WeLiveSecurity 2024年07月05日
The many faces of impersonation fraud: Spot an imposter before it’s too late
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

网络诈骗越来越常见,冒充身份的骗局更是层出不穷。骗子利用各种手段伪装成可信的机构或个人,以获取你的个人信息或钱财。本文将介绍几种常见的冒充身份诈骗,并教你如何识别这些骗局,保护自己免受损失。

😠 请求金钱:你可能会收到来自声称是亲密家人或朋友的邮件、短信或私信,他们以各种理由要求紧急经济援助,例如被困海外或需要医疗救助。诈骗者可能会劫持合法的社交媒体和电子邮件账户,让你误以为是真实的朋友或家人联系你。

💻 远程访问:在技术支持诈骗中,来自技术公司、电信公司或其他看似合法机构的官员要求访问你的电脑,理由是你的电脑受到恶意软件的攻击。

👮‍♀️ 账户安全警报:你可能会收到来自警察或政府官员的电话,声称你的账户资金需要被分析,因为涉及到洗钱、毒品走私或其他严重罪行。他们会提供将你的资金转移到其他账户的‘安全保护’服务。

💰 虚假快递取款:你可能会收到来自官方机构的通知,声称需要派快递员到你家取现金、银行卡、贵重物品或 PIN 码,理由可能是帮助你的亲人摆脱困境或解决银行卡上的错误付款。

🎁 虚假赠品或折扣:你可能会被要求支付少量‘费用’才能领取赠品或折扣。当然,这些都是骗局,因为你不会获得任何奖励或折扣。

⚠️ 注意异常信息:网络钓鱼邮件通常包含一些不一致之处,可以帮助你识别它们是冒充身份的骗局。诈骗者会试图伪造显示名称以冒充发件人。但通过将鼠标悬停在名称上,你可以看到底部的隐藏电子邮件地址,这可能是一个不正式的地址。然而,请注意,诈骗者也可以劫持合法的电子邮件账户,并使用来电显示欺骗技术,让你更难区分真假。

💬 语言不规范:网络钓鱼邮件的另一个特征是语法和拼写错误,或者语言不精确,尽管现在诈骗者使用生成式 AI 来创建假消息,这种情况越来越少见。

🧠 保持警惕:请记住,冒充身份的骗局一直在不断变化,以上只是一些常见的例子。下一代骗局正在利用 AI 驱动的深度伪造技术,可以模仿可信人士的声音甚至外貌。这些技术已经让办公室职员将大笔公司资金转入网络罪犯控制的账户。该技术也被用于在社交媒体上冒充可信人士,以诱骗粉丝进行草率的投资。随着深度伪造技术变得更便宜、更易获得,它们也可能被用于小规模的诈骗。

💡 如何保护自己:遇到任何冒充身份的骗局,关键是保持怀疑,放慢速度,独立核实对方身份。可以通过直接联系该组织或个人来进行核实,不要回复初始消息中列出的电子邮件或电话号码。除非你确认联系方式是合法的,否则绝不提供任何金钱或个人信息。

