f6nherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, and Thorsten Holz.","author":"Acharya Bhupendra","year":"2024","unstructured":"Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cin\u00e0, Lea Sch\u00f6nherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, and Thorsten Holz. 2024. Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. IEEE Security and Privacy (IEEE S&P)."},{"key":"e_1_3_2_1_4_1","unstructured":"Bhupendra Acharya and Phani Vadrevu. 2021. {PhishPrint}: Evading phishing detection crawlers by prior profiling. In USENIX Security."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"key":"e_1_3_2_1_6_1","volume-title":"Fraud: The characteristic crime of the twenty-first century. Trends in Organized Crime.","author":"Albanese Jay S","year":"2005","unstructured":"Jay S Albanese. 2005. Fraud: The characteristic crime of the twenty-first century. Trends in Organized Crime."},{"key":"e_1_3_2_1_7_1","volume-title":"The Rise of AI Is Creating a Rise in Scams on Social Media. Retrieved","author":"Ali Zunaid","year":"2025","unstructured":"Zunaid Ali. 2006. The Rise of AI Is Creating a Rise in Scams on Social Media. Retrieved February 5, 2025 from https:\/\/www.howtogeek.com\/the-rise-of-ai-iscreating-a-rise-in-scams-on-social-media\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Text and Email Scams to Watch for","author":"Amato Diane","year":"2024","unstructured":"Diane Amato. 2024. Text and Email Scams to Watch for in 2024. https:\/\/www.rbcroyalbank.com\/en-ca\/my-money-matters\/money-academy\/cyber-security\/u nderstanding-cyber-security\/text-and-email-scams-to-watch-for-in-2024\/."},{"key":"e_1_3_2_1_9_1","unstructured":"IPQuality Email Validation API. 2011. Email Validation API Documentation. https: \/\/www.ipqualityscore.com\/documentation\/email-validation-api\/overview."},{"key":"e_1_3_2_1_10_1","unstructured":"IPQuality Phone Validation API. 2024. Phone Validation API Documentation. https:\/\/www.ipqualityscore.com\/documentation\/phone-number-validationapi\/ overview."},{"key":"e_1_3_2_1_11_1","unstructured":"Apify. 2024. Apify Instagram Scraper API. https:\/\/apify.com\/apify\/instagramscraper."},{"key":"e_1_3_2_1_12_1","unstructured":"Apify. 2024. Facebook Scraper. https:\/\/apify.com\/apify\/facebook-posts-scraper."},{"key":"e_1_3_2_1_13_1","unstructured":"Apify. 2024. YouTube Scraper. https:\/\/apify.com\/streamers\/youtube-scraper."},{"key":"e_1_3_2_1_14_1","unstructured":"AT&T. 2024. Social Media Charity Scam. https:\/\/about.att.com\/pages\/cyberawa re\/ar\/social-media-charity-scam."},{"key":"e_1_3_2_1_15_1","unstructured":"Greg Bowyer. 2016. CLD2-CFFI -- Python (CFFI) Bindings for Compact Language Detector 2. https:\/\/github.com\/GregBowyer\/cld2-cffi."},{"key":"e_1_3_2_1_16_1","unstructured":"Christopher Boyd. 2022. Beware of fake Twitter philanthropists offering to put $750 into your Cash App account. https:\/\/www.malwarebytes.com\/blog\/news\/2 022\/04\/beware-of-fake-twitter-philanthropists-offering-750-for-your-cashapp-account."},{"key":"e_1_3_2_1_17_1","unstructured":"Mike Britton. 2023. Attackers Exploit Middle East Crisis to Solicit Fraudulent Cryptocurrency Donations for Children. https:\/\/abnormalsecurity.com\/blog\/atta ckers-exploit-middle-east-crisis-solicit-cryptocurrency-donations."},{"key":"e_1_3_2_1_18_1","unstructured":"CAF. 2024. Why Charities Should be Cyber-Aware. https:\/\/www.cafonline.org\/ about-us\/security-centre\/be-aware--current-threats\/scam-emails."