Monday , February 6 2023

What will be the most common scams on the Internet and how to avoid being trapped – 21/12/2018


An email with a subject that warns the bank that the sender and account is blocked. In a similar bank message, you need to login with your username and password. With another letter in English and the recipient's surname: "Mr. Gonzalez – It's Very Important". Inside, the time of profit or commissions for a unique and inevitable opportunity. A message on Facebook or WhatsApp message, on one condition, leads to a form of credit. These are some of the most common traps phishingThe hacker's most commonly used deception method on the Internet.

This type of deception is the most widespread in the world and Argentina in 2018 cryptojacking, malware, cyberrevorsions and vulnerabilities, according to a report by a cybersecurity firm.

New features phishing – is called computer attack method, which also consists of avoiding stealing money from a bank accountdata or malware downloads – including the use of websites with security certificates, a report from the Slovak ESET company, to indicate the security of the site, referring to HTTPS abbreviations, read in the web browser bar.

In the second period, the total volume of attacks from sites with these certificates reached 35%, and by the end of 2016 this figure was 5%.

In addition, traditional propaganda channels, such as e-mail, were also added to her beautifully messaging applicationsit was reported that attackers could get more victims.

"Safety applications recommended for safety phisingbut continue to be credible even though they are not adequate for the new features of such attacks. It would be helpful to check the URL of the security certificate or the HTTPS, rather than check the name of the site in the security certificate for comparison with the site's name, "said Miguel Ángel Mendoza, ESET Latin America

How does Phishing's methodology work?

Everything is based on the conviction of users' rhetoric strategies to reveal bank information without hesitation. These tactics are a concept that is widely used in the so-called social environment, computer security, and it's complicated. hackers obtaining customer information.

Screenshots of fake emails by scammers who work as service companies to steal user data.

Screenshots of fake emails by scammers who work as service companies to steal user data.

Everything starts on the phone: The apocrypha of the Bank's alleged employeesFor example, the customer establishes rhetorical and cheating questions that lead to disclosure. For example, your email address.

I received a strange email from my bank, why?

As part of the attack, the client will then receive a spam message where personal information and contact information will be required.

If you look at a link in the letter itself and it looks like a bank, the imagination will be directed to a website.

Here, you need to fill in your home bank account or provide more personal information. Coordinate card with more than 80 number is available. Do not drop too much.

These attacks are not massive campaigns that reach thousands of customers individually but with various banking institutions. For this reason, the "x" user of the bank may send a fraudulent message to an organization "and".

How to detect fraudulent mail

This is usually spam mail (unwanted). This almost always needs updating of the "policy changes" or the "bank security analysis" database.

That's general message is quite catastrophicThere are some warnings to close the account in the future.

The message of WhatsApp's message, the slipper is just a scam. (

The message of WhatsApp's message, the slipper is just a scam. (

Although this is a bank logo, these emails usually display typos (bad syntax and / or error writing).

E-mail can also offer strange bank services that no ads are receiving. They represent information that is not appropriate for our account, such as names and surnames we do not use. They require more information. The sender usually has an external name.

You can see that the server does not belong to the bank's domain (URL) by clicking on the link below the cursor screen on the cursor screen. The difference may be slightly or slightly larger or more like a letter or phrase.


Among the most widely used attacks took second place cryptojacking, cHow to avoid the processing capacity of an external computer, how to make money with cryptocurrency mining?

Articles cryptojacking The report has been a major threat to the ESET Telemetry between 2017 and 2018, and has begun a major activity by the end of last year.

7% of such attacks in Latin America have taken place in Argentina.

The malware was, in general, the main cause of security in Latin American companies in the third place.

Among other features, in 2018, malware samples appeared to be specially designed to affect the devices of the so-called Internet, computers used to perform other attacks after computers.


Cyber-exorcism also spread in 2018. Various campaigns used to deceive people by email they are likely to get information that is offensive to them; there was a particular fact that one of these measures would not be a deception for the user, ESET said.

The top 5 attacks are ending with vulnerabilities detected in outdated systems and have 15,300 episodes recorded by the company's antivirus systems.

Source link