Be scam aware and keep your assets secure

Scam alert.jpg.jpg

Social engineering scams are on the rise. Here we outline some of the most prevalent scam trends and what to watch out for.

An estimated £2.7bn worth of fraud passed under the noses of UK targets during 2022. Thankfully, over half of those attempts were prevented by various financial institutions. But this still resulted in countless people finding themselves £1.3bn out of pocket, collectively speaking.

In many instances, it is the victim’s own response that results in financial loss. Actions taken whilst in a state of heightened emotion, where feelings such as impatience, fear or intrigue can override rational instincts. Often dubbed “social engineering”, these types of attacks rely on an acute understanding of psychology coupled with some high-level cyber and tech expertise. They represent an all-too-real and ever-growing threat to us all.

Honey Trap Scams

Let’s start with one of the oldest tricks in the book: building a personal relationship with someone and pouncing once their trust has been gained. In a honey trap scam, sometimes known as a romance scam, a fraudster will set up a bogus profile on a social media platform or dating app and pose as a potential love interest.

They go on to invest time in developing what appears to be genuine intimacy or friendship. But once they feel the groundwork is set, they will go on to take the victim for as much as they can. Sometimes they present themselves as being in an unfortunate situation and needing emergency funds. Other times they might share tips for purchases or investments, which of course will never come through.

Phishing

This is probably one of the best-known types of scams around. Victims receive emails or social media messages that appear bona fide but they are not. They might, for example, purport to be from a well-recognised institution, often containing plausible branding and originating from a seemingly genuine account or address. They could even seem to come from a real-life acquaintance or family member. Recipients are asked to either reply (sharing sensitive information), download attachments (containing malware) or follow bad web links.

Smishing

The mobile phone-based equivalent of phishing involves an SMS arriving from what many assume to be a legitimate source and encouraging the target to unwittingly make themselves vulnerable by following the instructions contained in the message. Phishing and smishing scams take many guises and are often fine-tuned to take advantage of a victim’s known interests, as well as issues that are topical and affecting many people at the time of sending. They are extremely prevalent, and people unfortunately succumb to them every day.

Vishing

Here’s another twist on the theme: rather than a message in text format, the victim’s phone will ring with the caller then introducing themselves as being from a well-known service provider, likely one they use. Their story will probably involve a suspicious transaction, a new offer or some other cause for requesting personal account details.

One example of vishing calls doing the rounds was an incoming call with a pre-recorded message claiming to be from HMRC and informing the recipient of a problem with their account. The emotional jolt of believing they might be the subject of investigations or penalties is enough to push many toward “pressing ‘1’ to speak to an agent” and that’s never going to end well. Sophisticated versions known as “hybrid vishing” employ additional social engineering tricks to strengthen their impact.

Deepfakes

Currently on the rise, these scams make use of advanced computer software to modify or fabricate the content of videos and audio recordings, spreading disinformation and generating strong reactions.

Deep voice technology, speech synthesisation, face swapping and expression manipulation can all be seamlessly employed to shockingly realistic effect, with huge potential for influencing people, extorting money, changing consumer behaviour and blackmailing, amongst other purposes.

Some of the recently detected deepfake confidence trickery includes criminals securing positions in organisations through face-swapped employment interviews, celebrities seemingly endorsing dodgy products, and world leaders being seen to give fake military orders. This one scam looks set to become an ever more serious threat.

Watering-hold attacks

Hackers are always on the lookout for opportunities to infiltrate popular websites and apps. They will identify security weaknesses and use these weaknesses to deliver malware to the devices of site visitors and app users. This may be via a surreptitious infection or even by encouraging users to download material from their trusted sites.

The malware could take many forms but will often allow attackers to gain remote access to files, cameras and microphones to observe behaviour, either with espionage in mind or to glean insights that will enable further scamming. For example, some proceed to impersonate regular email correspondents and request that a bill be paid to a different account.

CEO/CFO fraud or business email compromise

One of the highest-netting scams around, this form of phishing involves the impersonation of senior management, apparently contacting their staff with legitimate financial queries. They may request money transfers to be made or tax or payroll documents to be sent. The information is then harvested and used to extract funds. The authoritative tone of voice and urgency of the request, sometimes coupled with calls for a matter to be dealt with confidentially, can cause employees to act without obtaining verification.

Remain vigilant in the face of potential scams

As soon as an unsolicited contact asks for a response involving personal disclosure, even as innocent as confirming the make of your handset, alarm bells should start ringing.

