" how to know if phishing scam Archives - LuxSci

Posts Tagged ‘how to know if phishing scam’

Tax Season May Be Over, But Tax Scams Aren’t

Wednesday, April 17th, 2019

April 15 may have been the last day that people can file their tax returns, but that doesn’t mean that tax scams come to an end. Data from the AllAreaCodes.com analysis of FTC data, Consumer Warning: Tax Season is Also Peak Robocall Season, indicates that there is no dip in robocall-related complaints straight after the deadline. This is somewhat surprising, especially when you consider how prevalent phone-based tax scams are.

But it’s not just in the following weeks that you need to watch out for these crimes. The IRS also regularly warns taxpayers ahead of both hurricane season and the October 15 cutoff date for six month extensions. The agency encourages taxpayers to be aware of fraud throughout the year.

To help keep you safe, let’s take a look at some of the biggest tax scams you can expect to see this year:

IRS Taxpayer Advocate Service (TAS) Spoofing

In March, the IRS warned the public about a modification to the IRS impersonation phone scam. Traditionally, this scam involves a person or a robocaller making an unsolicited call. The scammer says that they are from the IRS and then either demands that victims make payments or handover sensitive information.

The new iteration of this scheme involves scammers spoofing calls to make it seem as though they are coming from the IRS Taxpayer Advocate Service (TAS). This tactic helps to lure in more victims, because it makes the demands seem legitimate. By convincing people that they are representatives of the TAS, it makes it easier for criminals to extract money or information from their victims.

To avoid falling for this trick, taxpayers should be aware that the TAS does not make unsolicited calls. If you have not previously reached out to the TAS, then you should assume that any phone call from them is fraudulent.

Tax-themed Malware Scams

This year, IBM X-Force researchers released the details of three major malware campaigns that used tax-related Excel attachments to trick people into installing a banking Trojan on their computers.

Each of these campaigns used social engineering to make the recipients open an attachment that contains Trickbot, a Trojan which is used to steal banking information and other details.

To avoid falling for these scams, you should be aware that the IRS does not contact taxpayers over email, phone, text or social media, to elicit sensitive data. You should ignore any such requests. On top of this, you should ignore unsolicited emails, especially if they contain links or attachments.

Hurricane Tax Scams

Whenever a hurricane or another disaster strikes, scammers take advantage of the situation in a number of different ways. These generally involve unsolicited contact and abusing the goodwill of those who want to help the victims.

The tactics of these criminals range from posing as IRS agents that pretend they will help victims file tax refunds, to impersonating charities and stealing money from people, to even setting up fraudulent charities.

To avoid falling for these scams, disaster victims can visit the IRS’ Tax Relief in Disaster Situations page for information. Those who wish to donate to real charities can use the Tax Exempt Organization Search to verify their legitimacy.

On top of this, they should not give out financial information to those who solicit contributions. This includes things such as credit card numbers, Social Security numbers or passwords. If you are going to donate, make sure you do so with a credit card or a check. This ensures that there is a written record of the donation for your tax deduction.

Tax Extension Deadline Scams

If you thought you could relax as hurricane season begins to wind down, unfortunately that’s not the case. Since October 15 is the last day for those who filed for a six month extension, many of the above scams roar back to life.

Although people are starting to become more aware of tax-related crimes, not as many realise that they are a year-round occurrence. If you want to stay safe from these and other types of scam, you need to be constantly vigilant and always err on the safe side. Otherwise, you may become the victim of theft, identity fraud or worse.

How to Know if an Email is a Phishing Scam or Not

Tuesday, November 20th, 2018

Phishing scams are a major threat to all email users, especially businesses. The scary part is that they are becoming increasingly sophisticated. Phishing emails popped up sometime in the early 90s. However, back then, they weren’t too hard to detect. For instance, typos were commonplace in old-school phishing mail, which was a dead giveaway.

Of course, this was long ago, when email was still in its infancy. Times have changed, and today’s cybercriminal has changed with the times. Their tactics have evolved, and phishing emails are far more convincing than they used to be. They are well-written and personalized. Hackers and cybercriminals already have a rough idea of who you are, which means today’s phishing emails are targeted.

Today’s phishing emails also look authentic; they replicate the design and aesthetics of legitimate emails. In fact, at first glance, you wouldn’t know the difference between an actual email from your bank and a fraudulent version. This makes fighting phishing scams a significant challenge.

On the rise

According to data from the RSA, phishing attacks are only growing, despite an increase in user awareness. One primary reason for this growth is the simplicity of executing such scams. Malware developers now offer automated toolkits that scammers can use to create and host phishing pages with the utmost ease.

It is estimated that each phishing attack manages to extract an average of $4500 in stolen funds.

So, the big question is – how does one protect their email, especially when phishing scams are evolving? Well, here is what the experts have to say.

Never trust just a name

 A common tactic scammers use is spoofing the display name in an email. According to a study done by ReturnPath, around 50% of 760,000 email threats targeting some of the world’s biggest businesses used this tactic.

This is how it works – let’s say a scammer spoofs a brand name such as “Nike.” The sender’s email address may look something like “Nike nike@customersupport.com.” But, even if Nike doesn’t own the domain “customersupport.com,” DMARC and other email authenticity and anti-fraud tools will not block the mail. This is because the email is legitimately from customersupport.com, even though this domain has nothing to do with Nike. There is no authentication for the “comment” that goes along with the email address (in this example, that is the word “Nike”).

Read the rest of this post »