},{"key":"e_1_3_2_1_19_1","unstructured":"Gina Chow. 2024. Trumped Up Crypto Scams -- Criminals Deploy Trump Donation Scams. https:\/\/www.netcraft.com\/blog\/trumped-up-crypto-donationscams\/."},{"key":"e_1_3_2_1_20_1","unstructured":"CNBC. 2022. Fake charities can be almost impossible to spot. Here's how to make sure your donations get to the right place. https:\/\/www.cnbc.com\/2022\/07\/07\/ho w-to-avoid-charity-impersonation-scams-in-times-of-crisis.html."},{"key":"e_1_3_2_1_21_1","unstructured":"New Castle City Council. 2024. Charity donation fraud. https:\/\/newcastl e.gov.uk\/services\/business-and-commerce\/business-commerce\/tradingstandards\/campaigns\/charity-donation-fraud."},{"key":"e_1_3_2_1_22_1","unstructured":"Brian Dean. 2024. Social Network Usage & Growth Statistics: How Many People Use Social Media in 2024? https:\/\/backlinko.com\/social-media-users."},{"key":"e_1_3_2_1_23_1","unstructured":"Fast Company Middle East. 2023. Fake donation emails and websites rise amid the Israel-Hamas war. https:\/\/fastcompanyme.com\/news\/fake-donation-emailsand-websites-rise-amid-the-israel-hamas-war\/."},{"key":"e_1_3_2_1_24_1","unstructured":"FBI. 2024. Charity and Disaster Fraud. https:\/\/www.fbi.gov\/how-we-can-helpyou\/ scams-and-safety\/common-scams-and-crimes\/charity-and-disaster-fraud."},{"key":"e_1_3_2_1_25_1","unstructured":"Emma Fletcher. 2023. Social media: a golden goose for scammers. https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/10\/social-mediagolden-goose-scammers."},{"key":"e_1_3_2_1_26_1","unstructured":"FTC. 2024. Charity Fraud. https:\/\/consumer.ftc.gov\/features\/pass-it-on\/charityfraud."},{"key":"e_1_3_2_1_27_1","unstructured":"FTC. 2024. Scam 'Charities' Will Take Your Money and Run. https:\/\/www.fcc.go v\/scam-charities-will-take-your-money-and-run."},{"key":"e_1_3_2_1_28_1","volume-title":"ERA Forum","author":"Gillespie Alisdair A","unstructured":"Alisdair A Gillespie and Samantha Magor. 2020. Tackling online fraud. In ERA Forum. Springer."},{"key":"e_1_3_2_1_29_1","unstructured":"Scam Donation Github. 2024. Code\/Data Share. https:\/\/github.com\/CISPASysSec\/ scam_donation."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"Maarten Grootendorst. 2020. KeyBERT: Minimal keyword extraction with BERT.. https:\/\/doi.org\/10.5281\/zenodo.4461265. Zenodo.","DOI":"10.5281\/zenodo.4461265"},{"key":"e_1_3_2_1_31_1","volume-title":"BERTopic: Neural topic modeling with a class-based TF-IDF procedure. arXiv preprint arXiv:2203.05794","author":"Grootendorst Maarten","year":"2022","unstructured":"Maarten Grootendorst. 2022. BERTopic: Neural topic modeling with a class-based TF-IDF procedure. arXiv preprint arXiv:2203.05794 (2022)."},{"key":"e_1_3_2_1_32_1","unstructured":"Matthew L. Gutzwiller. 2024. Spotting Charity Scams: How to Give Safely. https:\/\/www.cshco.com\/articles\/spotting-charity-scams\/."},{"key":"e_1_3_2_1_33_1","volume-title":"The Elements of Statistical Learning: Data Mining, Inference, and Prediction","author":"Hastie Trevor","unstructured":"Trevor Hastie, Jerome H. Friedman, and Robert Tibshirani. 2001. The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Springer."},{"key":"e_1_3_2_1_34_1","volume-title":"Analyzing Ground-Truth Data of Mobile Gambling Scams. In IEEE Symposium on Security and Privacy (IEEE S&P).","author":"Hong Geng","year":"2021","unstructured":"Geng Hong, Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang, and Haixin Duan. 2021. Analyzing Ground-Truth Data of Mobile Gambling Scams. In IEEE Symposium on Security and Privacy (IEEE S&P)."