Here’s the English translation:
1. Phishing (Email and Message Scams)
Description: Cybercriminals send fake emails or messages pretending to be from banks, government agencies, or trusted companies, asking users to provide sensitive information (passwords, OTP codes, or bank card numbers).
Typical Tactics:
- Sending fake links that mimic official websites.
- Requesting “account verification” or warning about “suspicious activity.”
- Attaching files containing malicious software.
2. Impersonation Attacks
Description: Scammers pose as bank staff, delivery agents, relatives, or colleagues to request money transfers or personal information.
Examples:
- Calling to inform the victim that “you’ve won a prize” and asking for a fee to claim it.
- Pretending to be law enforcement, threatening victims with involvement in criminal cases to extort money.
3. Social Media Scams
Description: Criminals create fake accounts or hack victims’ acquaintances’ accounts to borrow money or sell fake products.
Examples:
- Sending messages from hacked Facebook accounts requesting urgent money transfers.
- Advertising cheap or branded goods but delivering counterfeit items or nothing at all.
4. Investment and Quick-Rich Scams
Description: Fraudsters create online investment schemes such as Forex, cryptocurrency, or “financial multi-level marketing” with promises of huge returns.
Tactics:
- Asking for deposits to join a “trading platform,” initially showing fake profits.
- Suddenly shutting down the platform and disappearing with victims’ money.
5. Online Shopping Scams
Description: Fake websites or accounts advertise products at attractive prices but fail to deliver after receiving payment.
Examples:
- Using real product images to build trust but delivering counterfeit goods.
- Creating fake online stores on social media platforms.
6. Malware and Ransomware Attacks
Description: Criminals spread malicious software through emails, websites, or attachments. Once opened, the victim’s system becomes infected.
Tactics:
- Ransomware: Encrypting all data and demanding a ransom for decryption.
- Keylogger: Recording passwords and personal information as the victim types.
7. Fraud via E-wallets or Online Payment Services
Description: Criminals fake transactions from e-wallets or banks to demand payments.
Examples:
- Sending messages like “confirm the transaction” or “you owe money” to deceive victims.
- Exploiting security vulnerabilities in e-wallets to steal accounts.
8. Public Wi-Fi Attacks
Description: Cybercriminals exploit unsecured public Wi-Fi networks to steal information from connected devices.
Tactics:
- Setting up fake Wi-Fi networks with names similar to legitimate ones.
- Intercepting and copying data when users connect.
9. Scams via Dating or Online Friendship Apps
Description: Fraudsters develop close relationships with victims on online platforms and then exploit them for money.
Tactics:
- Borrowing money with urgent excuses (medical emergencies, debts).
- Persuading victims to invest or transfer funds.
10. Impersonation of Official Apps
Description: Criminals create fake apps resembling official banking or e-wallet apps to trick users into downloading them.
Outcome: Once users input their account details, scammers can take control of their accounts.
GLOBALINK LAW FIRM TEAM