CFP last date
20 October 2025
Call for Paper
November Edition
IJCA solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 20 October 2025

Submit your paper
Know more
Random Articles
Reseach Article

Forensic Analysis of Online Fraud on Telegram Web using Digital Forensics Workshop Method

by Kurnia Agustia Arifin, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 30
Year of Publication: 2025
Authors: Kurnia Agustia Arifin, Imam Riadi
10.5120/ijca2025925515

Kurnia Agustia Arifin, Imam Riadi . Forensic Analysis of Online Fraud on Telegram Web using Digital Forensics Workshop Method. International Journal of Computer Applications. 187, 30 ( Aug 2025), 4-11. DOI=10.5120/ijca2025925515

@article{ 10.5120/ijca2025925515,
author = { Kurnia Agustia Arifin, Imam Riadi },
title = { Forensic Analysis of Online Fraud on Telegram Web using Digital Forensics Workshop Method },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2025 },
volume = { 187 },
number = { 30 },
month = { Aug },
year = { 2025 },
issn = { 0975-8887 },
pages = { 4-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number30/forensic-analysis-of-online-fraud-on-telegram-web-using-digital-forensics-workshop-method/ },
doi = { 10.5120/ijca2025925515 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-08-20T21:35:15.247686+05:30
%A Kurnia Agustia Arifin
%A Imam Riadi
%T Forensic Analysis of Online Fraud on Telegram Web using Digital Forensics Workshop Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 30
%P 4-11
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The development of information technology has facilitated communication, but it has also increased digital crimes such as online fraud. Telegram Web as a popular messaging application has become one of the means of criminal action. This study aims to analyze cases of online fraud through Telegram Web using the Digital Forensics Research Workshop (DFRWS) method. The DFRWS methodology consists of six stages, namely identification, maintenance, collection, examination, analysis, and presentation. In the investigation process, several digital tools such as FTK Imager, Browser History Examiner, and Chrome DevTools were used to obtain digital evidence in the form of conversations, browser history, and image evidence. The results of the study show that the DFRWS method is effective in finding and validating hidden digital evidence, as well as assisting with legal investigations. This study is expected to be a reference in the development of digital crime investigations.