},{"key":"e_1_3_2_1_35_1","volume-title":"Dirty Dozen: IRS warns of scammers using fake charities to exploit taxpayers. https:\/\/www.irs.gov\/newsroom\/dirty-dozen-irs-warns-of-scammersusing-fake-charities-to-exploit-taxpayers.","author":"IRS.","year":"2023","unstructured":"IRS. 2023. Dirty Dozen: IRS warns of scammers using fake charities to exploit taxpayers. https:\/\/www.irs.gov\/newsroom\/dirty-dozen-irs-warns-of-scammersusing-fake-charities-to-exploit-taxpayers."},{"key":"e_1_3_2_1_36_1","unstructured":"Marguerite Keane. 2024. Charity Fraud. https:\/\/www.britannica.com\/money\/cha rity-fraud."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621913"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24060"},{"key":"e_1_3_2_1_39_1","volume-title":"Get Scammed: Characterizing Comment Scams on Media Platforms. Network and Distributed System Security Symposium (NDSS).","author":"Li Xigao","year":"2024","unstructured":"Xigao Li, Amir Rahmati, and Nick Nikiforakis. 2024. Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms. Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_40_1","unstructured":"Xigao Li Anurag Yepuri and Nick Nikiforakis. 2023. Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams. In Network and Distributed Systems Security (NDSS)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00011"},{"key":"e_1_3_2_1_42_1","volume-title":"Towards quantifying visual similarity of domain names for combating typosquatting abuse","author":"Liu Tingwen","unstructured":"Tingwen Liu, Yang Zhang, Jinqiao Shi, Ya Jing, Quangang Li, and Li Guo. 2016. Towards quantifying visual similarity of domain names for combating typosquatting abuse. In IEEE Military Communications."},{"key":"e_1_3_2_1_43_1","unstructured":"Ben Matthews. 2024. Social media stats for charities and nonprofits. https: \/\/empower.agency\/social-media-stats-charities-nonprofits\/."},{"key":"e_1_3_2_1_44_1","volume-title":"Performance evaluation of some clustering algorithms and validity indices","author":"Maulik Ujjwal","unstructured":"Ujjwal Maulik and Sanghamitra Bandyopadhyay. 2002. Performance evaluation of some clustering algorithms and validity indices. In IEEE Transactions on Pattern Analysis and Machine Intelligence (ITPAMI)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00205"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00861"},{"key":"e_1_3_2_1_47_1","unstructured":"Daniel Milevski. 2024. Apify Telegram Scraper API. https:\/\/apify.com\/danielmile vski9\/telegram-channel-scraper."},{"key":"e_1_3_2_1_48_1","unstructured":"Daniel Milevski. 2024. Telemetrio Telegram Scraper API. https:\/\/telemetr.io\/."},{"key":"e_1_3_2_1_49_1","unstructured":"Jaron Mink Licheng Luo Nat\u00e3 M Barbosa Olivia Figueira Yang Wang and Gang Wang. 2022. {DeepPhish}: Understanding user trust towards artificially generated profiles in online social networks. In USENIX Security."},{"key":"e_1_3_2_1_50_1","volume-title":"Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. In Network and Distributed System Security Symposium (NDSS).","author":"Miramirkhani Najmeh","year":"2017","unstructured":"Najmeh Miramirkhani, Oleksii Starov, and Nick Nikiforakis. 2017. Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_51_1","volume-title":"Greg Ver Steeg, and Aram Galstyan","author":"Mirtaheri Mehrnoosh","year":"2021","unstructured":"Mehrnoosh Mirtaheri, Sami Abu-El-Haija, Fred Morstatter, Greg Ver Steeg, and Aram Galstyan. 2021. Identifying and analyzing cryptocurrency manipulations in social media. In IEEE Transactions on Computational Social Systems (ITCSS)."