Juridical Review of Legal Protection for Victims of Mobile Malware Attacks Through Digital Invitations
Main Article Content
Arif Budianto*
Surya Nita
This research aims to analyze the characteristics of mobile malware attacks through digital invitations, evaluate legal regulations that protect victims in the Banten Police area, and identify obstacles and formulate solutions to improve the effectiveness of legal protection against cybercrime. With increasing cases of cybercrime in the region, this research combines a multidisciplinary approach through field research and normative legal research. Data were obtained from three main sources, namely interviews with victims, law enforcement officials, and legal experts (primary sources); official documents such as laws and regulations (secondary sources); and additional related literature (tertiary sources). Data collection techniques were conducted through observation, in-depth interviews, and documentation, which were then analyzed qualitatively through the stages of data reduction, data presentation, and conclusion drawing. The results showed that mobile malware attacks through digital invitations, which utilize phishing, smishing, and vishing techniques, have become a serious threat with a significant impact on financial security and user data privacy. Existing regulations, such as the Electronic Information and Transaction Law and the Personal Data Protection Law, still have limitations in providing effective protection, especially in the Banten Police area. The main obstacles identified include an imbalance in regulatory focus that focuses more on punishing perpetrators, a lack of technological infrastructure, and low public awareness of cyber threats. Therefore, this study recommends the need for regulatory revisions with an emphasis on victim protection, capacity building of law enforcement officers, public education on digital security, and international cooperation to deal with increasingly complex cybercrime.
Abidin, D. Z. (2015). Kejahatan dalam Teknologi Informasi dan Komunikasi. Jurnal Processor, 10(2), 509–516.
Agarwal, P., Nair, A., Jaiswal, S., Batra, N., & Grover, P. (2022). Malware analysis in mobile devices. https://doi.org/10.1049/icp.2022.0604
Ajayi, A., Olajide, M., Afolabi, O. P., & Abiodun, O. A. (2023). Evaluation of Phishing Attack Strategies on Mobile Device Users. International Journal of Computer and Information Technology (2279-0764), 12(1). https://doi.org/10.37502/ijsmr.2024.7911
Al-Sinayyid, A., Jewel, M. J. A., Mannuru, V., & Sasidhar, K. (2023). Defending Characteristics and Attribution Analysis for Phishing Attacks. 2023 International Conference on Computational Science and Computational Intelligence (CSCI), 868–874. https://doi.org/10.1109/csci62032.2023.00145
Andriani, N. (2023). Cybercrime Kejahatan Yang Berbasis Komputer. Jurnal Hukum Non Diskriminatif, 1(2), 39–43.
Apidana, Y. H., Suroso, A., & Setyanto, R. P. (2020). Model penerimaan teknologi mobile payment pada digital native dan digital immigrant di Indonesia. Jurnal Ekonomi, Bisnis, Dan Akuntansi, 21(4).
Apriandi, M., Sagala, R. V., & Basuki, B. (2024). Perlindungan Hukum Bagi Korban Cybercrime Penyebaran Data Pribadi Secara Online. SINERGI: Jurnal Riset Ilmiah, 1(11), 1069–1079.
Assiffa, B. A. (2023). Perlindungan Hukum Terhadap Nasabah Bank Syariah Indonesia Dari Serangan Cybercrime. Fakultas Syariah dan Hukum UIN Syarif Hidayatullah Jakarta.
Budiastanti, D. E. (2017). Perlindungan Hukum Terhadap Korban Tindak Pidana Penipuan Melalui Internet. Jurnal Cakrawala Hukum, 8(1), 22–32.
