Phishing

Scam alert: this scam hits all social networks and can ruin your life!

We must grant them one thing: they show an inexhaustible creativity. The problem is that they use their inventiveness to scam others. Indeed, scammers are constantly adopting new scam techniques. These new practices are based on the phishing or phishing. After using emails, SMS and phone calls, our colleagues from CNews reveal to us that they are attacking users of social networks.

Phishing: they use catchy phrases

The scammers know what they are doing. They employ catchy phrases so that their target falls into the trap. They threaten their target with an alleged account blocking allegedly for copyright infringement. On the other hand, they say they can help certify accounts or easily gain subscribers. Processes behind which however hides a scam.

Let’s say it right away, their goal is to extort money from you. They want to recover theConnection identifier of their target or fly their confidential data. Norton, a specialist in cybersecurity, sounded the alarm on Tuesday, July 26. He calls for vigilance to deal with the resurgence of this kind of attack on social networks.

545,000 phishing attempts between April and June

According to CNews, Norton and his teams managed to block a total of 29 million threats. A feat they achieved from April to June. And that’s an average of 320,000 blockages per day in three months.

Throughout France, they were able to stop 545,000 phishing attempts during this same period. Still according to our colleagues, this figure does not take into account the balance sheets of other players in this sector.

In a press release, Darren Shou explains why cyberattackers use social networks. The CTO at NortonLifeLock says it’s a “Inexpensive and very profitable way. » This allows to “targeting billions of people around the world. »

At the same time, Darren Shou invites “spot the signs of a scam. » It emphasizes the importance of keeping “a watchful eye on the origin of requests for information. »

You have to know how to read between the lines

Norton details the schemes used by these scammers. As said above, they threaten to close their target’s account. This is the first stratagem that computer security researchers have identified. “Copyright Infringement”, that’s what scammers use as an argument. They do this through email campaigns as videos flood in on TikTok, Facebook or Instagram.

Here, criminals play with the fear of social media users. Thus, the targets give in and do what these crooks order them to do. The latter show them a link to click supposedly to regularize the situation. Except that, according to our colleagues from CNews, this link asks login credentials.

They offer to install a companion app

Scammers would use the same process to deceive some content creators. Thus, they make them believe that they can boost the number of their subscribers. It even happens that criminals offer to install a companion app. This is, in fact, only malicious software.

That’s not all, Norton also talks about other processes. Criminals pretend they can help get or keep certification of an account. That said, scammers run phishing campaigns to prevent an alleged loss of certification. Otherwise, they say they can take care of everything to obtain some in order to be recognized. However, their goal is none other than to steal data.

Another tactic than phishing?

Our colleagues from CNews also reveal another tactic aimed at intercept temporary codes. Thanks to it, scammers can break into profiles with two-factor authentication enabled. The crooks can thus modify the personal data or the connection identifiers of their victim.

Social networks like Facebook, Instagram or TikTok attract billions of people, especially young people. The hackers, knowing the needs of these people, manage to get their hands on pseveral accounts from the same user.

To prevent this, you need to be vigilant and avoid responding to alarmist messages. It happens that we have doubts and that we see a problem on his account. In this case, it is better change your password.



Leave a Comment

Your email address will not be published.