},{"key":"e_1_3_2_1_52_1","unstructured":"Euro News. 2024. Charity warns 2023 was the worst year for child sexual abuse content. https:\/\/www.euronews.com\/next\/2024\/04\/23\/german-internet-domainused-by-criminal-groups-in-worst-year-for-online-child-sexual-abuse."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13257-0_17"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488474"},{"key":"e_1_3_2_1_55_1","unstructured":"NZU. 2024. Cybercriminals abuse advertisement on X to promote crypto scam. https:\/\/news.zke.com\/cybercriminals-abuse-advertisement-on-x-to-promotecrypto-scam\/."},{"key":"e_1_3_2_1_56_1","unstructured":"NZU. 2024. Cybercriminals abuse advertisement on X to promote crypto scam. https:\/\/news.zke.com\/cybercriminals-abuse-advertisement-on-x-to-promotecrypto-scam\/."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00049"},{"key":"e_1_3_2_1_58_1","unstructured":"Adam Oest Penghui Zhang Brad Wardman Eric Nunes Jakub Burgis Ali Zand Kurt Thomas Adam Doup\u00e9 and Gail-Joon Ahn. 2020. Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In USENIX Security."},{"key":"e_1_3_2_1_59_1","volume-title":"ACM Internet Measurement Conference (IMC). 60] Ross Phillips and Heidi Wilder.","author":"Peng Peng","year":"2020","unstructured":"Peng Peng, Limin Yang, Linhai Song, and Gang Wang. 2019. Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines. In ACM Internet Measurement Conference (IMC). 60] Ross Phillips and Heidi Wilder. 2020. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC)."},{"key":"e_1_3_2_1_60_1","unstructured":"OpenAI Platform. 2024. Models - OpenAI API (GPT-4o). https:\/\/platform.openai. com\/docs\/models\/gpt-4o."},{"key":"e_1_3_2_1_61_1","volume-title":"Charity Scams: How to Spot and Avoid Fake Charities. https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/protect-your-donationsspot-and-avoid-fake-charities\/.","author":"Cristina","year":"2024","unstructured":"Cristina POPOV. 2024. Charity Scams: How to Spot and Avoid Fake Charities. https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/protect-your-donationsspot-and-avoid-fake-charities\/."},{"key":"e_1_3_2_1_62_1","volume-title":"Learning Transferable Visual Models From Natural Language Supervision. In International Conference on Machine Learning (ICML).","author":"Radford Alec","year":"2021","unstructured":"Alec Radford, Jong Wook Kim, Chris Hallacy, Aditya Ramesh, Gabriel Goh, Sandhini Agarwal, Girish Sastry, Amanda Askell, Pamela Mishkin, Jack Clark, Gretchen Krueger, and Ilya Sutskever. 2021. Learning Transferable Visual Models From Natural Language Supervision. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. In Empirical Methods in Natural Language Processing (EMNLP).","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_64_1","unstructured":"Tonya Riley. 2022. Cybercriminals are posing as Ukraine fundraisers to steal cryptocurrency. https:\/\/cyberscoop.com\/cybercriminals-are-posing-as-ukrainefundraisers-to-steal-cryptocurrency\/."},{"key":"e_1_3_2_1_65_1","unstructured":"ScamSearch. 2024. Global Scam Database. https:\/\/scamsearch.io\/."},{"key":"e_1_3_2_1_66_1","volume-title":"Nicholas","author":"Shahapure Ketan Rajshekhar","year":"2020","unstructured":"Ketan Rajshekhar Shahapure and Charles K. Nicholas. 2020. Cluster Quality Analysis Using Silhouette Score. Data Science and Advanced Analytics (DSAA)."},{"key":"e_1_3_2_1_67_1","volume-title":"Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers. In ACM World Wide Web Conference (WWW).","author":"Srinivasan Bharat","year":"2018","unstructured":"Bharat Srinivasan, Athanasios Kountouras, Najmeh Miramirkhani, Monjur Alam, Nick Nikiforakis, Manos Antonakakis, and Mustaque Ahamad. 