Criminals Love the Holidays

Criminals Love the Holidays

It is such an exciting time of year with holiday parties, buying presents for your favorite people, and enjoying family! But it is also important to keep in mind that online shoppers and the holidays are two things that cybercriminals enjoy during this exciting time. Because Criminals Love the Holidays!

It is wise to keep in mind that websites can be compromised or even spoofed at this time. There are already fake shipping notifications, fake holiday contests, and phishing and vishing scams out there looking for your information.

Threats during the holiday season should serve as a reminder of two crucial life lessons:
  1. Your private information is not as private as you might believe.
  2. and cyber thieves do not take the holidays off; in fact, they turn up the volume!
Below are 5 things to consider while you are out spreading holiday cheer!
  • Deal with businesses you know and trust.
    And use a credit card instead of a debit card or checking account. We are often told to use debit for budgeting purposes, which makes sense, BUT your credit card is safer as it is protected under the Fair Credit Billing Act. It is far easier to recover funds from a stolen credit card than it is from a debit or bank account.
  • Watch out for fake website domains; they can easily fool you.
    Make sure you are on the correct retailer’s website while shopping.  Beware of “domain squatting” sites with an added hyphen or a misspelled or incorrect URL. These tricks can be easily overlooked.
  • Scams like phishing and vishing
    Pay attention to emails requesting personal information from retailers, the Internal Revenue Service, and financial institutions. No reputable business or government organization will contact you by phone or email and ask for your personal information.
  • Fraudulent shipping alerts and notifications
    Phishing emails are sent out by scammers and contain links that could allow unauthorized access to your personal data or download malware onto your device.
  • Holiday contests
    Holiday contests are a great way for retailers to support branding and marketing. Fake contests are a great way for fraudsters to collect your personal information and install malware. Double check URLs to ensure they are truly connected to the company they say they are. When in doubt, don’t fill it out!

In short, think before you click, and if it seems too good to be true, it probably is.

Most importantly, cyber thieves love the holidays, but you can continue to love them too—just be careful!

 

BONUS:
Top 5 Personal Privacy Tips
  • Security software: regularly update the security software (antivirus, firewall, and anti-malware) on your devices.
  • Password management: Always create complex passwords using a combination of mixed-case letters, numbers, punctuation, and symbols with a minimum of 20 characters—typically an easy-to-remember sentence.
  • Privacy settings: understanding how your information is stored and used Read the privacy settings of the apps and social media sites you frequent.
  • Use multi-factor authentication to provide additional information beyond a login or password.
  • E-mails and attachments: To reduce your exposure, do not open e-mails and attachments from individuals or organizations that you do not know and trust.

 

Read more at this FBI Common Holiday Scams link.
Other holiday tips: 4 things to watch out for this holiday season!

Elderly Identity Theft

Elderly Identity Theft

 

Over 92,000 victims lost $1.7 billion to elderly Identity theft and fraud in 2021, according to the 2021 FBI Elder Fraud Report. These losses increased by 74% compared to 2020.

Elders and seniors (those 60 years of age and older) were the targets of cybercrime and ID theft, with an average loss of $18,246 per senior victim. 3,133 elderly victims also suffered losses totaling more than $100,000 each.

Unfortunately, our prediction has come true. We wrote an article in September 2019 titled 2020 Prediction: Senior ID Theft to Get Significantly Worse.

So how does elder or senior fraud occur?

According to the FBI, “elder fraud takes many forms as criminals find ways to take advantage of this vulnerable and growing population.” “Seniors are a particularly vulnerable victim group and are often specifically targeted for financial fraud crimes.”

Additionally, according to the FBI, “seniors are often more polite and trusting, have difficulty saying no, maybe lonely or spend a great deal of time alone, may have diminished physical or mental capacity, are less likely to report the crime out of shame, and are often financially stable and own their homes.”

Elder fraud increased significantly in 2021 for a second reason: cybercriminals and ID theft offenders took advantage of the COVID-19 crisis’s fear and uncertainty by using phishing campaigns and other online scams to prey on seniors.

COVID-19 had a significant impact.

Consider that during the COVID-19 crisis, many seniors were engaging in our digital economy for the first time while the economy was shut down and businesses were compelled to close. The digital economy includes things like social media, online dating, online banking, online e-payments, online e-books, and online digital downloads, to name a few.

Home security networks

To make matters worse, the majority of seniors were not familiar with their home network security and still aren’t.

The majority of seniors were not (and are not) familiar with using strong passwords or passphrases, virtual private networks (VPNs), or changing the default passwords on IoT devices. This is specifically relevant to a senior’s home network security and the protection of their computers, smartphones, and the Internet of Things (IoT). devices, such as ring doorbells, smart refrigerators, smartwatches, smart door locks, and medical sensors.

