Everything you need to know about Phishing Scams

E

 

what is phishing?

and what to do to ensure that this does not happen to you

Phishing is a way for scammers get money from users who are not careful enough when interacting with suspicious websites, emails or anything that could pose a potential threat to cybersecurity.

Once you click on a malicious link, your personal information will be used against you.

Due to the fact that users are sometimes not careful enough, they may become victims of phishing. This may be both an individual and a mass event, but there is one reason for this — the leak of personal information.

So what can be the result of the phishing attack?

     1. Over $140 000 stolen. Theft of identity and users’ confidential details.

Users of a large cryptocurrency exchange Poloniex were exposed to a phishing attack. Scammers created an application that was issued for the official application of the exchange. It was distributed via Google Play and collected with its help personal information of users.

  1. Your personal bank account data is stolen.

Such isolated cases are also quite common. In this case, you may lose your savings and access to your account.

  1. There are countless ways in which scammers can get to know your personal information.

The main result of such tricks will be the loss of your funds and the use of your personal information illegally.

Phishing victims

Not so long ago, users of a large cryptocurrency exchange Poloniex were exposed to a phishing attack. Scammers created an application that was issued for the official application of the exchange. It was distributed via Google Play and collected with its help personal information of users.

How to keep your personal data safe and secure?

  • In order not to fall for the tricks of scammers, just be careful with the interaction with questionable links and sites.
  • The easiest way to ensure your attentiveness is adding the website you are visiting то favorites. 
  • Always check the site you are visiting is bookmarked. Do not go to sites from searching services.

Thus, you need to be especially careful with applications that try to get your password and login. This applies to both individual applications and browser add-ons that may collect various data that belongs to you. Logins, passwords, site history and anything that may relate to your existence on the Internet.

What should be done if you suspect a phishing site or a letter that came across? Don’t panic. In no case do not click on the buttons contained in the letter or on the links.

Unknown contact or project that you’ve subscribed a while ago have just shared a document with you or sent you an email. Weird, right? Yes, it is! Most likely it is an attempt by scammers to take possession of your personal information. In any case, even if it is not, then trying to figure it out will not be superfluous.

It will not be superfluous to contact the company from which the suspicious letter came. Write to the support service of the company. They should help you.

But the best thing you can do in the fight against phishing – is to learn about it. Protect yourself in the future by paying attention to our advices today.

Some classic examples of phishing emails

Note the address of the mailbox from which the email was sent. It doesn’t look like the official address of the service, does it? This is the first warning sign that should be immediately noticed.

Usually the text in such letters insists that you answer the letter. Such perseverance can also say that you have opened a fake letter.

A link asking you to log in will simply steal your login details.

Similar letters from fake support representatives are quite common. Their content will try to cause you to panic and immediately cause the desire to act. But don’t panic. Just stop and carefully examine the contents and structure of the letter.

In addition to emails, there is another common way of identity theft – browser add-ons. You can simply install some applications for your personal use, but it will have access not only to the one service you are using, but to all the data you need to log in to all the sites.

To avoid this, just be careful and interact only with proven additions. You can also check your browser settings to see which add-ons are collecting information about you. I would advise you to do so right now.

Another classic fake email, which is designed to cause the victim alarm and desire as soon as possible to click on the infected link.

In this case, the scammers want to use the human desire to get back the money spent. You can also be offered goods at mythically low prices and a variety of financial transactions that look too attractive to be true.

Another way to steal your savings is infected files. Once the user received an email from the fake address [email protected] (I hope you’ve noticed a mistake in writing, haven’t you?); as usual, the link led to the fake website of the service and stole data to log in to your account.

Trade Safe, from Orderbook Team.

 

About the author

Orderbook Team

Add comment

Recent Posts

Categories

Back to