References
  1. S. Azizah, S. A. Ramadhona, and K. W. Gustitio, “Analisis Bukti Digital pada Telegram Messenger Menggunakan Framework NIST,” REPOSITOR, vol. 2, no. 10, pp. 1400–1405, 2020.
  2. J. Triyanto, S. Sunardi, and I. Riadi, “Analisis Investigasi Cyber Espionage Pada Facebook Menggunakan Digital Forensics Research Workshop (DFRWS),” Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto), vol. 23, no. 1, 2022, doi: 10.30595/techno.v23i1.9064.
  3. N. Citra Dewi, T. Sutabri, and F. Putrawansyah, “Analisis Penyadapan Pada Telegram Dengan Network Forensic,” JIKO (Jurnal Informatika dan Komputer), vol. 7, no. 2, p. 183, Sep. 2023, doi: 10.26798/jiko.v7i2.789.
  4. I. Riadi, T. Ruslan, A. Dahlan Jl Soepomo Umbulharjo, and K. Yogyakarta, “Forensik Multimedia Berbasis Mobile Menggunakan Metode National Institute Of Justice.”
  5. M. S. Asyaky, N. Widiyasono, and R. Gunawan, “Analisis dan Perbandingan Bukti Digital Aplikasi Instant Messenger Pada Android,” Jurnal & Penelitian Teknik Informatika, vol. 3, no. 1, 2018.
  6. A. Yudhana, I. Riadi, I. Zuhriyanto, and A. Dahlan, “Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS),” vol. 20, no. 2, pp. 125–130, 2019.
  7. A. Yudhana, Imam Riadi, and Budi Putra, “Digital Forensic on Secure Digital High Capacity using DFRWS Method,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 6, pp. 1021–1027, Dec. 2022, doi: 10.29207/resti.v6i6.4615.
  8. A. Fahrudin, G. Z. Muflih, and T. Informatika, “Analisis Forensik Digital Pada Pesan Whatsapp Yang Terenkripsi Dengan Pretty Good Privacy ( PGP ) Menggunakan Framework DFRWS,” vol. 9, no. 1, pp. 780–787, 2025.
  9. S. Keputusan Dirjen Penguatan Riset dan Pengembangan Ristek Dikti, I. Riadi, and M. Hajar Akbar, “Terakreditasi SINTA Peringkat 2 Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi pada Bukti Digital Menggunakan Framework DFRWS,” masa berlaku mulai, vol. 1, no. 3, pp. 576–583, 2017.
  10. Elsya indah Fitria, “Penerapan Digital Forensics Research Workshop Dalam Akuisisi Evidence Forensik Snack Video,” Jurnal Komputer Teknologi Informasi dan Sistem Informasi (JUKTISI), vol. 2, no. 2, pp. 390–399, 2023, doi: 10.62712/juktisi.v2i2.108.
  11. S. K. Dirjen et al., “Terakreditasi SINTA Peringkat 2 Analisis Perbandingan Tools Forensic pada Aplikasi Twitter Menggunakan Metode Digital Forensics Research Workshop,” masa berlaku mulai, vol. 1, no. 3, pp. 829–836, 2017.
  12. M. Wibowo, M. R. Firmansyah, and ..., “Analisis Bukti Digital Pada Aplikasi Discord Desktop Dengan Menggunakan Framework Dfrws,” Jurnal Teknologi …, vol. 15, no. 1, pp. 98–111, 2024.
  13. I. Gunawan, O. Gregorius Grasia, and P. Studi Informatika, “Analisis Digital Forensic Aplikasi Pelacak Nomor Handphone Android Pihak Ketiga Menggunakan Metode Statis Dan Dinamis Digital Forensic Analysis Of Third Party Android Cellphone Number Tracker Applications Using Static And Dynamic Methods,” Seminar Nasional Hasil Penelitian & Pengabdian Masyarakat Bidang Ilmu Kompute, vol. 2, p. 97, 2023.
  14. L. Flueratoru, E. S. Lohan, and D. Niculescu, “Challenges in platform-independent UWB ranging and localization systems,” WiNTECH 2022 - Proceedings of the 2022 16th ACM Workshop on Wireless Network Testbeds, Experimental evaluation and CHaracterization, Part of MobiCom 2022, pp. 9–15, 2022, doi: 10.1145/3556564.3558238.
  15. Ramansyah, “Investigasi Bukti Digital pada Platform Cloud Gaming Menggunakan Framework FRED Studi Kasus pada Skyegrid Cloud Gaming Services,” pp. 1–66, 2021.
  16. F. O. F. Science and K. Vincent, “Department Of Computing And Informatics Forensic Analysis Of Evernote Data Remnants On Windows 10,” vol. 10, no. November, 2022.
  17. Imam Riadi, Abdul Fadlil, and Muhammad Immawan Aulia, “Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST),” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 5, pp. 820–828, 2020, doi: 10.29207/resti.v4i5.2224.
  18. N. Maharani, A. Lamminar, N. Christiansen, and A. R. Rafidah, “Media Hukum Indonesia ( MHI ) Validitas Bukti Digital dan Legalitas Penangkapan Pada Kasus Peretasan Akun Media Sosial Ravio Patra Media Hukum Indonesia ( MHI ),” vol. 2, no. 3, pp. 75–81, 2024.
  19. S. Adira Kania and D. Endrawati Subroto, “Analisis Penggunaan Telegram dan Youtube Untuk Meningkatkan Literasi Digital Mahasiswa Universitas Bina Bangsa,” Journal Of International Multidisciplinary Research, pp. 186–192, 2023.
  20. R. Inggi and H. P. Alam, “Analisis Forensik Web Browser,” Jurnal Sistem Informasi dan Teknik Komputer, vol. 8, no. 1, pp. 215–220, 2023.
  21. A. Anjani Nurdin et al., “Media Hukum Indonesia (MHI) Analisis Penipuan Online Melalui Media Sosial Dalam Perspektif Kriminologi,” vol. 2, no. 2, p. 74, doi: 10.5281/zenodo.11183088.
  22. Mega Rosita, “Analisis Komparatif Performa Ftk Imager dan Autopsy dalam Forensik Digital pada Flashdisk,” Info Kripto, vol. 17, no. 3, 2023, doi: 10.56706/ik.v17i3.83.
  23. H. Adamu, A. Ahmad Adamu, A. Adamu Ahmad, A. Hassan, and ad Barau Gambasha, “IJRSI) |Volume VIII, Issue V,” 2021. [Online]. Available: www.rsisinternational.org
  24. L. Chandra Pakaya, U. Ahmad Dahlan, and I. Riadi, “Forensic Analysis of Web-based Instant Messenger Applications using National Institute of Justice Method,” 2023. [Online]. Available: www.detiknet.com
  25. J. M. Moreno, N. Vallina-Rodriguez, and J. Tapiador, “Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API,” May 2023, [Online]. Available: http://arxiv.org/abs/2305.11506
  26. L. Jupriadi Fakhri, I. Riadi, and A. Yudhana, “Forensic Tools Comparison on File Carving using Digital Forensics Research Workshop Framework,” Scientific Journal of Informatics, vol. 10, no. 4, pp. 571–582, 2023, doi: 10.15294/sji.v10i4.46901.
  27. R. M. Genggam et al., “Analisis Bukti Digital Forensik pada Aplikasi Threads Menggunakan Metode Digital Forensic Research Workshop,” Afrizal Ajuj Mudzakkar \ Afrizal Ajuj Mudzakkar, vol. 22, no. 2, pp. 1–10, 2024.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensics Telegram Web Online Fraud DFRWS Digital Evidence