In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers.
This upfront investment (in social media marketing tools, for example) permits hackers to tailor their message such that it appears authentic, increasing their likelihood of extracting money from their intended victims.
Another tactic that hackers are beginning to exploit involves use of popular online advertising platforms (such as Google, Facebook, etc.) to obtain the Internet Protocol (IP) address of the person viewing a hacker-placed advertisement. This common technique, one that legitimate advertisers rely on to gain demographic information associated with their audience, provides hackers with a means to identify each ad viewer’s specific Internet Service Provider (ISP).
Know More: Email Encryption Service
Armed with ISP information, the hacker is then able to set up “re-marketing” ads that target each ad viewer with a banner ad that contains a falsified message and images pertaining to each viewer’s specific ISP. These re-marketing ads might, for example, claim to be a message from the specific ISP’s tech support team, telling the viewer that their computer is infected. A telephone number is displayed, instructing the viewer to call to fix the computer. This phone number goes to a hacker-directed call center, where an imposter poses as the ISP’s tech support specialist. From there, the imposter support person might convince a victim to pay him/her a few hundred dollars to remove the virus, as a premium support service. To do this, the imposter instructs the victim to provide them with remote access to their computer. With remote access, the imposter support staff is able to secretly access personal files that the hacker is able to exploit in other, more lucrative scams – all while opening standard system folders in the foreground to misdirect the victim.
Find More: Free Encrypted Email
Sound elaborate? This scam works, and its success is leading more hackers to jump in. It has been reported that one hacker made $17 million over the course of several months by persuading people to sign up for bogus tech support services and give credit card details that provided the scammers with a one-off payment of around $200 each. At the moment, the main target profile is consumers using Gmail, Yahoo mail, Microsoft Outlook.com/Hotmail, Verizon email, Time Warner Cable email, and AT&T email, accessed from Verizon, AT&T and Time Warner Cable ISP access.
People are literally paying to be scammed.
Armed with some awareness, you may recognize a scam like this one before it’s too late. Keep reading Tech Essentials every week to stay on top of the latest cybersecurity threats and services to help with online security, compliance, and productivity.
November 24, 2023
November 17, 2023
November 10, 2023
November 03, 2023
October 27, 2023