Everyday Security in an Online World

Recognise Social Engineering

The human touch

We are a social species. Our brains are wired to make us trust and form connections with other people from the day we are born. While this is essential for our survival, it also means we can be tricked into doing things that aren’t in our best interests, like divulging confidential information. The practice of manipulating human psychology in this way is called social engineering.

Perpetrators of social engineering may contact people by phone, text message, email or social media to attempt their attacks. Often they aren’t targeting anyone in particular — they’ll dial numbers in turn, or send millions of emails in the hope that enough of them get through. To be more efficient, they might use lists of working phone numbers and email addresses gathered from public sources – like a telephone directory – or exposed in data breaches (see Accept That Data Breaches Happen). For the scammer, it’s a matter of chance who responds and falls victim.

On the other hand, some scammers will carefully select their targets. If you are employed in a notable role within an organisation, or your organisation might be of particular interest to an outsider, it’s important to be aware of this practice and to be vigilant. An attacker will first conduct reconnaissance, gathering information they can use to make their efforts more likely to succeed. For example, they might use LinkedIn to find the name of your company’s IT director, then send you an email signed off with that name.

Scam phone calls

Companies almost never make unsolicited phone calls to their customers. So, in theory, it should be easy to avoid being defrauded this way.

Unfortunately, scammers can be well rehearsed in making you believe that their phone call to you is a special case: that on this particular occasion, they really are who they claim to be. They’re good at keeping you talking and gaining your trust, and will make the situation sound urgent so you don’t have time to take a step back and start doubting their authority.

Examples

Some common scams that begin with a phone call include:

Coincidences

Sometimes, a scammer will get lucky by mentioning something that does apply to you. For example:

Number spoofing

Scammers may ‘spoof’ their caller ID to be that of a genuine organisation. The telephone system was not designed to prevent this sort of behaviour, so it’s possible to receive a scam call that shows up as the number of a company you trust.

For example, a scammer pretending to be from your bank might ask you to look on the back of your debit card where, sure enough, you’ll find the same phone number they appear to be calling from.

Summary

Remember: whenever you receive an unsolicited phone call about a problem with one of your devices or accounts, or where the caller asks for private information, you should assume it’s a scam.

In the unlikely event you hang up on a genuine caller, you’ll find out sooner or later via other means. Equally, a genuine caller shouldn’t be offended if you’re initially doubtful and challenge their authenticity, or take steps to verify that what they’re saying is true.

Phishing

Fraudulent attempts at getting you to divulge private information via messages sent to your computer, tablet or smartphone are called phishing. It’s a play on the word fishing, and pronounced the same.

Phishing has traditionally been associated with email. The earliest users of the ARPANET, the precursor to the Internet, were military and academic institutions in the United States. The network comprised only these known and trusted organisations, so when email was invented in the 1970s it wasn’t made to be private or secure (the military had other means of communicating in secret). Yet the technology has survived largely unchanged into the twenty-first century; where simplicity, compatibility, and the fact that it’s free remain email’s greatest strengths — but also leave it susceptible to abuse.

Beyond email, the growth in smartphone use has led to scammers also conducting phishing via text messages and services like WhatsApp. In fact, you should be aware of the possibility that official-looking communications you receive by almost any means might not be genuine.

Examples

Phishing can take various forms. These are just some examples:

There are a few things you can check to help determine the authenticity of an email, text or other electronic message.

Check the spelling and grammar

A scammer may not speak your language very well, and this can work in your favour: bad spelling or unusual grammar are common signs that a message is bogus. Sometimes you’ll see particularly complex or unusual phrases, which are a sign that the message has been translated automatically.

In the heat of the moment it can be easy to miss, but the wording of a message is often the most visible clue that it’s fraudulent. So, when in doubt, take your time.

Of course, some scammers will write perfectly in your native language; and conversely, a genuine sender might make a mistake! So, there’s no definitive rule here.

Check the From address

This applies only to email. Consider that an email includes a To address, From address, sender name, subject and body.

The From address is of particular interest, but many email apps hide it to begin with, showing only the sender name. The name is not helpful in determining the authenticity of an email, because it can be anything the sender chooses. So, learn where to find the From address in your email software — often by resting the mouse cursor over the sender name, or clicking or tapping it.

