Internet scams and deception
"They don't look a gift horse in the mouth", "For free and sweet vinegar" - these proverbs appeared long before the Internet. Their main message is that everything that is free is good. Now the main communication has migrated to the Internet and the message has been transformed, but the pursuit of "freebies" still pushes people to commit rash actions and get caught by scammers.
It's easier to create anonymity on the Internet, disappear when needed, and go unpunished than in real life. It was especially easy at the turn of the 00s, when the Internet was just beginning to spread in the post-Soviet space. On the one hand, ordinary people who did not know the precedents of deception in the network and thus, are led to various kinds of scams, and on the other hand, they are not prosecuted by the law fraudsters.
What were the first scams?
Some schemes are already so hackneyed that no one seems to be using them anymore, but there are naive users who fall into the traps of swindlers: 1) Congratulations, you've won a million! The eyeliner can be different - from "you are the thousandth site visitor" to "win-win lottery", where the essence is the same - you are offered a gift for luck, but in order to receive it, you should transfer a commission or participation tax. As a result - no money, no prize. 2) Sell for a penny! Applies to the first online purchases. You want to purchase a product and find it at a pleasant price. The seller asks for an advance payment, sometimes in the amount of 100% and disappears forever. 3) The most beautiful pyramid we have! Financial pyramids have migrated to the Internet, where the main goal is to invest with the promise of multiplication by attracting new participants. 4) Nigerian letter. You receive an offer to help the "rich uncle" withdraw money from the country for which you will receive a percentage for the help. But, you need to pay the commission, which goes to the scammers, and you are left with a letter as a souvenir.
What tools do scammers use?
Nowadays, many online stores have a secure payment system, suspicious emails end up in spam, and clickbait advertisements promising a mountain of money are almost unresponsive. But for every smart system, there is someone who can cheat it. On the one hand, there are more protection tools, on the other hand, there is also more data on the Internet, so let's take a look at the actual tools used by fraudsters. 1. Databases - personal data of a certain number of people caught in the network, from phone numbers to credit card numbers. Often, people themselves put personal information in the public domain. Therefore, an attacker can call you by name or know your credit card number - this will give you confidence and force you to transfer data to him. 2. Carding - receiving card data and debiting funds. There are several types - phishing, skimming, hacking terminals or ATMs. Internet fraud concerns phishing - it is "fishing" for card details through letters from "pseudo-banks" or "pseudo-shops". 3. IP telephony - substitution of numbers using special services. The fraudster will have a better chance of obtaining information if the number looks like an ordinary bank number. The servers of such services are located abroad, which means that the state will not persecute them. 4. Extortion - a virus program that enters the device and tricks you into following a link, after which the scammers gain access to the data. Extortion, because criminals can ask the victim for a ransom for personal data.
What schemes are there?
A fraudulent method when a person himself provides data or money to scammers. It can be a "mailing of happiness" - the user is offered to receive a refund, a product at a discount or a unique offer, after which the user sends the information and says goodbye to them forever. Another type of scam is divorce on forums or in social networks, when a stranger is rubbed into trust, communicates for some time, learns information, and then asks for money for treatment / debt or offers to invest in his project. Digital coins Against the backdrop of the growth of cryptocurrency wallets, various fraudulent schemes appear. For example, a fake distribution of digital coins: attackers place advertisements that they are ready to double the number of coins that will be transferred to them. Thus, they misappropriate the money sent without returning anything.
This type of fraud is also called "fake courier delivery". Attackers place advertisements for goods with good prices on free sites. When a potential buyer responds to an ad, the scammer asks him to go to the messenger to further conclude a deal. Next, he asks to transfer funds to an account to arrange delivery. Emergency These are "urgent" letters / messages from loved ones or some service containing important information. For example, a user receives a message that their card is blocked and they need to send information or follow a link to restore the card. Then the criminals gain access to the data. Or, under the guise of a friend, he writes an account with an offer to watch a video or a photo from the last party. As a result, fraudsters gain access to data. Tests
It looks like a harmless scheme. The user is prompted to take a test - no matter what kind. In such polls, they are harmlessly asked to leave their data - mail, phone number, name. Information is collected in databases and used for personal gain.
Who are social engineers?
These are criminals who, by means of manipulation, obtain information and information for further machinations. According to statistics, most people themselves provide scammers with information about their personal data. Let's analyze the strategy of the scammer's behavior: Point 1. Create trust. Often, criminals are hiding behind representatives of banks, lawyers and other official organizations who contact by mail or phone. People do not expect a dirty trick from such structures. Before contacting a potential victim, an attacker will find the information he needs through databases or phishing sites to make the person believe him. Clause 2. Forgery of documents and numbers. With the help of IP-telephony, you can hide the phone number, and with the help of Photoshop, you can make the necessary documents or receipts for payment, when the funds are repaid, the funds will go to the account of the fraudsters. Point 3. Intimidate or lure. It is easy to cause fear with the phrase “I am a bank representative and right now a suspicious transaction is being carried out on your card”. The desire for easy enrichment can be exploited under the guise of "tax refunds" or "social benefits". Point 4. No time to think, give us money. Usually, swindlers do not give time to say anything and adequately assess the situation, because "a suspicious operation is about to take place", "this offer is only for you" and "the service urgently needs to be paid for." In a panic under pressure, a person can get confused and give out the necessary information.
How can I be safe?
New methods of deception appear all the time and the only way not to fall for them is to think critically and not agree to questionable proposals. We have compiled a checklist of rules that you should adhere to on the Internet: - Do not provide strangers with full details of cards and SMS with bank codes - Do not follow questionable links - Do not store a lot of money on the card that you use to pay on the Internet - After receiving a call from a financial institution, do not agree to their proposals if you are not sure that this is an official call. - Do not publish personal data in public - phone numbers, passport data, card details.
Why is an Internet intruder hard to catch?
Tools used by cybercriminals allow them to quickly hide: the use of browsers that provide anonymity, SIM card change and false names. They take their online anonymity responsibly to avoid harassment and liability.
How is internet fraud prosecuted?
Fraud is a criminal offense. It differs from theft in that by deception, the victim independently provides property or rights to it. Criminal liability for such crimes ranges from a fine to imprisonment. To initiate a criminal case, you need a statement from the victim, which most citizens do not do, leaving only reviews on the Internet. If this situation happened to you, contact the law enforcement authorities as soon as possible. Perhaps the fraudster did not manage to get rid of the SIM cards, delete the account, or erase the traces of being on the Internet. Thus, the chances of justice directly depend on how quickly you contact the relevant authorities.