A Framework For Addressing Mobile Money Security Vulnerabilities in Tanzania
A Framework For Addressing Mobile Money Security Vulnerabilities in Tanzania
ISSN No:-2456-2165
Abstract:- The growth of mobile payments gave rise to largest mobile financial service provider in 2002. However, the
several security threats to users. These threats are first significant deployment was made by a company called
attributed to vulnerabilities due to ignorance, technical Paybox which Deutsche Bank primarily funded; Paybox
issues, inadequate regulations, information about mobile company was founded by two young Germans (Mathias
transactions, and lack of formal complaints and redress Entenmann and Eckart Ortwein). The solution was later
mechanisms. This study aimed to design a framework to deployed in other countries such as Austria, Sweden, Spain,
address security vulnerabilities in mobile money services and the UK, and in about 2003, more than a million people were
in Tanzania. The study was conducted at Airtel Airtel registered on Paybox. Gartner rated the company as the leader
Money agents and employees in Dar es Salaam, with a in the field.
sample size of 163 respondents. The results show that
77.9% of respondents said mobile money service is safe. The provision of financial services by
According to the results obtained, despite the safety of telecommunications industries without carrying cash and
mobile money services, threats and vulnerabilities were physically attached to different service providers has improved
identified. Users receive calls/SMS requests to perform and eased the life of every financial institution and end-user in
unintended transactions. Some users experience altering one way or another by serving time for other life matters and
their mobile money balance, using the public internet to fast transactions. In the past decade, mobile money services
perform a transaction, downloading apps from the have expanded rapidly, resulting in the financial inclusion of
internet, and downloading data from unknown sites are the low-income population that did not have access to
the potential cause of security vulnerability and threats to traditional financial transaction services, as elaborated by
mobile money services. The study recommends that mobile Rwiza et al., 2020.
money operators design a safe system and raise awareness
among users on security aspects. Users are to report any However, the growth of mobile payments gives rise to
receipt of a call or SMS requesting them to perform an several security vulnerabilities and later threats to users, such
unintended transaction, and stakeholders, customers, and as privacy violations, malware attacks, fraud, theft, deviations
Government cooperate in the design and implement the in the quality of services, and financial and device losses (Ali,
safe framework for mobile money service. Dida, Sam, 2020). These threats are attributed to vulnerabilities
in ignorance, technical issues, inadequate regulations,
Keywords:- Vulnerabilities, Mobile Money, Threats. inadequate information about mobile transactions, and a lack
of formal complaints and redress mechanisms.
I. INTRODUCTION
To tackle these threats, we must find the vulnerabilities
Mobile Financial Services (MFS), as provided by Mobile causing them and realize the framework to better manage the
Network Operators (MNO), are the financial services that are risks before landing on the market. Rwiza, Kissaka, and Kapis
being provided through telecommunications registered (2020) developed a methodology for evaluating security threats
subscribers' mobile devices. They include peer-to-peer in the MNO financial service model. They further nailed that;
transactions, bill payments, merchants' services for buying the security evaluation of the MNO financial service model is
goods, interoperability on banks, and transfer to other mobile still in the infancy stages in developing countries. They further
operators, and international remittance. Bångens and said that there are security vulnerabilities in the MNO financial
Söderberg (2008) defined Mobile financial services are service model in such a way that financial regulators may fail
financial transaction services provided by mobile network to track the creation of mobile money in the country.
operators through mobile phones.
II. LITERATURE REVIEW
Mobile financial systems are also known as mobile
money services or mobile money. It is a financial solution Bassole et al. (2020) conducted a study on financial
where customers or end users can perform financial applications vulnerabilities aimed at performing vulnerability
transactions through mobile phones. Mobile money services assessments, facilitating an informed assessment of the
are known as M-money services or SMS money services. They information security and privacy risks that mobile money
were started and announced in 1999, the same year Fundamo services and payment applications face in African countries,
company deployed their prototype and became the world's first
IJISRT23MAR084 www.ijisrt.com 44
Volume 8, Issue 3, March – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
and creating awareness in the research and practice
communities.
