Criminals use social engineering scams to exploit people’s trust to obtain personal information or money to enable a crime. With the advancement in technology, social media is the most preferred channel. However, it’s not unusual that scammers contact you by telephone.
How is Social Engineering Scam Conducted?
Understanding the mechanism behind the different types of fraud is vital to warn unsuspecting people. While some scams target a wide audience, others target individuals.
- Phishing, Vishing and SMShing
You can get fake emails, texts or telephone calls from people impersonating bank officials or e-commerce sites. They trick people into providing their personal and banking information.
- Telecom Fraud
People impersonating friends, relatives or people in authority can contact victims. Then, they trick the victims into sending money to assist them.
- Business Email Compromise
Criminal gangs are experts in hacking into companies’ email systems and even gaining access to their payment systems. They can deceive the employees into transferring money into their bank accounts.
- Romance Scams
Some criminals prey on people in need of romantic relationships to obtain money from them. They get the victim’s contacts from social media or dating platforms.
- Investment Fraud
You can fall victim to investing in fraudulent or worthless stocks with the promise of gaining hefty returns.
- Sextortion
Both men and women fall victim to being tricked into sending explicit images and videos. They are then used to blackmail the victims.
Tips to Help Avoid Being a Victim of Social Engineering Fraud
Ending online communication or trusting no one isn’t a practical strategy. However, you can enjoy the convenience and connection of online life by observing a few tips.
- Monitor your accounts
Criminals know that most people don’t check their account activities often. Therefore, ensure that you watch your accounts for any suspicious activities and close those that you no longer use.
- Verify payment requests or personal information
Even when a payment request comes from a familiar person, ensure you call the person through another channel to confirm the information. Then, it will rule out that an impersonator doesn’t make the request.
- Review privacy settings
Ensure that your online accounts where you input your personal information don’t allow unrestricted, public access. Most social media accounts have this setting as they are aware of the harm that fraud can cause.
- Think before posting
A social media post shouldn’t include private and personal information that can compromise you before sharing any information about your loved ones; consider whether it’s necessary.
INTERPOL’S Operation First Light
INTERPOL conducts global anti-social engineering fraud operations under the codename First Light. With the help of local police forces, the operations are successful in the member countries.
From the operations, there are some interesting findings; that telecom fraud calls come from offshore call centers and the funds transferred overseas. There have been several crackdowns on criminal gangs and assets of millions of USD seized.
Final Thoughts
INTERPOL monitors the new ways criminal gangs trick victims into providing confidential information and money. They also ensure that they host regular expert meetings to address social engineering fraud.