The 5 most frequently used by fraudsters

in #fraud5 years ago

Kaspersky Lab experts underline that user data is a very valuable asset for fraudsters. This is evidenced by the analysis of events and unsolicited e-mails that are widely available in the media. Two-fold attention to the constantly evolving methods used by cyber-attackers is especially important when it comes to online attacks. The company has announced the 5 tricks most used by fraudsters.

  1. Fake notifications from social networks

The most common method of scams is fake notifications that appear to come from popular social networks. These are usually new friends, their actions, comments, likes and so on. Such messages are often indistinguishable from their realities. The only difference is that they often contain phishing links that are not easy to detect. The user following the link is prompted to enter the user name and password on a fake login page.

Another common use is messages that come from pseudo-social networks, which include, for example, a suspected activity in your account, or a new feature being launched and the threat that users who do not approve the terms will be blocked. Regardless of the situation, the message contains a button with a link to the phishing home page.

  1. Banking phishing

Phishing attacks aimed at stealing users' debit card information is still the most popular type of fraud. Fake messages can be sent on behalf of the bank or payment systems. The most common message topics relate to blocking the customer's personal account or identifying engellen suspicious action hesap in the account.

The user is asked to enter the bank card information (usually including the CVV / CVC code) to the counterfeit bank website on the pretext of restoring access to the account, acknowledging the credentials or canceling the transaction. When this information is received, the fraudsters immediately withdraw money from the victim's account.

  1. Popular services and fake notifications from vendors

Similarly, fake notifications are generated using the names of popular online stores, distribution services, booking sites, multimedia platforms, job search websites, and other popular online services. Cyber ​​criminals rely on the possibility that their messages will reach a number of users who use such services and will click or touch whatever they see in a panic.

  1. Fake notifications from e-mail services

Scammers send such unsolicited e-mails to obtain e-mail service users' usernames and passwords. One of the two commonly used remarks is that users are directed to renew their passwords or to increase the volume of the mailbox that is supposedly full. Where the excuse is for increasing the volume of the mailbox, the phishing link promises a significant increase in storage capacity. In the era of cloud computing, where the need for large amounts of data storage is constantly increasing, this promise does not appear very suspicious.

  1. Nigerian Prince fraud

Finally, one of the oldest types of spam is still in use. In this fraudulent form, a fortune is promised in return for a payment to a lawyer or a relative of a deceased millionaire. In a different version of the same subject, the fraudster appears as a famous celebrity. Victims are promised a great reward in exchange for helping an unfortunate millionaire to withdraw his money trapped in bank accounts. To do this, first of all, victims must provide detailed information about themselves (passport information, account data, etc.) and send a reasonable amount of money for paperwork.

Posted using Partiko Android

Coin Marketplace

STEEM 0.28
TRX 0.13
JST 0.033
BTC 62414.94
ETH 3019.57
USDT 1.00
SBD 3.58