IJISRT23MAR084 www.ijisrt.com 45
Volume 8, Issue 3, March – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
USSD requests are insecure in terms of authentication. It Obfuscation is to make it difficult for attackers to read and
happens when authentication controls and protocols are analyze code. Code obfuscation is a protective mechanism to
bypassed due to poor implementation or absence. For example, reduce the attack activities on a software system (Sebastian et
weak pins leave the USSD-based menu vulnerable to brute- al., 2016). Obfuscation (Data masks) can be complete
forcing and guessing attacks. Suppose the USSD menu for user (concealing all of the original data characters) or partial
authentication is not masked. In that case, an attacker can view (obscuring only some of the data characters). One example of
the end user's credentials by conducting social engineering code obfuscation is to remove file name characters at compile
attacks such as shoulder surfing, which makes authentication time. Random or single-letter names replace the names of
vulnerable and becomes a threat to financial services. classes and methods in the source. Lack of obfuscation allows
attackers to analyze the code and find important data, such as
Improper data validation in the USSD can lead to Testing-related usernames and passwords, Encryption keys and
injection attacks that leak sensitive information. An attacker parameters from which keys can be derived, and Salts for
may insert specifically crafted text in the user input to perform hashing and encryption.
malicious actions in the back-end server.
Attackers can then use this information to obtain
Broken access control occurs due to the lack of credentials and access web servers. Moreover, hackers can
appropriate access control and allows the user to access analyze the application algorithm and exploit flaws in business
unauthorized resources, such as features and information. logic. Competitors may also want to know how the application
is designed to copy new product features.
Using technology with publicly known vulnerabilities,
such as the SIM-Jacker, can pose a significant security threat to Storing sensitive information in the device is another
the apps running on the SIM Tool Kit (STK). Using binary vulnerability that can lead to threats, including taking
SMS, attackers can force the device to send malicious requests screenshots of sensitive information and storing cached
to the home network. The main Simjacker attack involves an information in the device and clients to store information like
SMS containing a specific type of spyware-like code sent to a passwords, money services information, and others. It must be
mobile phone, which then instructs the SIM Card within the encrypted if it is necessary to store sensitive data in the client-
phone to 'take over the mobile phone to retrieve and perform side device. The lack of powerful encryption in the devices is a
sensitive commands (Tutorials point, 2022). significant leaves loophole in the security of the primary
services, including MFS.
There needs to be more logging and monitoring in
conjunction with a non-existent or insufficient incident Other vulnerable components of the mobile computing
response to allow fraudulent transactions to occur. More device environment are the loaded apps. Each application can
information will be available for further investigation or even contain a vulnerability that is susceptible to exploitation. The
stopping the ongoing attacks. apps on the mobile device can have a variety of vulnerabilities,
including:
Vulnerability due to security misconfiguration occurs due
to a lack of alignment between system administrators, security Incorrect permission settings that allow access to
administrators, and other non-technical staff. Common controlled functionality such as the camera or GPS, Exposed
examples of incorrect settings are Weak passwords/PINs or internal communications protocols that pass messages
standard credentials that are easily guessed or poor error internally within the device to itself or to other applications,
handling and response. Potentially dangerous functionality that accesses the resources
or the user's personal information via internal program data
D. Mobile applications vulnerabilities calls or hard-coded instructions, Application collusion, where
Insufficient code protection leaves MFS vulnerable to two or more applications pass information to each other to
source code analysis. To exploit vulnerabilities in code, all increase the capabilities of one or both applications,
attackers need is to download the application from Google Play obfuscation, where functionality or processing capabilities are
or the App Store and then de-compile it. Alternatively, an hidden or obscured from the user, Excessive power
attacker can use the default USSD application built into the consumption of applications running continuously in the
phone. background, which drain the battery, thereby reducing system
availability, traditional software vulnerabilities such as
Deep linking is a technology that allows users to navigate insufficient editing of data entered, Structured Query Language
between applications (or sections within an application) to a (SQL) query exploitation and poor programming practices and
specific location using special links, like hyperlinks in web privacy weaknesses in configuration settings that allow access
applications (Lynch, Stewart, 2020). Insecure deep-link to the application's sensitive information (e.g., contacts,
handling is a critical vulnerability that can cause financial calendar information, user tasks, personal reminders,
losses for banks. For example, one money services application photographs, Bluetooth access)
failed to filter deep linking URLs. Attackers could take
advantage of this by loading a link to a web page containing
malicious code and interacting with the JavaScript interfaces
available in those components.
