How do scammers trick you?

2023-12-12 21:31:09

Cyber ​​scams are becoming more and more sophisticated! It is therefore essential to understand how scammers operate so as not to fall into their traps. Let’s find out here how they go regarding deceiving their victims.

Phishing: a extremely effective technique

Better known as phishing in English, Phishing is one of the favorite methods of scammers on the Internet. This technique consists of usurping the identity of trusted institutions such as banks or administrations to encourage Internet users to communicate their personal or banking data.

Cybercriminals send fraudulent emails that perfectly imitate real emails from targeted organizations. These messages usually contain links that lead to fake sites where victims are asked to enter their confidential information.

Many people still fall into this type of trap, often through lack of vigilance. To find out more, you can read theCyberghost study.

Phishing by phone or SMS

Scammers are also increasingly using the telephone or text messages to trap their victims. That’s what we call smishing or vishing. The technique is similar to email phishing. Criminals contact their targets by pretending to be legitimate companies and attempt to obtain personal or banking information.

For example, they can pretend there is an anomaly on your account and ask you to confirm your credentials to remedy. Many victims fall into this type of subterfuge, being used to receiving calls from their bank.

cyber scammers

The fake technical support scam

The fake technical support scam is also widely used by web fraudsters. In this scenario, criminals make contact with their prey by posing as computer technicians affiliated with large companies like Microsoft or Apple.

They generally claim to have detected a problem or virus on the victim’s computer. They then offer to help resolve it and request remote access to the device.

Once connected, they can recover passwords, banking information or install malware. This manipulation of victims is very effective and lucrative for these faux supports techniques.

Fake e-commerce sites

Fake online stores are another trap where many Internet users leave their personal and banking data. THE cybercriminals create e-commerce sites that perfectly imitate real, well-known brands, with a similar URL and design.

The content is generally copied/pasted from the official website for authenticity. Attractive prices encourage victims to place orders without suspicion. After payment, delivery never arrives! Worse, banking data is already in the hands of fraudsters. This type of scam is increasingly successful and difficult to detect.

Phishing on social networks

With the rise of social networks, scammers have found a new pool of potential victims on these platforms. They create fake profiles, copy photos from existing profiles, and send friend requests to build a network of contacts.

Once trust is established, they may share phishing links or offer fake investment scams. They take advantage of the reduced vigilance of users on these exchange spaces to better manipulate and extract funds or personal information.

1702463103
#scammers #trick

Leave a Replay