First and foremost, keep calm. Give yourself a moment. Try to stay rooted in rational response to mitigate the emotional pressure that social engineering scams can place on you. Be especially cautious of anything demanding urgent action.

Always remember who instigated an exchange and when in doubt, do not hesitate to terminate a conversation on one platform to pick it up again via another method e.g. contact details listed on the company’s website or alternative means of reaching people you know.

Check spelling, grammar and the tone of content you receive. Scrutinise email and web addresses for incorrect endings or non-standard characters. Keep an eye out for bad-quality brand images too. If it doesn’t feel right, it probably isn’t.

Seek verification and fact-check wherever you can. Try to avoid taking new information at face value and ask friends and family for advice when unsure.

Use different, secure passwords for each account, with strong malware protection and firewalls on your devices. Also, consider using encryption.

Never divulge answers to security questions or whole passcodes to incoming callers.

Report all suspicious activity to help authorities shut down risks to other users.

If you lead a team, ensure they are provided robust training in good security practices to recognise and deal with scams. Ensure good examples are set throughout the company and regularly reinforce the need for caution and accountability. This will also help to ward off cyber threats, data breaches and fraud.

Enjoyed this? Read more from Pierce CA Ltd

Latest news

1

fulfilmentcrowd reports record-breaking performance LeeThompsonfulfilmentcrowd

fulfilmentcrowd reports record-breaking performance

20 Dec 2024

2

Record year for Grant Thornton Northern deals team The team

Record year for Grant Thornton Northern deals team

20 Dec 2024

3

New partner among family team hires as Brabners strengthens personal offer Cara Nuttall Chris Fairhurst And Hannah Saxe

New partner among family team hires as Brabners strengthens personal offer

20 Dec 2024

4

Amazing Accrington bring in almost £400k in funding to Hyndburn Clayton Boxing Club press.jpg.jpg

Amazing Accrington bring in almost £400k in funding to Hyndburn

19 Dec 2024

5

BAE Systems solar powered aircraft achieves new stratospheric success The flight

BAE Systems solar powered aircraft achieves new stratospheric success

19 Dec 2024

Background image for hub sign up block

LBV Hub

Leverage Lancashire Business View platforms

Post your news
Post your events
Post your offers
Build your network
Improve your SEO
Gain coverage in the magazine
Sign-up
Events
The Lancashire Festival of Business
FOB 315
Exhibitions
30 Jan 2025

The Lancashire Festival of Business

Impact Conferencing, Burnley, BB12 6QP

09:30 - 16:00

Skills Bootcamp in Procurement - Cohort 3
Blue-Modern-Land-Travel-Youtube-Thumbnail-2-1024x576.png.png
LBV Hub Awards
14 Jan 2025 - 18 Mar 2025

Skills Bootcamp in Procurement - Cohort 3

Community & Business Partners CIC, Blackburn, BB2 3UA

09:30 - 13:00

Preston Tech Connection - January Meet-Up
Nov Preston Tech Connection event banner-4.png.png
LBV Hub Networking
15 Jan 2025 - 15 Jan 2025

Preston Tech Connection - January Meet-Up

Society1 Coworking Space, Preston, PR1 3LT

18:00 - 19:30

R.I.S.E. and Shine
thumbnail_Emma Weston Illustration WENDY BOWERS RISE Illustrstion.jpg.jpg
LBV Hub Seminars
16 Jan 2025 - 16 Jan 2025

R.I.S.E. and Shine

East Lancashire Chamber of Commerce, Clayton le Moors, BB5 5JR

08:45 - 11:00

The Business Network Central & East Lancashire
LBV Hub Networking
16 Jan 2025 - 16 Jan 2025

The Business Network Central & East Lancashire

Mytton Fold, Langho, BB6 8AB

11:30 - 14:15

LBV120 Magazine Launch Event
DSC9389
Networking
17 Jan 2025

LBV120 Magazine Launch Event

Lancastrian Suite, Town Hall, Chorley, PR7 1DP

08:30 - 10:30

Red Rose Awards 2025
Red Rose Awards 2025
Awards
13 Mar 2025

Red Rose Awards 2025

Winter Gardens Blackpool

18:00 - 11:59

Advertise with us

Reaching 50,000 members, our print, digital and event platforms offer a fantastic way to raise your business profile and help you grow.

Find out more LBV118 Online Graphic
Subscribe now

Weekly news bulletin