IJISRT23MAR084 www.ijisrt.com 46
Volume 8, Issue 3, March – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Below is the distribution of vulnerabilities by type of data coding, and reverse coding. Data cleaning was done by
activity the end user can use (source Positive technologies examining the collected data to identify omissions and errors
2020). and find a way to rectify them where possible. This process also
checked if the returned questionnaires' data contained therein
are accurate and consistent with other facts gathered, uniformly
entered, and well arranged to facilitate coding and data
analysis. Secondly, data coding was processed by assigning
numerals or other symbols to classes into which responses were
placed.
IV. RESULTS
IJISRT23MAR084 www.ijisrt.com 47
Volume 8, Issue 3, March – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Table II shows that 82.2% of respondents did not find their MM transaction exposed anywhere.
100
53.4%
90
80
70
No. of respondents
60 30.7%
50
40
30
20 9.2%
6.7%
10
0
I don't know No Not sure Yes
Fig. 3. Responses to the question; is Public internet risk to the mobile transaction?
The study revealed that mobile money services should be safe and ensure the privacy of the users' transactions. The study further
revealed that the users need to confirm the recipient details before initialing the transaction. The results show that several people must
confirm the recipient detail before initiating the transaction. Table 5 shows that 14.1% of respondents must confirm the recipient
details. However, a large number of the respondents (81.6%) do confirm the recipient details.
IJISRT23MAR084 www.ijisrt.com 48
Volume 8, Issue 3, March – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
TABLE IV. FRAMEWORK TO ADDRESS SECURITY VULNERABILITIES
Framework Frequency (%) Valid %
privacy to your mobile money
services
No 42 25.8 25.8
Not sure 30 18.4 18.4
Yes 91 55.8 55.8
Usually, confirm the recipient before
initiating MM trans.
No 23 14.1 14.1
Not sure 7 4.3 4.3
Yes 133 81.6 81.6
Source: Field data, 2022
The study also examined the ways to be used to protect mobile money service users. The study found that, among other things,
there should be the responsiveness of all stakeholders. There should be responsiveness between customers and all stakeholders in the
mobile money, awareness between customers and all stakeholders in the mobile money, awareness of all stakeholders, and awareness
between customers and all stakeholders in the mobile money.
These ways could make a framework to address the vulnerabilities and helps mobile money transaction services users. The
results in Table 6 show that 36.8% of respondents said that all stakeholders should be responsive and shared responsiveness between
customers and all stakeholders in mobile money. Furthermore, 33.2% of respondents said there should be aware of all stakeholders
and shared awareness between customers and all stakeholders in the mobile money services.
B. Framework to address Vulnerabilities. From exposure, analysis is done, which can be done by
In mobile money services, one must be exposed when the customer, company, or Government regarding the kind of
performing mobile money transactions. Mobile money exposure. Customer needs awareness which, with the current
transaction exposure is a state of not having protection on technology, can be obtained easily. This awareness includes
performing a financial transaction. Depending on the weight of security, vulnerabilities, and impacts of the threats or risks.
the exposure, vulnerabilities can be formed. From the study, Service providers also need awareness of the business loss,
these exposures can relate to receiving a message or a call to financial losses, and government penalties they may incur if a
perform an unintended transaction that is coming randomly. loss is caused by vulnerabilities in the company. This includes
This can also be contributed by performing a transaction using service or application misconfigurations and service settings
the public internet or performing a transaction in public as this ignorance which might result in mobile money services losses,
lets hackers, shoulder surfing, see the details of the which may lead to brand ruining. Government regulators must
transactions. be aware of all the losses which customers and companies
might incur, which may lead to revenue loss and customer
disturbances.