Burton, S. L., & Moore, P. D. (2024). Pig butchering in cybersecurity: A modern social engineering threat. SocioEconomic Challenges, 8(3), 46. https://doi.org/10.61093/sec.8(3).46-60.2024
Chen, G., Zhou, G., Mao, Z., Liu, Q., Zheng, Z., Chen, G., & Qin, P. (2015). Research of Social Engineering Attacks in Telecommunications Fraud. 2015 International Conference on Social Science, Education Management and Sports Education, 1869–1872. https://doi.org/10.2991/SSEMSE-15.2015.477
Dalimunthe, S. R., Pujawati, S. A., & Sitorus, A. S. A. (2022). Technical Security in ITE Law and Copyrights of Devices and Systems. POLICY, LAW, NOTARY AND REGULATORY ISSUES (POLRI), 1(2). https://doi.org/10.55047/polri.v1i2.124
Faghani, M. R., & Nguyen, U. T. (2019). Mobile botnets meet social networks: design and analysis of a new type of botnet. International Journal of Information Security, 18, 423–449. https://doi.org/10.1007/S10207-018-0412-6
Fazlurrohman, M. A., Nita, S., & Aminanto, M. E. (2024). Comparative Studies on Trends and Strategies for Combating Cybercrime Between Indonesia and Developed Countries. POLICY, LAW, NOTARY AND REGULATORY ISSUES, 3(4), 498–515. https://doi.org/10.55047/polri.v3i4.1512
Graham, R. L. (1984). The legal protection of computer software. Communications of the ACM, 27(5), 422–426.
Guaña-Moya, J., Chiluisa-Chiluisa, M. A., del Carmen Jaramillo-Flores, P., Naranjo-Villota, D., Mora-Zambrano, E. R., & Larrea-Torres, L. G. (2022). Ataques de phishing y cómo prevenirlos Phishing attacks and how to prevent them. 2022 17th Iberian Conference on Information Systems and Technologies (CISTI), 1–6. https://doi.org/10.23919/cisti54924.2022.9820161
Habib, H. N., Efendi, A., & Prasetyo, D. E. (2024). Sosialisasi Fenomena Kejahatan Cyber dan Langkah Penanggulangan Sebagai Bentuk Antisipasi. APPA: Jurnal Pengabdian Kepada Masyarakat, 1(5), 393–399.
Hadjon, P. M. (1987). Perlindungan hukum bagi masyarakat Indonesia. PT Bina Ilmu.
Hakim, A. A., & Setiawan, D. A. (2024). Perlindungan Korban Kejahatan Penipuan Online Bermodus Apk (Android Package Kit) melalui Whatsapp. Jurnal Riset Ilmu Hukum, 4(1), 23–28. https://doi.org/10.29313/jrih.v4i1.3778
Hirschi, T., & Stark, R. (1969). Hellfire and delinquency. Social Problems, 17(2), 202–213.
Ibrahim, J. (2006). Teori dan metodologi penelitian hukum normatif. Malang: Bayumedia Publishing, 57.
Irawan, H., Wahyuningsih, S. E., & Hafidz, J. (2019). Legal Protection For Victims Of Traffic Violations That Lead To Death (Case Study On Police Traffic of Rembang). Jurnal Daulat Hukum, 2(4), 485–492. https://doi.org/10.30659/JDH.2.4.485
Jing, R., Chen, J., & Liu, Y. (2019). Proactive protection of mobile operating system malware via blocking of infection vector. Google Patents.
Kumar, A., Sharma, I., & Sharma, A. (2023). Understanding the behaviour of android sms malware attacks with real smartphones dataset. 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA), 655–660. https://doi.org/10.1109/ICIDCA56705.2023.10099595
Kurniawan, A. B., & Soeskandhi, H. (2022). Perlindungan Hukum Kepada Pengguna Elektronik Banking Atas Kejahatan Carding Ditinjau Dari Undang-Undang Informasi dan Transaksi Elektronik. SUPREMASI: Jurnal Hukum, 5(1), 64–87.
Kurniawan, D., & Setiyono, J. (2023). Implementation of Human Rights Protection against Victims of Severe Human Rights Violations in Indonesia’s Criminal Justice System. International Journal of Social Science And Human Research, 6(7), 4033–4038. https://doi.org/10.47191/ijsshr/v6-i7-20
Lestari, U., Hamzah, A., & Sholeh, M. (2022). Sosialisasi Fenomena Cyber Crime dan Penanggulangannya Bagi Pengelola Informasi Publik Kapanewon Mlati Sleman Yogyakarta. NEAR: Jurnal Pengabdian Kepada Masyarakat, 1(2), 100–106.
