Special offer

Top 3 Social Engineering Scams

Reblogger Gabe Sanders
Real Estate Agent with Real Estate of Florida specializing in Martin County Residential Homes, Condos and Land Sales 3090099

Here's some important information for all of us who use computers (and who doesn't these days).  There are some nasty people out there who want to steal your information, identity and money:  

Original content by Robert Siciliano

Think about hackers breaking into accounts. If you think they need top-notch computer skills, you would be wrong. These days, instead of requiring skills behind a keyboard, hackers generally rely on strategy…specifically a strategy called social engineering. This means that hackers don’t have to be technical, but they DO have to be clever and crafty because they are essentially taking advantage of people and “tricking” them into giving information.

There are four main ways that hackers use social engineering:

  • Phishing – where hackers use email tricks to get account information
  • Vishing – similar to phishing, but through voice over the phone
  • Impersonation – the act of getting information in person
  • Smishing – getting account info through text messages

Phishing accounts for 77 percent of all social engineering incidents, according to Social Engineer, but in vishing attacks, alone, businesses lose, on average, $43,000 per account.

Here are the top scams that all consumers and businesses should know about as we move into 2017:

Scam Using the IRS

Starting from the holiday season stretching through the end of tax season, there are scams involving the IRS. One such scam uses caller ID to change the true number of the caller and replaces it with a number from Washington, D.C., making it look like the number is from the IRS. Usually, the hacker already knows a lot about the victim, as they got information illegally, so it really sounds legit.

In this scam, the hacker tells the victim that they owe a couple of thousands of dollars to the IRS. If the victim falls for it, the hacker explains that due to the tardiness, it must be paid via a money transfer, which is non-traceable and nonrefundable.

BEC or Business Email Compromise Scam

In the business email compromise, or BEC scam, a hacker’s goal is to get into a business email account and get access to any financial data that is stored within. This might be login information, back statements, or verifications of payments or wire transfers.

Sometimes a hacker will access the email by using an email file that contains malware. If an employee opens the file, the malware will infect the computer and the hacker has an open door to come right in.

Another way that hackers use the BEC scan is to access the email of a CEO. In this case, they will impersonate the CEO and tell the financial powers that be that he or she requires a wire transfer to a bank account. This account, of course, belongs to the hacker not the business. When most people get an email from their boss asking them to do something, they do it.

Ransomware

Finally, hackers are also commonly using ransomware to hack their victims. In this case, the hackers are working towards convincing targets to install dangerous software onto their computer. Then, the computer locks out the data and the victim cannot access it…until he or she pays a ransom.

At this point, they are informed that they can get access back when they pay a ransom. This might range from a couple of hundred to several thousands. Usually, the hackers demand payment by bank transfer, credit card, bitcoin, PayPal, or money transfer services. Victims are usually encouraged to go to a certain website or call a certain number Unfortunately, too often, once the victim pays the ransom, the hacker never opens up the system. So now, the hacker has access to the victim’s computer and their credit card or financial information.

The way social engineering works in this scam is varied:

One way is this…imagine you are browsing the internet, and then you get a popup warning that looks quite official, such as from the FBI. It might say something like “Our programs have found child pornography on your computer. You are immediately being reported to the FBI unless you pay a fine.” When you click the popup to pay, the program actually downloads a program called spyware to your computer that will allow the hacker to access your system.

Another way that social engineering works with ransomware is through voice. In this case, you might get a phone call from someone saying they are from Microsoft and the representative tells you that they have scanned your computer and have found files that are malicious. Fortunately, they can remotely access the machine and fix the problem, but you have to install a program to allow this. When you install it, you give them access to everything, including personal and financial information, and they can do what they want with it.

Finally, you might get an email offering a free screen saver or coupon, but when you open it, the software encrypts your drive and takes over your computer.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Laura Cerrano
Feng Shui Manhattan Long Island - Locust Valley, NY
Certified Feng Shui Expert, Speaker & Researcher

I think there's a couple different ones that are similar to this one or these ones rather. Everybody be careful and just be smart!

Jan 24, 2017 11:40 PM
Gita Bantwal
RE/MAX Centre Realtors - Warwick, PA
REALTOR,ABR,CRS,SRES,GRI - Bucks County & Philadel

This is a great post to reblog. I hope others will read it too and learn.

Jan 25, 2017 04:32 AM
Debbie Reynolds, C21 Platinum Properties
Platinum Properties- (931)771-9070 - Clarksville, TN
The Dedicated Clarksville TN Realtor-(931)320-6730

I have know a couple of people that were victims of the ransomware scam. The frustration doesn't begin to express all they went through and the expense of having to have their hard drives wiped.

Jan 25, 2017 07:20 AM
Roy Kelley
Retired - Gaithersburg, MD

This is an excellent selection for a reblog and great information to share.

Jan 25, 2017 07:51 AM
Robert Bob Gilbert
Berkshire Hathaway HomeServices Anderson Properties - Katy, TX
Your Katy TX ( West of Houston) Real Estate Expert

Gabe, Thanks for this useful post concerning hackers using social engineering. 

Jan 25, 2017 12:08 PM
Laura Cerrano
Feng Shui Manhattan Long Island - Locust Valley, NY
Certified Feng Shui Expert, Speaker & Researcher

I recently saw that there might be a new scams out there from the ones you posted yesterday. Everybody watch out!

Jan 25, 2017 11:47 PM
Peter Mohylsky, Destin BeachPro
PMI. Destin - Miramar Beach, FL
Call me at 850-517-7098

I am always amazed that these scams have any opportunity to succeed.  Thanks for sharing.

Jan 26, 2017 01:59 AM
Gabe Sanders
Real Estate of Florida specializing in Martin County Residential Homes, Condos and Land Sales - Stuart, FL
Stuart Florida Real Estate

Thank you for stopping by and taking the time to read my re-blog.

Feb 21, 2017 06:41 AM
Gabe Sanders
Real Estate of Florida specializing in Martin County Residential Homes, Condos and Land Sales - Stuart, FL
Stuart Florida Real Estate

Thanks for your comments, it’s always good to hear from you.

Feb 21, 2017 06:41 AM