Furthermore, scammers target seniors by using phishing (false emails), vishing (false phone calls and voice mails), and smishing (false text messages) techniques. It’s not just about safe online activity.

The FBI Elder Fraud Report said the top 2021 elder scam crime types included the following:

  • Tech Support Victims
  • Investment Victims
  • Non-payment/Non-Delivery Victims
  • Real Estate and Rental Victims
  • Identity theft victims
  • Overpayment Victims
  • Confidence Fraud/Romance Victims
  • Employment Victims
  • Personal Data Breach Victims
  • Advanced Fee Victims

You can safeguard your identity by

  1. Identify fraud or scam attempts.
  2. Avoid being pushed into taking immediate action by con artists who instill a sense of urgency to drive victims to act.
  3. Be wary of offers for door-to-door services, unsolicited mail, and phone calls.
  4. Never share your personally identifiable information (PII) to protect your identity when you can avoid it.
  5. Ensure that the malware, security, and anti-virus software on your computer is up to date.

Lastly, and according to Phoenix, Arizona-based security consultant John Iannarelli (FBI Special Agent, Retired), “if you believe you or someone you know may have been a victim of elder fraud, contact your local FBI field office or submit a tip online. You can also file a complaint with the FBI’s Internet Crime Complaint Center.” 

Elderly Identity theft is an issue that we all need to be aware of, especially as our loved ones age. We can help educate and protect them with identity monitoring programs with fully managed recovery.

Emotional Impact of ID Fraud

Emotional Impact of ID Fraud

Identity fraud is a challenging and sensitive issue. It is typical for you and your family to experience emotional distress as a result of this crime. Give yourself time to work on mending the emotional impact of ID Fraud that you and your family experienced.

Be ready for a range of different feelings.

Few individuals are psychologically ready for the effects of identity theft.

Identity theft victims may at times experience overwhelming psychological pain from loss, helplessness, rage, loneliness, betrayal, and even embarrassment. Deep-seated worries about one’s ability to maintain financial security, keep family members safe, and regain trust are brought on by this crime. Another issue you might have to deal with is the possibility that the theft involved a person you know.

Finally, you might become irritated with the people you turn to for assistance. The justice system is still in need of some work, and identity theft is a challenging crime to solve. Be kind to both yourself and those who are trying to assist you.

It will take time to clean up the paper trail, but it’s critical that you get your emotional bearings back as soon as you can. Start by acknowledging and accepting your worries, anxieties, and frustrations.

Some people experience embarrassment as a result of identity theft. No one deserves to be the victim of identity theft, but they feel ashamed and as though they did something wrong, or perhaps deserved it to happen to them. Again, NO ONE deserves to be in this situation.

You don’t need to go through this experience alone.

The emotional harm and isolation you experience might feel worse if your family or friends don’t understand what you’re going through. And in reality, those who haven’t dealt with identity theft are unlikely aware of how long-lasting this crime can be or how stressful it is. Please know that if you are the main provider for the family, you have not failed them. You are a victim who is innocent. A portion of the burden is lifted when you are open and honest with your family. Allow your family and friends to support and encourage you, even if they do not fully understand.

Who did it?

Knowing the imposter may exacerbate your feelings of betrayal, especially if they were a friend or relative. It might be very challenging to report this person to the police. To help you decide or to cope with the consequences, you might want to talk to someone who can help guide you.

Victims frequently describe feeling uneasy when the imposter is unknown, wondering if the person squatting next to them in the grocery store or passing them on the street might actually be the imposter.

Even though you might want the criminal to be punished, it’s possible and even likely that this won’t happen. It is crucial to concentrate on the crime and not the criminal. You must make sure that your identity is cleared as your top priority.

What can you do?

One way to recover or mitigate the emotional impact of identity theft is to become active in a program that monitors your credentials and, more importantly, provides expert recovery solutions. Some victims discover that having a monitoring solution and a resource recovery expert to turn to is extremely beneficial.

Should you consider professional help?

Some victims may lose their capacity to function and manage day-to-day tasks. Some signs of severe depression include exhaustion, overeating, anxiety, drinking, forgetfulness, and a refusal to leave the house or bed. Waiting until you feel lost at the bottom of a pit is not advisable. Even if you don’t feel overwhelmed, speaking with an expert who focuses on helping crime victims can be very beneficial. This might be a supporter of victims, a spiritual figure, a certified therapist, a psychologist, or a psychiatrist.

Identity fraud is a challenging and sensitive issue. As you can see victims may experience overwhelming emotional pain on many levels and even feel embarrassed. It will take time to clean up the paper trail, but it’s important to recognize the emotional impact of ID Fraud. If you are the victim, make your identity the top priority. If you feel overwhelmed, speaking with an expert who focuses on helping crime victims can be helpful.  We at defend-id are always here to help.

