Be scam aware and keep your assets secure

Scam alert.jpg.jpg

Social engineering scams are on the rise. Here we outline some of the most prevalent scam trends and what to watch out for.

An estimated £2.7bn worth of fraud passed under the noses of UK targets during 2022. Thankfully, over half of those attempts were prevented by various financial institutions. But this still resulted in countless people finding themselves £1.3bn out of pocket, collectively speaking.

In many instances, it is the victim’s own response that results in financial loss. Actions taken whilst in a state of heightened emotion, where feelings such as impatience, fear or intrigue can override rational instincts. Often dubbed “social engineering”, these types of attacks rely on an acute understanding of psychology coupled with some high-level cyber and tech expertise. They represent an all-too-real and ever-growing threat to us all.

Honey Trap Scams

Let’s start with one of the oldest tricks in the book: building a personal relationship with someone and pouncing once their trust has been gained. In a honey trap scam, sometimes known as a romance scam, a fraudster will set up a bogus profile on a social media platform or dating app and pose as a potential love interest.

They go on to invest time in developing what appears to be genuine intimacy or friendship. But once they feel the groundwork is set, they will go on to take the victim for as much as they can. Sometimes they present themselves as being in an unfortunate situation and needing emergency funds. Other times they might share tips for purchases or investments, which of course will never come through.

Phishing

This is probably one of the best-known types of scams around. Victims receive emails or social media messages that appear bona fide but they are not. They might, for example, purport to be from a well-recognised institution, often containing plausible branding and originating from a seemingly genuine account or address. They could even seem to come from a real-life acquaintance or family member. Recipients are asked to either reply (sharing sensitive information), download attachments (containing malware) or follow bad web links.

Smishing

The mobile phone-based equivalent of phishing involves an SMS arriving from what many assume to be a legitimate source and encouraging the target to unwittingly make themselves vulnerable by following the instructions contained in the message. Phishing and smishing scams take many guises and are often fine-tuned to take advantage of a victim’s known interests, as well as issues that are topical and affecting many people at the time of sending. They are extremely prevalent, and people unfortunately succumb to them every day.

Vishing

Here’s another twist on the theme: rather than a message in text format, the victim’s phone will ring with the caller then introducing themselves as being from a well-known service provider, likely one they use. Their story will probably involve a suspicious transaction, a new offer or some other cause for requesting personal account details.

One example of vishing calls doing the rounds was an incoming call with a pre-recorded message claiming to be from HMRC and informing the recipient of a problem with their account. The emotional jolt of believing they might be the subject of investigations or penalties is enough to push many toward “pressing ‘1’ to speak to an agent” and that’s never going to end well. Sophisticated versions known as “hybrid vishing” employ additional social engineering tricks to strengthen their impact.

Deepfakes

Currently on the rise, these scams make use of advanced computer software to modify or fabricate the content of videos and audio recordings, spreading disinformation and generating strong reactions.

Deep voice technology, speech synthesisation, face swapping and expression manipulation can all be seamlessly employed to shockingly realistic effect, with huge potential for influencing people, extorting money, changing consumer behaviour and blackmailing, amongst other purposes.

Some of the recently detected deepfake confidence trickery includes criminals securing positions in organisations through face-swapped employment interviews, celebrities seemingly endorsing dodgy products, and world leaders being seen to give fake military orders. This one scam looks set to become an ever more serious threat.

Watering-hold attacks

Hackers are always on the lookout for opportunities to infiltrate popular websites and apps. They will identify security weaknesses and use these weaknesses to deliver malware to the devices of site visitors and app users. This may be via a surreptitious infection or even by encouraging users to download material from their trusted sites.

The malware could take many forms but will often allow attackers to gain remote access to files, cameras and microphones to observe behaviour, either with espionage in mind or to glean insights that will enable further scamming. For example, some proceed to impersonate regular email correspondents and request that a bill be paid to a different account.

CEO/CFO fraud or business email compromise

One of the highest-netting scams around, this form of phishing involves the impersonation of senior management, apparently contacting their staff with legitimate financial queries. They may request money transfers to be made or tax or payroll documents to be sent. The information is then harvested and used to extract funds. The authoritative tone of voice and urgency of the request, sometimes coupled with calls for a matter to be dealt with confidentially, can cause employees to act without obtaining verification.

Remain vigilant in the face of potential scams

As soon as an unsolicited contact asks for a response involving personal disclosure, even as innocent as confirming the make of your handset, alarm bells should start ringing.

First and foremost, keep calm. Give yourself a moment. Try to stay rooted in rational response to mitigate the emotional pressure that social engineering scams can place on you. Be especially cautious of anything demanding urgent action.

Always remember who instigated an exchange and when in doubt, do not hesitate to terminate a conversation on one platform to pick it up again via another method e.g. contact details listed on the company’s website or alternative means of reaching people you know.

Check spelling, grammar and the tone of content you receive. Scrutinise email and web addresses for incorrect endings or non-standard characters. Keep an eye out for bad-quality brand images too. If it doesn’t feel right, it probably isn’t.

Seek verification and fact-check wherever you can. Try to avoid taking new information at face value and ask friends and family for advice when unsure.

Use different, secure passwords for each account, with strong malware protection and firewalls on your devices. Also, consider using encryption.

