How fraudsters exploit
technology
|
How fraudsters exploit technology
|
In today's digital world, scammers
are exploiting technology's
vulnerabilities to carry out fraud,
with one prevalent method being the
use of malware.
|
|
|
|
HOW FRAUDSTERS USE MALWARE TO SCAM
THEIR VICTIMS?
|
To better understand
how the scam works,
let’s look through
the perspective of
the scammer.
As a scammer,
what is my main
goal in committing
malware
fraud?
I commit
fraud
to gain easy money.
How do I profit
from committing
fraud?
I obtain the
victim’s banking
information,
compromise their
bank
account to transfer
money to myself, and
profit by selling
other personal and
sensitive
information.
How do I execute
my scams?
|
|
|
|
I
create links to bait my
victims
into clicking them,
initiating a download of
malware onto their digital
devices so I can steal any
form of information on them.
|
|
|
I pretend to be a seller and
manipulate users into
downloading an .APK
file
through chats, convincing
them it’s necessary to make
a payment.
|
|
|
I make victims believe they
have
won a reward
and lead them to download an
application to claim it.
|
|
|
I
mirror my
software
to look as close as possible
to the official one, making
it more likely that victims
will download it.
|
|
|
|
|
PROTECT YOURSELF AGAINST MALWARE
ATTACKS
|
|
BE CAUTIOUS
when browsing websites,
clicking on links or
downloading files,
especially .APK files from
unofficial stores as they
might contain malware.
Always check the URL for
authenticity.
|
|
|
BE SURE to
use strong, unique
passwords.
|
|
|
BE WARY of
email attachments from
unknown senders.
|
|
|
|
|
STOP. THINK. BEFORE YOU ACT.
|
Stay vigilant and
never respond to any
calls requesting
your confidential
information. If you
are unsure, verify
the request by
contacting an
official through a
registered number.
If you notice any
unusual or
unauthorised
transactions taking
place, please
contact us
immediately at
+603-8317 5200.
|
|
|
|
|
|