3 Ways Cybercriminals Use Social Engineering to Steal Your Info

Cybercriminals use social engineering every day to attempt to hack into people’s personal information.  Social engineering preys on the human condition to gain trust, manipulate people, and get people to willingly give out personal information. In general, there are three major ways that cybercriminals use social engineering to steal your info.

Email

This is one of the most prominent ways that information is stolen. This side of social engineering has been around nearly as long as emails have. It’s guaranteed that anyone with an email account has seen at least one of the many phishing scams that come from cybercriminals.

Perhaps a Nigerian Prince would like to wire you a ton of money because his inheritance is wrapped up in the bank for some reason. All you need to do is pay a few fees to receive the money and you get to keep a portion of his millions. Totally legitimate right? Or maybe the bank needs you to confirm your account number and social security number because of an “account breach.”  Why not, right? The bank is a legitimate business, it must be real, even the email looks real. Better yet, wouldn’t you love to be a secret shopper? Receive a check for $1000, cash it, and perform a job. Innocent enough, right? Not after you wire initial fees and attempt to cash a bad check.

These are just some of the ways social engineers prey on unsuspecting and trusting people. If sending money or willingly giving up information isn’t involved, then there is usually malware within the email. The links in the email will deploy malware to infect your computer files and obtain information about you. It’s amazing how prevalent these scams are.

Now that so much communication takes place online, we are seeing more scams than ever, and they are more sophisticated than ever. Because of the heightened activity and risk, the Federal Trade Commission has issued guidelines to further assist you and to provide you with a method to report these cases.

Posing as Someone You Know

Another email scam involves cybercriminals posing as someone in your company, particularly the CEO or someone high up in the financial department. They send an email that looks like it’s from your boss asking you do something really quickly or process a PO immediately. Usually, something about the email address will be a bit off, if you’re paying attention. Letters are swapped around or a .net becomes a .com at the end of the email. As soon as you open it or click on a link, malware infects your computer. This scam is usually highly effective because it gets sent to everyone in the company, and people often take it as important because it came from the “boss.”

The most obvious way to pose as someone you know is through copycat Facebook profiles. Cybercriminals use this prominent scam to trick people into thinking they are receiving a friend request from someone they know. The profile will often contain a few photos from the original person’s profile, so it looks a tad more real. As unsuspecting friends add this profile, it begins to look more legitimate because of similar friends and associates. This profile can ask for money or send links containing malware to infect your computer, or even corrupt your Facebook profile by gaining access to personal information.

Advertisements

Finally, a newer way for cybercriminals to target people is through advertisements. Considering ads are pretty much everywhere online now, creating ransomware ads is incredibly easy and a bit difficult to spot among the hundreds of ads people see every day. For this type of social engineering, cybercriminals literally deploy ad campaigns showcasing a product or a service. When you click on the ad, it downloads malware or ransomware onto your computer. Most of the time these ads are for anti-virus software, or a pop-up will come on your computer saying your computer has been infected and instruct you to click the link to clean the virus. Cybercriminals can also create ads that sell fake products, often for very cheap items, which then get overlooked. Tricky, tricky cybercriminals.

The key to spotting these three general social engineering styles is to become educated on them and keep an eye out for anything that seems off. If something seems strange or wrong, avoid it until you are certain it is safe. Try not to click on any links inside of emails unless you confirm and absolutely trust the sender. If you’re asked to click a link and update account info, type in the web address to the real site rather than click the link. If you get a friend request from someone, look over their profile and ensure its real. Check out their friends, photos, and posts to ensure they aren’t fake. Check to see if you already have that friend on your list. Finally, don’t trust any anti-virus pop-ups or ads. Stay safe out there and don’t become yet another victim to cybercriminals!

Categories

Related Posts

technology strategy

Technology Strategy: Your Blueprint for Business Growth and Profit

A strategic technology plan isn’t just a wish list of new tools. It’s a carefully crafted roadmap that transforms technology from a necessary expense into a powerful driver of business success. The difference between companies that thrive and those that merely survive often comes down to how well they align their technology investments with their business objectives.

Read More »