DashTech
TRENDING
  • Cheap VPS Hosting
No Result
View All Result
  • Home
  • Business
  • Internet
  • Gadgets
  • LifeStyle
  • Mac
  • Phones
  • Reviews
  • Security
  • Tech
  • Windows
  • Home
  • Business
  • Internet
  • Gadgets
  • LifeStyle
  • Mac
  • Phones
  • Reviews
  • Security
  • Tech
  • Windows
No Result
View All Result
DashTech
No Result
View All Result
Home Security

Why Are Phishing Scams Still Thriving?

by Veno
July 12, 2023
in Security
Why Are Phishing Scams Still Thriving?

In 1995, the first phishing email was sent to a user’s inbox.

Today, nearly 30 years later, phishing scams are still a major threat to individuals and organizations worldwide.

In the worst-case scenario, scam emails, text messages, or phone calls are a stepping stone to damaging attacks such as ransomware — or expensive data breaches.

For individuals who mistakenly reveal their sensitive information to criminals, phishing can even lead to identity fraud.

Almost three decades after the first phishing email, we have more advanced technology as well as more nuanced security that can detect such attacks.

So why is phishing still such a common threat?

In short, scammers exploit human biases. They impersonate people of authority or someone a person trusts. As a result, the victim often doesn’t question when such a person demands passwords or money transfers.

Another reason is that bad actors have been developing more and more advanced scams to target unsuspecting victims. Some of them can even fool cybersecurity experts.

There has also been an increase in the number of social engineering scams and the number of overall phishing sites.

What are cybercriminals doing to bypass email filters and cybersecurity defenses?

Here, we dive into the two latest sophisticated phishing scams and how to protect yourself against them.

QR Codes Embedded in the Image of an Email

Email filters have gotten better at detecting spam URLs or malware-infected attachments and analyzing text. That’s why scammers are replacing these with QR codes embedded in images.

Here is how it works.

The recipient is asked to change their password using the existing one or to complete a two-factor authentication process.

After victims click on the QR code, they’re led to a seemingly legitimate site. However, this is a phishing site that is designed to steal credentials once the target fills in their username and password.

This scam is difficult to detect because the email itself is often sent from a genuine address, the one used within the real company. A common scam that has been exploiting QR codes requests the login to a Microsoft account.

READ:  Top 20 Best Austin Corporate Law Firms In 2022

Most of these emails are image-based. They don’t contain text that an email security solution can scan and redirect to spam. This helps scammers to bypass the email spam filters.

The recipient can’t tell that they are opening an image and not the HTML code featuring the text.

How to Detect a Suspicious Email Containing a QR Code

Companies are adding this type of scam to their phishing awareness training.

What should you look for?

Major companies such as Microsoft are often used for email scams. Check whether the email that asks you to reveal sensitive data is, in fact, from a legitimate company.

Campaigns that rely on infected QR codes send generic emails to as many recipients as possible. Seek clues that the email is a scam — such as poor grammar and a sense of urgency (due date to take action).

AI-voice Scam Calls From Family Members

With just 10 seconds of someone’s voice sample, criminals can use AI to clone and mimic a person’s voice. After that, they can exploit it to request sensitive information by convincing other family members a person is in danger.

Using the voice of a person you trust or who of that has authority (e.g. your boss), the scammer can request money transfers, credentials, or social security numbers.

In January 2023, a mother from Phoenix received a call from her daughter, claiming to be kidnapped. Scammers mimicked the daughter’s voice telling her she was in danger. Criminals requested $1 million worth of ransom. A 911 call and subsequent call with her daughter revealed that the kidnapping is an AI scam.

A couple from Canada, however, wasn’t lucky enough to discover the fraud on time. The phone call that impersonated their son, who claimed that he needed money for a lawyer, scammed the couple of $21,000.

READ:  The Top 10 Advantages of Cloud Computing

Many people get fooled. With a more experienced threat actor, even the name of the person “in danger” will appear on the phone during a call.

Vishing, or voice phishing, is nothing new. Phone call scams from tech support with a company, government representative, or service provider who want to confirm the victim’s identity have been commonplace for years.

AI just helps scammers to impersonate people who you care about the most.

How to Prevent AI-Powered Phishing Scams

A few things that you can do to protect yourself from AI vishing include:

  • Choosing a safe word with your closest ones — a family password to confirm one’s identity
  • Taking note of unusual requests and phone numbers
  • Sharing less personal information on social media — such as vacation destinations
  • If you do receive a suspicious call, contact 911 and ask them to alert the FBI

Phishing Threats Persevere

Phishing remains a major problem for organizations and individuals alike.

Advanced phishing schemes feel more personal. A scammer takes their time to get to know the victim via social media. They find sound bites of their voice and use it to scam their families.

They also exploit technology the general population doesn’t know can be used for scamming purposes — such as QR codes. Most employees who pass the phishing training are wary of links and email attachments — not QR codes.

Social engineering is the blind spot of both companies and individuals. Today, we’re up against AI voice scams and QR code phishing. Tomorrow, bad actors will find new ways to exploit human trust.

The most a company can do is to set up a strong email and endpoint security as well as restrict user access to reduce the damage of data breaches.

The most individuals can do is keep learning about the new types of phishing to build awareness and recognize scams.

Related Posts

Security

Hidemyass HMA Unveiling the Features and Benefits of VPN Service

March 3, 2024
scamalytics
Security

Scamalytics: Understanding and Preventing Online Fraud

March 1, 2024
Security

10 Best Password Managers In 2024

February 21, 2024
Phishing Attack Adds Pressure With Countdown Clock
Security

Phishing Attack Adds Pressure With Countdown Clock

December 20, 2023
Please login to join discussion

Latest Posts

  • TikTok Likes bringen Ihnen ein verbessertes Engagement
  • Why Pre-employment Background Checks Exist
  • Top 5 Alternatives To AmazonSmile For Integrated Charity Donations
  • LosMovies Alternatives: Top 26+ Best Sites For HD Movie Streaming
  • VoirAnime 22 Best Alternatives Sites To Watch Anime Online
  • Top 10 Best Cxtsoftware Alternatives In 2024
  • Top 10 Best Logistics Companies in Canada in 2024

Popular Articles

  • ImgBB The Best Free Image Hosting

    ImgBB The Best Free Image Hosting In 2024

    0 shares
    Share 0 Tweet 0
  • Top 26+ Best FilmyZilla Alternatives For HD Movies Streaming

    0 shares
    Share 0 Tweet 0
  • Hesgoal Alternatives 40 Best Sites For Free Live Football Streaming

    0 shares
    Share 0 Tweet 0
  • 10 Best Buffstreams Alternatives to Watch NFL, NBA, Golf, WWE

    0 shares
    Share 0 Tweet 0
  • Top 26+ Best VegaMovies Alternatives For HD Movies Streaming

    0 shares
    Share 0 Tweet 0
  • 15 Best Free Data Recovery Software for windows in 2024

    0 shares
    Share 0 Tweet 0
  • Top 24 Best Footybite Alternatives To Stream Football Live

    0 shares
    Share 0 Tweet 0
  • VoirAnime 22 Best Alternatives Sites To Watch Anime Online

    0 shares
    Share 0 Tweet 0

© 2020 - DashTech. All Right Reserved.

  • HubTech
  • Privacy Policy
  • About Us
  • Write for us
  • Contact us
No Result
View All Result
  • Home
  • Business
  • Internet
  • Gadgets
  • LifeStyle
  • Mac
  • Phones
  • Reviews
  • Security
  • Tech
  • Windows

@ 2020 - DashTech. All Right Reserved.