IJISRT23MAR084 www.ijisrt.com 49
Volume 8, Issue 3, March – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Threat analysis can be handled to find how much the money services is an essential concern for the successful
impact will be, which might lead to mitigation, coping, or loss, operation of MM services.
and how they can be avoided to improve mobile money
security. Vulnerability solution options can be looked upon in In this study, there is an indication that the mobile money
trying to eliminate the vulnerability or reduce an impact. A service is safe in Tanzania. Most of the respondents (77.9%)
preventive solution begins with an appraisal of the potential said so.
threat, which then triggers preventive actions to mitigate or
prevent undesirable consequences. This process is referred to The security vulnerabilities and threats identified by the
as the coping appraisal process (Monda, 2020). Mitigation study are; downloading the mobile APP, downloading data
would happen if the used option gave a positive solution from the internet, receiving wrong confirmation mobile money
concerning time. If an option provided is wrong or partial, the message related to the transaction, not confirming the recipient
impact will increase the threat of mobile financial loss to details before the transaction, receiving a call or message
customers, service providers, and the Government. However, asking MM user to perform unintended mobile money
sometimes the option can be neutral due to experience and transaction and use of public wireless internet and mobile apps
existing exposure environment, which can lead to coping or misbehavior.
resilience. This means that a customer can recover effectively
from loss if the impact is not significant and the vulnerability RECOMMENDATIONS
is dealt with externally.
First, the study recommends that mobile money users
All three aspects (exposure, potential vulnerability choose safe approaches to using the mobile money service.
analysis, and threat analysis) of the framework can be done on They should avoid situations that may risk the transaction made
a mobile money environment to assist customers, service by mobile money, such as avoiding using the same password
providers, and Government as a regulator to meet harmony in for a long time, avoiding performing the transaction openly/in
the mobile financial services sector. This can only be achieved public, and not showing the password of mobile money. This
by involving all stakeholders collaborating, to which 65% of all will help them to remain safe when using mobile money
respondents agreed. The Vulnerability assessment approach services.
(identification, analysis, and controlling) can be followed in
this framework shown in Figure 4.5, in which 50.9% of Secondly, mobile money operators such as Mpesa, Tigo
respondents agreed on that. Pesa, Airtel Money, HaloPesa, and the like should implement
a safe environment for mobile money users.
The study aimed to design a framework to address [1]. Bångens, S. (2008). "Mobile money services –Financial
security vulnerabilities in mobile money in Tanzania. Mobile Services for the Unbanked?” Swedish Program for ICT
money service in Tanzania is safe, as chapter four findings in Developing Regions, SPIDER [Online] URL:
show. However, the study realized the presence of security https://spidercenter.org/wp-
vulnerability and threats to mobile money. Security is the major content/blogs.dir/362/files/2016/11/Spider-ICT4D-
component of digital financial services, specifically Mobile Series-2-Mobile-money services-financial-services-for-
Money services. Therefore, the security aspect of mobile the-unbanked.pdf [Accessed on]: 18/11/2021
IJISRT23MAR084 www.ijisrt.com 50
Volume 8, Issue 3, March – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
[2]. Bassolé et al., (2020) "Vulnerability Analysis in Mobile [15]. Positive Technologies, (2020). "Vulnerabilities and
money services and Payment Applications on Android in threats in mobile banks” [Online] [accessed
African Countries" ICST Institute for Computer URL]: https://www.ptsecurity.com/ww-
Sciences, Social Informatics and Telecommunications en/solutions/financial/, accessed on 16/Mar/2022.
Engineering 2020 Published by Springer Nature [16]. Rumanyika, (2015). "Obstacles towards adoption of
Switzerland AG 2020. All Rights Reserved J. P. R. Thorn mobile money services in Tanzania: a review”
et al. (Eds.): Interpol 2020, LNICST 321, pp. 164–175, International Journal of Information Technology and
2020. URL: https://doi.org/10.1007/978-3-030-51051- Business Management, v35(1)
0_12. [Online]URL:http://dspace.cbe.ac.tz:8080/xmlui/bitstre
[3]. Dhillon, (2007). "Principles of Information Systems am/handle/123456789/269/1%20rumaniyaka%20.pdf?s
Security: Text and Cases ."John Wiley & Sons Inc. equence=1&isAllowed=y [accessed on]: 18 November
[4]. Didier, Gouayon, Yaya and Oumrouu 2020, 2021.