Maskun, M., Manuputty, A., Noor, S. M., & Sumardi, J. (2013). Kedudukan Hukum Cyber Crime Dalam Perkembangan Hukum Internasional Kontemporer. Masalah-Masalah Hukum, 42(4), 511–519.
Minarosa, M. (2022). Legal Protection of Personal Data Owners as Cybercrime Victims Based on regulations regarding Electronic Information and Transactions. Proceedings of the First Multidiscipline International Conference, MIC 2021, October 30 2021, Jakarta, Indonesia.
Mishra, S., & Soni, D. (2019). SMS phishing and mitigation approaches. 2019 Twelfth International Conference on Contemporary Computing (Ic3), 1–5. https://doi.org/10.1109/IC3.2019.8844920
Muhammad, R. N., Mutalib, A., & Abdullah, R. H. (2022). Cyber Security Challenges in Law Perspective “Challenges of Criminal Law Enforcement in Misuse of Social Media (Medsos).” Megafury Apriandhini, SH, MH Chair of 4th OSC, 52.
Pambudi, R., & Iksan, M. (2020). Tinjauan Yuridis Perlindungan Hukum Bagi Korban Cyber Crime. Universitas Muhammadiyah Surakarta.
Penning, N., Hoffman, M., Nikolai, J., & Wang, Y. (2014). Mobile malware security challeges and cloud-based detection. 2014 International Conference on Collaboration Technologies and Systems (CTS), 181–188. https://doi.org/10.1109/CTS.2014.6867562
Safrizal, D. G., Aisyah, N., Putra, A. S., Valentino, V. H., & Prasetyo, B. S. (2022). Analisis Penyadapan pada Aplikasi WhatsApp Menggunakan Sinkronisasi Data. Jurnal Esensi Infokom Vol, 6(1).
Sastrawan, W. D. (2024). Implementasi Undang-Undang ITE No 19 Tahun 2016 Terkait Penipuan Menggunakan Mobile Malware Pada Aplikasi Whatsapp Di Kabupaten Buleleng. Universitas Pendidikan Ganesha.
Septiani, D., Widiyasono, N., & Mubarok, H. (2016). Investigasi Serangan Malware Njrat Pada PC. J. Edukasi Dan Penelit. Inform. JEPIN, 2.
Soekanto, S. (1983). Pribadi dan Masyarakat. Alumni.
Sui, A.-F., & Guo, T. (2012). A behavior analysis based mobile malware defense system. 2012 6th International Conference on Signal Processing and Communication Systems, 1–6.
Supriyadi, A., Alamsah, N., Nurasa, H., & Pancasilawan, R. (2022). Implementation of Law Enforcement and Disciplinary Policies in the Instruction of the Minister of Home Affairs No. 15 of 2021 in Banten. KnE Social Sciences, 101–113.
Susanto, H., Mardhiah, N., & Susanto, A. K. S. (2022). Crafting Strategies of Security Breaches: How Financial Technology Business Modela Work in Data-Centric Approaches. In FinTech Development for Financial Inclusiveness (pp. 214–234). IGI Global.
Tidke, S. K., Karde, P., & Thakare, V. (2017). Identification of Botnet hidden behind smartphone applications. 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 420–424.
Troshchenkov, S., & Halona, I. (2024). International security system in the light of cyber threats: legal issues and prospects. Публічне Управління і Політика, 1, 63–72. https://doi.org/10.70651/3041-2498/2024.1.07
Wahyudi, D. (2013). Perlindungan Hukum Terhadap Korban Kejahatan Cyber Crime Di Indonesia. Jurnal Ilmu Hukum Jambi, 4(1), 43295.
Wiryawan, D., Suhartono, J., Fernando, Y., So, I. G., & Gui, A. (2019). Malware Mobile Devices in Indonesia. KnE Social Sciences, 259–267. https://doi.org/10.18502/KSS.V3I22.5055
Zakaria, S. N., & Zolkipli, M. F. (2021). Review on mobile attacks: Operating system, threats and solution. Borneo International Journal EISSN 2636-9826, 4(2), 8–16.