Related Articles:

 

 

defend-id blog

What is identity theft?

What is identity theft?

What is identity theft?… How common is it? How do identity thieves operate, and which online scams should you watch out for?

Identity theft continues to be the fastest growing crime in America. It’s consistently one of the top consumer complaints. If you are a college student or in the military, you are one of the most targeted populations by thieves.

It’s been known to cost the victim both time and money, as, on average, 100s of hours, many months, and thousands of dollars are spent to resolve each crime. Identity theft has increased because it’s so easy to do and the rewards are so large

Okay, now that we understand the seriousness of the crime, let’s get down to the business of beating it because it’s not going away, but it can be mitigated. Let’s start with a definition.

Identity theft takes many shapes and forms. We’ll condense it to this: Identity theft is when an unauthorized person uses your personal information to access your financial accounts, open new accounts, or commit a crime.

How can your identity be stolen?

From the theft of your personal information while you’re online, to a grab of data off your unattended paperwork, to the robbery of your credit card information, to breached personal information from companies you work with, identity thieves just need some basic information. The outcome can include fraudulent charges, damaged credit, and a drained checking account.

But you can take steps to avoid being a victim. We’re going to list some of the most common scams and how you can take steps to stop an identity thief.
  1. You’ll want to watch out for phishing, pharming, vishing, and smishing. These are the strangely named and commonly used tools for identity thieves. Phishing is an attempt to steal your personal information through email by pretending to be a trustworthy source.
    1. For example, say an identity thief sends you an email pretending to be your bank. Your bank’s logo is on the email, and it looks legitimate. The thief asks you to respond with personal information. The best way to avoid being caught in this scam is to never share personal information via email.
  2. Pharming is another type of scam where a hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a website to another fraudulent website without your knowledge. To avoid pharming before you submit any personal information on a website, look for a padlock symbol on the website and https in the website address.
  3. Vishing attempts to get you to provide personal information over the phone. The thief again pretends to be a legitimate business in need of your personal information to solve a problem for you. You might receive a voice mail asking for your immediate attention. The number provided leads to an automated service asking you to enter personal information. Before you ever give personal information over the phone, make sure you know this is a trusted source.
  4. Smishing uses cell phone text messages to get you to provide personal information. Often, the text will contain a URL or phone number. And again, just like vishing, the smishing message usually asks for your immediate attention. If something is vitally important, it’s unlikely to be sent via text message. Do not respond to smishing messages.
  5. Although these types of identity theft are frequently discussed, the most common way your identity can be stolen is through theft. When we say theft, we mean physically stealing something that belongs to you from right under your nose. This includes stealing your mail or searching through your recycling or trash for statements or documents containing personal information. It can also mean stealing your wallet or purse, and, sometimes, you might not even know that your information has been stolen. Take, for example, skimming.
    1. Skimming occurs when a device records your credit card information and sends it to the thief to make unauthorized purchases. It can happen at an ATM or a retail store, anytime someone gets a moment alone with your credit card.
    2. Help prevent physical theft by shredding any documents with personal information when they are no longer needed and locking away personal documents. If you’re in a dorm or share housing with other people, consider bringing these personal documents home where they are safer. Also, frequently check your credit and debit card accounts for fraudulent charges. Items with your full social security number, like a social security card, should not be carried in your wallet or purse but instead stored and transported safely. 

It may seem like identity theft is everywhere, but if you protect yourself online, on your mobile device, at your mailbox, and always be on-guard for theft, you’ll start fighting the battle against identity theft.  And, because identity theft can happen to anyone, everyone should take a few precautions to avoid becoming a victim. Identity Theft Protection is always an option as well.  At defend-id we mitigate the risks of identity theft, insure against loss and help you recover fully if it happens to you!

 

Learn more about identity theft protection:

Preying on People after Hurricane Ian

Preying on People after Hurricane Ian

The US Federal Communications Commission (FCC) provides tips on how to stay away from con artists who prey on people after natural disasters like Hurricane Ian. Preying on people after hurricane Ian is something we should all be aware of as with any natural disaster.

Disaster victims and those attempting to donate to charities are both targets of scammers.

“First, understand that officials with government disaster assistance agencies do not call or text asking for financial account information and that there is no fee required to apply for or receive disaster assistance from FEMA or the Small Business Administration,” according to the FCC. “Anyone posing as a federal official and asking for money is an imposter.”

Always be suspicious of phone calls that ask for information!

“Remember that phone scams often use spoofing techniques to deliberately falsify the information transmitted to your caller ID display to disguise their identity or make the call appear to be official,” the alert says. “If someone calls claiming to be a government official, hang up and call the number listed on that government agency’s official website. Never reveal any personal information unless you’ve confirmed you’re dealing with a legitimate official. Workers and agents who knock on doors of residences are required to carry official identification and show it upon request, and they may not ask for or accept money.”