2018. Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support Scammers. In ACM World Wide Web Conference (WWW)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561467"},{"key":"e_1_3_2_1_69_1","unstructured":"IT Support. 2023. Scam Alert: \"Donation to Charity or Prize Winning\". https: \/\/www.uregina.ca\/is\/security\/advisories\/security-advisory56.html."},{"key":"e_1_3_2_1_70_1","unstructured":"Janos Szurdi Balazs Kocso Gabor Cseh Jonathan Spring Mark Felegyhazi and Chris Kanich. 2014. The Long Taile of Typosquatting Domain Names. In USENIX Security."},{"key":"e_1_3_2_1_71_1","unstructured":"Jacqueline Tabas. 2024. How Nonprofit Organizations Can Boost Donations Via Social Media. https:\/\/www.forbes.com\/sites\/allbusiness\/2024\/05\/10\/hownonprofit-organizations-can-boost-donations-via-social-media\/."},{"key":"e_1_3_2_1_72_1","unstructured":"Giobanni Torre. 2023. Warning issued over fake social media accounts running flood donation scams. https:\/\/nit.com.au\/17-01--2023\/4743\/warning-issued-overfake-social-media-accounts-running-flood-donation-scams."},{"key":"e_1_3_2_1_73_1","unstructured":"Twitter. 2024. User Detail Twitter API. https:\/\/developer.twitter.com\/en\/docs\/ twitter-api\/v1\/accounts-and-users\/follow-search-get-users\/api-reference\/getusers-lookup."},{"key":"e_1_3_2_1_74_1","unstructured":"Twitter. 2024. User Timelines Twitter API. https:\/\/developer.twitter.com\/en\/doc s\/twitter-api\/tweets\/timelines\/introduction."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355600"},{"key":"e_1_3_2_1_76_1","unstructured":"VirusTotal. 2004. VirusTotal API v3 Overview. https:\/\/docs.virustotal.com\/refere nce\/overview."},{"key":"e_1_3_2_1_77_1","unstructured":"Yi-MinWang Doug Beck JeffreyWang Chad Verbowski and Brad Daniels. 2006. Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting.. In USENIX Security."},{"key":"e_1_3_2_1_78_1","unstructured":"Scam Watch. 2024. Scam Statistics. https:\/\/www.scamwatch.gov.au\/researchand-resources\/scam-statistics'scamid=14&date=2024."},{"key":"e_1_3_2_1_79_1","unstructured":"Clear Water. 2023. Protect Yourself from Charitable-Giving Scams. https:\/\/clearwatercreditunion.org\/protect-yourself-from-charitable-giving-scams-2023-12-04\/."},{"key":"e_1_3_2_1_80_1","unstructured":"Monica Therese Whitty. 2020. Is there a scam for everyone? Psychologically profiling cyberscam victims. European Journal on Criminal Policy and Research."},{"key":"e_1_3_2_1_81_1","volume-title":"A Fresh Look at Fraud","author":"Wood Stacey","unstructured":"Stacey Wood, David Hengerer, and Yaniv Hanoch. 2022. Scams in the Time of COVID-19:: Pandemic Trends in Scams and Fraud. In A Fresh Look at Fraud. Routledge, 42--57."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime51433.2020.9493255"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663719"},{"key":"e_1_3_2_1_84_1","volume-title":"CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing","author":"Zhang Penghui","unstructured":"Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doup\u00e9, and Gail-Joon Ahn. 2021. CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. In IEEE Security and Privacy (IEEE S&P)."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:56Z","timestamp":1750295936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":84,"alternative-id":["10.1145\/3696410.3714634","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714634","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}