Never divulge answers to security questions or whole passcodes to incoming callers.

Report all suspicious activity to help authorities shut down risks to other users.

If you lead a team, ensure they are provided robust training in good security practices to recognise and deal with scams. Ensure good examples are set throughout the company and regularly reinforce the need for caution and accountability. This will also help to ward off cyber threats, data breaches and fraud.

Enjoyed this? Read more from Pierce CA Ltd

Latest news

1

University of Central Lancashire celebrates hat-trick of wins at Educate North Awards University of Central Lancashire winners at Educate North Award Winners 2025

University of Central Lancashire celebrates hat-trick of wins at Educate North Awards

04 Apr 2025

2

The Villa’s sister venue shuts its doors The Villa Levens and The VillaWrea Green (Image credit: The Villa Levens and The Villa Wrea Green)

The Villa’s sister venue shuts its doors

04 Apr 2025

3

PM urged not to retaliate over tariffs Manufacturing

PM urged not to retaliate over tariffs

03 Apr 2025

4

CMAC Group appoints Matthew Ratcliffe as chief operating officer Matthew Ratcliffe CMAC

CMAC Group appoints Matthew Ratcliffe as chief operating officer

03 Apr 2025

5

For sale signs at The Villa Villa Wrea Green has been brought to market (Image credit: The Villa Wrea Green)

For sale signs at The Villa

02 Apr 2025

Pc Prestonmacan Gif980x120 March
Background image for hub sign up block

LBV Hub

Leverage Lancashire Business View platforms

Post your news
Post your events
Post your offers
Build your network
Improve your SEO
Gain coverage in the magazine
Sign-up
Events
Lancashire Net Zero Carbon Conference
Net Zero Carbon Social 1200px
Networking
18 Jun 2025

Lancashire Net Zero Carbon Conference

Crow Wood Hotel & Spa Resort, Burnley, BB12 0RT

08:30 - 13:00

CMI Level 5 Management and Leadership Course
UCLanAerialCampus.jpg.jpg
LBV Hub Seminars
21 Feb 2025 - 21 Feb 2026

CMI Level 5 Management and Leadership Course

Preston Campus, Preston , PR1 2HE

09:00 - 17:00

CMI Level 5 Project Management Course
UCLanAerialCampus.jpg.jpg
LBV Hub Seminars
21 Feb 2025 - 21 Feb 2026

CMI Level 5 Project Management Course

Preston Campus, Preston, PR1 2HE

08:00 - 17:00

RISE - The Academy for Female Leaders and Managers
WENDY BOWERS RISE Illustrstion copy.jpg.jpg
LBV Hub Seminars
02 Apr 2025 - 08 Oct 2025

RISE - The Academy for Female Leaders and Managers

East Lancashire Chamber of Commerce, Clayton le Moors, BB5 5JR

09:00 - 15:30

The Business Network Central & East Lancashire
LBV Hub Networking
24 Apr 2025 - 24 Apr 2025

The Business Network Central & East Lancashire

Stanley House, Blackburn, BB2 7NP

11:30 - 14:15

People Power: Exclusive Event Series
Stay ahead in 2025.jpg.jpg
LBV Hub Seminars
29 Apr 2025 - 29 Apr 2025

People Power: Exclusive Event Series

People's History Museum, Manchester, M3 3ER

17:00 - 21:00

Planning for the future + navigating Inheritance Tax changes
Planning for the future + navigating Inheritance Tax changes for website.png.png
LBV Hub Seminars
01 May 2025 - 01 May 2025

Planning for the future + navigating Inheritance Tax changes

Stanley House Hotel, Mellor, Blackburn, BB2 7NP, Blackburn, BB2 7NP

08:00 - 10:30

A night at the races
1.png.png
LBV Hub Dinners / Balls
02 May 2025 - 02 May 2025

A night at the races

Morecambe FC, Morecambe, LA4 4TB

19:00 - 23:59

Celebrating 50 years of KTP
UCLanAerialCampus.jpg.jpg
LBV Hub Networking
07 May 2025 - 07 May 2025

Celebrating 50 years of KTP

University of Central Lancashire , Preston, PR1 2HE

16:00 - 18:00

Research and Knowledge Exchange Showcase
13421_research_knowledge_exchange_2025_600x300.jpg.jpg
LBV Hub Awards
07 May 2025 - 08 May 2025

Research and Knowledge Exchange Showcase

University of Central Lancashire , Preston, PR1 2HE

09:00 - 17:00

Innovating business solutions through PhD Partnerships
30478 Skills Bootcamp open day setting.jpg.jpg
LBV Hub Networking
07 May 2025 - 07 May 2025

Innovating business solutions through PhD Partnerships

University of Central Lancashire, Preston , PR1 2HE

14:30 - 15:30

Enhancing Your Workforce with CPD
LBV Hub Networking
08 May 2025 - 08 May 2025

Enhancing Your Workforce with CPD

University of Central Lancashire, Preston, PR1 2HE

13:15 - 14:15

Advertise with us

Reaching 50,000 members, our print, digital and event platforms offer a fantastic way to raise your business profile and help you grow.

Find out more Lbv121 Online Graphic
Subscribe now

Weekly news bulletin