Scams The many faces of impersonation fraud: Spot an imposter before it’s too late What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be? 18 Apr 2024  •  , 5 min. read Our world is becoming more impersonal as it becomes more digital-centric. And because we can’t see the person or organization at the other end of an email, social media message or text, it’s easier for scammers to pretend to be something or someone they’re not. This is impersonation fraud, and it’s fast becoming one of the highest earners for cybercriminals. According to the FTC, scammers impersonating businesses and governments made $1.1 billion from their victims in 2023.Impersonation fraud can take many forms, but with your eyes on the tell-tale signs of a scam, your personal information and hard-earned money will remain under lock and key.What does impersonation fraud look like?Like most fraud, impersonation scams are designed to get you to send the bad guys money, or personal/financial details which they can either sell on the dark web or use themselves to commit identity fraud. Phishing is perhaps the most obvious flavor of impersonation fraud: a scammer contacting you pretending to be a trusted entity requesting money or information.But there are other varieties. Fake social media accounts are a growing challenge; used to spread scam links and too-good-to-be-true offers. And fake mobile apps might impersonate legitimate apps to harvest personal info, flood your screen with ads or enroll you in premium-rate services.Impersonation scams are also evolving. According to the FTC, they increasingly blur channels and techniques, so that “a fake Amazon employee might transfer you to a fake bank or even a fake FBI or FTC employee for fake help.” How to spot the scammersContrary to popular belief, it’s not just the elderly who are at risk from impersonation scams. Research in the UK found that people under 35 are more likely to have been targeted by and fallen for this type of fraud. With that in mind, look out for these warning signs:Requests for money: A message on email, text or DM from someone purporting to be a close family member or contact. They’ll request urgent financial assistance due to some excuse such as they’re stranded overseas or needed medical help. Fraudsters can hijack legitimate social media and email accounts to make it seem as if it’s really your friend/family member contacting you.Remote access: In tech support fraud, an official from a tech company, telco or other legitimate-seeming organization requires access to your computer for some made-up reason such as it is compromised with malware.Figure 1. Example of tech support fraudAccess to your account: A police officer or government official contacts you out of the blue claiming money in your account needs to be analyzed as part of an investigation into money laundering, drug smuggling or some other serious crime. They offer to ‘keep it safe’ by moving it elsewhere.Pressure: The person on the other end of the phone, email, text or social media channel pressures you to act immediately. They’ll try to panic you into making a decision without thinking – such as sending money to a friend in danger, or transferring urgently to a government official. It’s a classic social engineering technique – sometimes even conducted in person or with a potentially frightening twist courtesy of AI tools that can be co-opted to perpetrate virtual kidnapping scams. Fake couriers retrieving money: An official offers to send a courier to come to your home address to pick up cash, cards, valuable items or PINs under all sorts of fake pretexts, such as helping your relative get out of trouble or to resolve a dodgy payment on your bank card.Account security alerts: These fake notifications often require you to ‘confirm’ your details first – another way for scammers to get hold of your personal and financial information.Figure 2. Bogus notificationUnusual messages: Phishing emails often contain inconsistencies which mark them out as impersonation fraud. Scammers will try to spoof the display name to impersonate the sender. But by hovering over the name, you can see the masked email address underneath, which may be an unofficial-looking one. Be aware, however, that scammers can also hijack legitimate email accounts and use caller ID spoofing to make it harder to tell the real from the fake.Fake delivery issues: Legitimate-looking postal/logistics firms demand that you pay a small fee or hand over bank details to enable safe delivery of your non-existent parcel. In other scenarios, fraudsters will pose as a well-known delivery service and alert you of ‘problems’ with your package.Figure 3. Made-up problemsGift cards: You’re asked to pay fines or one-off fees by buying high-value items or gift cards. The scammer wants you to do this rather than a bank transfer, as it’s far more difficult to trace.Fake subscription renewals: These may require you to connect the scammer to your computer to renew your subscription or process a non-existent refund.Figure 4. Bogus alertFictitious giveaways or discounts: These require you to pay a small ‘fee’ in order to claim them. Needless to say, there is no reward or discount as this is merely a variation on the advance fee fraud.Unusual language: Another tell-tale sign of phishing attempts could be poor grammar and spelling or imprecise language in messages – although with fraudsters using generative AI to create their fake messages, this is becoming less common.Stay alertRemember, impersonation scams are constantly evolving, so the above is certainly not an exhaustive list. The next evolution in such scams is coming thanks to AI-powered deepfakes, which can mimic the voice or even appearance of a trusted individual. These are already tricking office workers into making big-money corporate fund transfers to accounts under the control of cybercriminals. And the technology is being used to impersonate trusted individuals on social media in order to trick followers into making rash investments. As deepfakes become cheaper and more accessible, they could also be used in smaller scale fraud.With any impersonation fraud, the key is: be skeptical, slow down, and independently verify they are who they say they are. Do this by reaching out to the organization or individual directly, don’t reply to an email or phone number listed on the initial message. And never hand over money or personal information unless you’ve confirmed the contact is legitimate.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

网络诈骗 冒充身份 骗局识别 网络安全
相关文章