“Vulnerability Analysis in Mobile money services and [17]. Rwiza, K., Kapis, (2020). “A Methodology for
Payment Applications on Android in African Countries," Evaluating Security in MNO Financial Service Model,"
[Online] [ Accessed URL]: https://doi.org/10.1007/978- 2020 IST-Africa Conference (IST-Africa).
3-030-51051-0_12, [accessed on] 15/03/2022. [18]. Sebastian and others, (2016). “A Study & Review on
[5]. Jiow, Mwagwabi, and Low-Lim (2021). Effectiveness of Code Obfuscation.” [Online] [access URL]
protection motivation theory based: Password hygiene DOI: 10.1109/STARTUP.2016.7583913 [Accessed on]
training program for youth media literacy education. 27/03/2022.
Journal of Media Literacy Education, 13(1), 67-78. [19]. Tutorialspoint, (2022). "What is a Simjacker attack?”
https://doi.org/10.23860/JMLE-2021-13-1-6. [Online] [accessed URL]
[6]. Kabir (2016) "Introduction to research" [Online] https://www.tutorialspoint.com/what-is-simjacker
[accessed URL]: attack#:~:text=At%20its%20most%20basic%20level,re
https://www.researchgate.net/publication/325846733_I ceive%20and%20conduct%20sensitive%20orders.
NTRODUCTION_TO_RESEARCH [access on]: [Accessed on] 29/03/2022.
18/11/2021. [20]. Wlosinski, (2016). "Mobile Computing Device Threats,
[7]. Lynch, S. (2020). "Deep Links." [online],[Accessed Vulnerabilities and Risk Are Ubiquitous," ISACA
URL] DOI://10.1007/978-1-4842-6700-4_6 [accessed JOURNAL, [online] [Accessed
on] 26/03/2022 . URL]: https://www.isaca.org/resources/isaca-
[8]. Martin, (2020). "Mobile Security” [Online] [accessed journal/issues/2016/volume-4/mobile-computing-
URL]: https://medium.com/josue-martins/ussd-top-10- device-threats-vulnerabilities-and-risk-are-ubiquitous,
security-risk-for-mobile-payments-bcd64d0a34dc, [accessed on] 15/03/2022.
[accessed on] 29/03/2022. [21]. Wodo, S., Błaśkiewicz (2021) "Security issues of
[9]. Mazhar and others, (2014) “An Investigation of Factors electronic and mobile money services" Conference: 18th
Affecting Usage and Adoption of Internet & Mobile International Conference on Security and Cryptography:
money services In Pakistan” International Journal of SECRYPT 2021 [Online]:
Accounting and Financial Reporting (2014), V4(2). DOI:10.5220/0010466606310638 (accessed on)
[10]. Momani, A. (2020). The Unified Theory of Acceptance 14/06/2022.
and Use of Technology: A New Approach in Technology
Acceptance. International Journal of Sociotechnology
and Knowledge Development. 12. 79–98.
10.4018/IJSKD.2020070105.
[11]. Nayak, Nath and Goel, (2014). “A study of adoption
Behavior of Mobile money services by Indian
Consumers ."International journal of research in
Engineering & Technology.2(3). March 2014. 209-222.
[12]. Marathon, (2006). Fighting poverty from the street. A
Survey of Street Food Vendors in Bangkok.
[13]. NTIGWIGWA(2019). Factors that Contribute to
Cybercrime in Mobile Money Services in Tanzania: A
Case of Kibaha Town (Doctoral dissertation, Mzumbe
University).
[14]. Nyamtiga, S., Laizer (2013) "Security Perspectives For
USSD Versus SMS In Conducting Mobile Transactions"
INTERNATIONAL JOURNAL OF TECHNOLOGY
ENHANCEMENTS AND EMERGING
ENGINEERING RESEARCH, VOL 1, ISSUE 3 ISSN
2347-4289.
IJISRT23MAR084 www.ijisrt.com 51