An unusual From address is usually a clear giveaway of a fraudulent email. For example, an email from eBay is almost certainly going to come from an address ending in ebay.com or a local equivalent like ebay.co.uk. If the From address shows otherwise, there’s a good chance the message is bogus.

Sadly, the reverse is not true. Because ‘spoofing’ is possible, you cannot be certain that (for example) an email showing a From address ending in paypal.com really is from PayPal. That said, technological measures to combat spoofing have made the practice unfavourable — good email providers are now highly likely to filter such messages as junk.

Check where links take you

To complete the scam, phishing messages typically include a link to a web page on which you are asked to enter the information the scammer desires. In other words, being the victim of a phishing scam actually requires you to be tricked twice: first into believing a fake message is genuine, and second into giving away private information.

Consider, then, that it doesn’t matter if you ‘fall for’ a fake message if you’re able to back out at the stage where you realise the resulting web page is fake. The email might have been perfectly written, and you might have missed the slight misspelling in the From address, but now that you’ve clicked the link you can make arguably the most reliable check of all: the address displayed in your browser. For the knowledge you need here, see Appendix: Understand URLs.

Visit the website directly

If you’re still in doubt, a foolproof option is to ignore the link in the suspect message and make your own way to the website in question. If you really have been sent that money on PayPal or tagged in that Facebook photo, you can find out directly — bypassing the possibility of a scammer leading you astray.

As a bonus, bookmark important sites to ensure you never end up on fake versions of the same.

Friends’ compromised accounts

Sometimes a scammer will gain access to a person’s email account in order to pull off a somewhat more elaborate fraud. This section describes a common example known as the gift card scam. To make it easier to follow, we’ll give the initial victim a name: Joe.

A scammer has broken into Joe’s account, most likely by tricking him into disclosing his password with a [phishing message]. The scammer gathers email addresses known to Joe, either from his contacts list or by harvesting recipients from his previously sent emails.

Next, the scammer sends out a brief, innocuous message to these contacts – possibly hundreds of people – saying something like:

Consider that the recipients – most of whom will be Joe’s friends, family or colleagues – may find this indistinguishable from a genuine message. Even if the writing style or the nature of the request is out of character, the human desire to help a person in need is stronger.

Furthermore, since this is a simple email – with no attachments or suspicious links – it’s unlikely to trigger any technological warning systems either.

The scammer might also try to deter recipients from replying by phone:

Meanwhile, the scammer does some further preparation. They open a new, free email account with an address similar to Joe’s. Then they activate the option in Joe’s account to redirect all incoming mail to this new address.

When people start responding to the request for a favour, the messages don’t reach Joe — they’re forwarded to the scammer, who replies to them individually with a heartfelt plea:

The scammer is now engaging with these people directly from the new email address they set up to impersonate Joe. Even after Joe secures his account (see Appendix: Secure a Compromised Account) and turns off the mail redirection, the scammer can continue.

They redeem the gift card and spend it immediately, buying merchandise to sell on. The victim’s money has been quickly and effectively laundered!

Scams like this have become rife in recent years. It’s important to be wise to them, and not expect that your bank will bail you out.

Extortion scams

Not to be confused with the more serious crime of sextortion, the essence of the extortion scam is that you receive a message from a stranger saying they’ve hacked into your computer and gathered embarrassing material. Commonly, they claim to have used your computer’s camera to record you performing a sex act; and they threaten to send the video to your friends, family or colleagues if you don’t make a payment.

The stranger almost certainly does not have this material. Nor did they hack into your computer. They’re not even interested in you in particular: they’ve just used a mass-mailing tool, and you’re one of thousands or even millions of people who received the same hoax message.

You can safely ignore or delete it.

Inclusion of real information

One tactic employed by these scammers is to include real information about you in the message, such as:

So, the inclusion of a password or other real information about you in an unsolicited message should not make it more believable. Again: you’re not being personally targeted.

That said, if you receive an extortion message that mentions a password you recognise because you still use it today, you should change it. Not because this scammer in particular knows it, but because it must have been breached in the past and should now be considered no good (see Use Strong, Unique Passwords).

What you can do

If you found this useful, you can support my work by buying me a coffee.