-
Delivery Service Phishing:
- How it Works: Scammers send emails that closely resemble notifications from reputable delivery services, claiming there’s an issue with a shipment or that additional information is needed to deliver a package. These emails often contain links to fake websites where victims are asked to enter personal information or payment details supposedly to resolve delivery issues or pay customs fees.
- Why it’s Effective: Many people shop online and expect package deliveries, so they may not question the authenticity of such emails, especially if they are expecting a package.
-
Banking Phishing Emails:
- How it Works: These emails mimic communications from banks or financial institutions and may alert you to unauthorized login attempts or ask you to verify account details for security purposes. The links included in the emails direct victims to counterfeit websites that steal financial information when entered.
- Why it’s Effective: The urgent nature of messages concerning financial security can prompt quick, unthinking responses from individuals concerned about protecting their assets.
-
Tech Support Scams:
- How it Works: Victims receive an email warning of a virus or an issue with their computer, often instructing them to download an attachment to run a diagnostic, or directing them to a fraudulent website. Alternatively, the email might include a phone number to call, at which point the scammer requests remote access to the user’s computer to “fix” the issue.
- Why it’s Effective: The scam exploits fears about data loss or hardware failure, leveraging the trust in well-known tech brands to convince victims to comply.
-
Job Offer and Recruitment Scams:
- How it Works: These emails may come from what appears to be a legitimate employer, offering a job that often seems too good to be true. The scammer may request personal information supposedly for a background check or ask for money to pay for training or special software necessary for the job.
- Why it’s Effective: Unemployment or the promise of a lucrative job opportunity can lead individuals to overlook red flags, especially if the job offer comes during a financially difficult time.
-
Fake Receipt for Overpriced Software Scam:
- How it Works: This scam begins when a business owner receives an email receipt for expensive software or a service they did not purchase. The email includes a customer service number to call to cancel the order. Once on the phone, the scammer may attempt to obtain credit card details, claiming they are necessary to process a refund. Alternatively, they might convince the victim to allow remote access to their computer, supposedly to help with the refund process. Another tactic involves directing the victim to log into their bank website while the scammer manipulates the display to show a false transfer of funds into the victim’s account. The scammer then claims that an error occurred and too much money was transferred, urging the victim to refund the excess amount. This is a deception; no actual funds are transferred, and any money sent by the victim goes directly to the scammer.
- Why It’s Effective: The alarming high cost noted on the receipt prompts recipients to act hastily to resolve the issue, bypassing their usual caution. The scam exploits the trust and goodwill of honest individuals, manipulating them into taking swift action to correct what they believe to be a clerical error, which makes them susceptible to fraud. The scam is particularly effective because it combines the urgency of financial loss with a feigned oversight, appealing to the victim’s integrity and desire to rectify mistakes.
-
Sextortion/Webcam Blackmail Scam:
- How it Works: This scam starts with an email claiming that the scammer has hacked into the victim’s operating system and gained full access to all devices, accounts, and even webcam feeds. The scammer alleges they have recorded video and audio from the victim’s webcam while they visited adult websites, claiming these sites were infected with malware that allowed such access. To make the threat seem credible, they might provide a password that the victim has used or currently uses. The scammer then demands a ransom, typically in Bitcoin, threatening to release the compromising videos and other personal data to the victim’s contacts if the payment is not made within a specified deadline, usually 48 hours.
- Why it’s Effective: The use of a known password (obtained from previous data breaches) adds credibility to the claims, instilling fear and urgency. The personal and potentially embarrassing nature of the alleged recordings pressures the victim into paying the ransom to protect their reputation. Victims often believe the threat is real because the scammer can provide specific details that seem to confirm their capabilities.
This scam preys on fear, embarrassment, and the victim’s lack of knowledge about what hackers can realistically achieve. It’s particularly insidious because it combines the threat of public shaming with a seemingly inescapable technological trap.
This scam is also a reminder to use strong and different passwords on different sites and devices. See my article on good passwords.