Recently, a new form of scam was discovered that would be done through the cell phone and that is known as “the missed call scam“.
What does it consist of? When telephone numbers are attended specific can hack the account of WhatsApp. Although the alert notice is focused on Spain, it also began to occur in an incipient way, and could reach other nations, such as Argentina.
The “missed call scam” It works in the following way:
The victim finds a lost call and, only if he returns it, they charge a special fee of which the offender takes a part. From the Spanish security forces they warned that “the scam consists of calls of a single tone”.
As published by the Spanish Guard through its Twitter account days ago, the origin of these calls comes mainly from Albania, Nigeria, Ghana and Ivory Coastwhile the costs vary depending on the country from which the call is made.
The scam is carried out through a call
These are the main forms of cyber scam in 2022
The last year was largely marked by the huge number of complaints Internet users in relation to being affected by all kinds of cyber scamsyes
With billions of dollars worth of phone scams and digital phishing fraud around the world, Argentina is no exception.
Given the proliferation of new variants of this type of crime, it is convenient to review, according to experts in the field, those that could have greater diffusion throughout this year. To do this, the consulting firm specializing in cybersecurity, BTR Consultingdrew up a list of 10 main cyber scams from which the most will have to be protected in 2022.
Cyber scams have been growing exponentially, permanently changing their format and radius of action
In this sense, the list is as follows:
1. sites of fake purchases on the web or on social media: especially around the holidays, it’s full of stories about fake shopping sites and it’s only expected to get worse over the course of the year. Some of these fakes are so good that they are almost impossible to identify, even appearing at the top of Google searches as legitimate.
two. Offers of cryptocurrencies: With digital currencies gaining in popularity, scammers are looking to cash in. Therefore, one should be wary of fake cryptocurrency offers and hackers looking to take advantage of the digital wallet.
3. data filtering: There is a high probability that all people are victims this year. The reason is very simple and lies in the fact that there is a black market in which records are traded with complete personal and banking data, both individual and belonging or affinity groups.
Four. Social engineering scams: Scammers research social media pages so they can design a “tailor-made” scam. “I started following a guy on Tik Tok and as soon as I became friends with him, a guy pretending to be him sent me a private message saying that he works for a charitable foundation and wanted me to send him money.” Separate chapter for romantic scams, the ones that no one denounces out of shame.
There are various forms of scam in which you can fall
5. internet of things: From a SmartTV, toys, refrigerators, washing machines, our security cameras, the thermometer of a fish tank, every day people become dependent on many devices that are constantly connected to the Internet. The default setting is usually a common place to air privacy.
6. SIM swap: SIM Swapping is a new deceptive way to bypass two-step authentication for mobile banking. They call a cell phone provider, pose as the victim and get a SIM card with the phone number transferred to their phone, not only do they steal the password, but they have the phone to bypass two-factor authentication.
7. scams for bonuses of ANSES Y grants of the Government: Through emails, text messages, Whatsapp and phone calls or advertisements that promote bonuses and subsidies impersonating the identity of the governments, the victims are captured and attracted by the need to make money and already represent a scam Widespread at the moment.
8. employment scams: Employment scams, work from home and other job opportunities have taken on a significant dimension in the midst of the pandemic.
9. Tech support scams: Fake tech support scams perpetrated by computer/device pop-ups or phone calls are one of the main variants today. The scammer convinces the victim to pay for unnecessary and possibly dangerous fake tech support.
10. phishing scams: The most dangerous malware downloaded by people on their computers and smartphones is almost always downloaded unintentionally. These are socially designed phishing, through emails, whatsapp text messages and direct messages from social networks. Impersonating identity through this technique seeks to hijack your mail, whatsapp or RRSS to demand ransom and/or later swindle the contacts of the first victim.
Fake shopping sites or cryptocurrency scams, among the main alerts
The trend of fraud, deception and disinformation is overwhelmingly greater than the intention to stop them. Every day, cases of identity theft or creation of false and artificial identities are heard, to execute fraud, spread false information for political and commercial purposes or spread hate speech. In the last quarter of 2020 alone, Facebook removed 1.3 billion fake accounts. Facebook says it has 35,000 people reviewing content, an army of digital soldiers who review and moderate content, but the ratio is 1 per 82,000 accounts. And as cybercriminals become more sophisticated by the day, using deepfakes and evolving techniques like synthetic fraud, their scale continues to grow.
A false identity is, among other things, the main facilitator of a phishing scam, present in 45% of the occasions according to the surveys of BTR Consulting, which tries to trick people into sharing their account data, this situation escalated to such a level of aggressiveness, lack of control and inability to stop the attacks that target just filed a federal lawsuit in a California court seeking to stop phishing attacks designed to trick people into sharing their login credentials on fake websites to Facebook, Messenger, Instagram and WhatsApp.
And prevent hackers from posing as real platforms and stealing access information to web platforms and apps, personal and affiliation information and/or bank details of users to defraud them or attempt identity fraud.