You should also speak with your insurance companies directly rather than relying on opportunistic calls, emails, or texts.

“If you get a phone call about an insurance claim or policy, don’t give out any personal information or agree to any payment until you can independently verify that the call is legitimate,” the alert says. “If the caller says they’re from your insurance company, hang up and contact your agent or the company directly using the number on your account statement… Contractors and home improvement companies may also call claiming to be partners with your insurance provider,” the FCC says. “Never give policy numbers, coverage details, or other personal information out to companies with whom you have not entered into a contract. If your state requires licensing, verify that any contractor you are considering is licensed and carries adequate insurance. Many states have online databases you can check.”

Disasters victims and those attempting to donate to charities are both targets of scammers. Never reveal any personal information unless you’ve confirmed you’re dealing with a legitimate official.  Preying on people after hurricane Ian is something we should all be aware of as with any natural disaster.

 

Related: Avoid Ukraine Relief Scams

Social Media Account Takeover Fraud

Social Media Account Takeover Fraud

The Identity Theft Resource Center (ITRC) published the 2022 ITRC Consumer Impact Report last week. It details a new scam known as “social media account takeover fraud,” in which cybercriminals and ID theft criminals hijack Facebook and Instagram accounts to steal personally identifiable information (PII).

Account takeover fraud (ATO), is when a fraudster successfully accesses your bank account, credit card account, cell phone account, utility account, Social Security account, or reward/loyalty card account. This occurs when malicious actors attempt to take control of an account using weak passwords, phishing, hacking, and/or credential stuffing.

What is happening…

Social media account takeover attacks have increased by more than 1,000% in the past 12 months, according to the ITRC. The results of a quick survey of victims who reported a social media account takeover are included in the 2022 Consumer Impact Report. The victims who participated in the micro-survey stated the following:

  • 85 percent had their Instagram accounts compromised, while 25 percent had their Facebook accounts compromised.
  • At least 48 percent of people clicked on a link they thought came from a friend,
  • 22 percent of people fell for a cryptocurrency scam.
  • 51 percent of victims who had their accounts compromised lost personal money or sales revenue
  • 70 percent have been permanently locked out of their social media accounts
  • 71 percent contacted friends listed in the social media account
  • 67 percent report the criminal continued to post as the account owner after the lockout.
  • 66% of victims claim to have experienced a strong emotional response after losing control of their social media account,
    • including feelings of being:
    • violated 92%
    • suicidal 77%
    • 83% worried or anxious
    • 78% anger.

Eva Velasquez, President, and CEO of the ITRC, asserts that obtaining social media verification shows how reliable and credible your profile is. Scammers are, however, developing new methods of attack. According to Velasquez, “criminals offer to help people in the verification process.” After taking control of the account, they block the real owner and start posting as that person or company. ”

Velasquez recommends that “consumers follow the instructions for the verification process directly from platforms like Facebook and Twitter to get verified on social media safely.” Do not accept help from someone who says they can ‘assist’ you through the process. ”

When remote working began during the COVID-19 Pandemic, according to James Lee, the ITRC’s Chief Operating Officer, “social media account hijacking significantly increased.” Consumers should “be aware of suspicious messages from friends and not click on links found in emails or texts unless you are 100% sure they are safe,” according to Lee.

The article How Cybercriminals Use Public Online and Offline Data to Target Employees describes another social media account scam technique and shows how a LinkedIn post about a new job opportunity was actually a phishing scam.

We all need to be aware of how social media account holders are being set up for targeted attacks, including customers and business executives. Attackers may target your social media accounts if they have sufficient information about you or your online behavior.

What can you do, then?

With these five prevention suggestions, you can be proactive and avoid social media account takeovers:

  • Never use the same password across multiple accounts, especially your social media ones.
  • Use a strong passphrase with 20 characters or a password manager.
  • Avoid clicking on any links or texts contained in shady (or unexpected) emails or texts.
  • Use a VPN and two-factor authentication (2FA), especially when using public WiFi.
  • Be wary of phishing scams that pose as well-known companies like LinkedIn, Microsoft, DHL, Amazon, Apple, Google, and Netflix.
Summary:  Social Media Account Takeover Fraud

Cybercriminals and ID theft criminals hijack Facebook and Instagram accounts to steal personally identifiable information. Social media account takeover attacks have increased by more than 1,000% in the past 12 months. The quick survey results of victims are included in the Identity Theft Resource Center’s 2022 Consumer Impact Report. Scammers are developing new methods of attack to take control of social media accounts. Consumers can be proactive and avoid social media account takeovers. Use a VPN and two-factor authentication (2FA), especially when using public WiFi, to protect against account hijacking.

 

error

Enjoy this blog? Please spread the word :)