{"id":12371,"date":"2018-12-11T09:00:48","date_gmt":"2018-12-11T05:00:48","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=12371"},"modified":"2019-11-15T15:22:40","modified_gmt":"2019-11-15T11:22:40","slug":"phishing-spam-hooks","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/phishing-spam-hooks\/12371\/","title":{"rendered":"Online fraud: 5 most common spammer tricks"},"content":{"rendered":"<p><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/spam\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">Spam<\/a> and <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/phishing\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> often go hand in hand: Fraudsters send mass mailings in an attempt to phish information from recipients. For them, users\u2019 personal data remains a highly prized and desired asset, as evidenced by both the constant high-profile media stories and our own spam flow analysis. A common aim of spam is to gain access to your accounts or bank card numbers through e-mail phishing and social engineering techniques.<\/p>\n<p>In this post, we look at the five tricks most commonly employed by spammers.<\/p>\n<h2>1. Fake notifications from social networks<\/h2>\n<p>Spammers actively send fake notifications that seem to come from popular social networks and are about new friends, their activities, comments, likes, and so forth. Such messages are often indistinguishable from the real thing, the only difference being that they contain a phishing link, which is not always easy to spot. On following the link, users are prompted to enter their username and password on a fake login page.<\/p>\n<p>Another common variant is messages supposedly from social networks, but this time with threats alleging, for example, that suspicious activity has been detected on your account, or that a new feature has been introduced and users who don\u2019t give their consent will be blocked. Whatever the case, the message will contain a button with a link to a phishing login page.<\/p>\n<div id=\"attachment_24890\" style=\"width: 1012px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174140\/phishing-spam-hooks-screen1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-24890\" class=\"size-full wp-image-12374\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174140\/phishing-spam-hooks-screen1.png\" alt=\"Phishers most popular tricks: Fake notifications from social networks\" width=\"1002\" height=\"604\"><\/a><p id=\"caption-attachment-24890\" class=\"wp-caption-text\">Phishers most popular tricks: Fake notifications from social networks<\/p><\/div>\n<h3>2. Banking phishing<\/h3>\n<p>Phishing aimed at obtaining users\u2019 bank card details is still the most popular kind of fraud. Fake messages may be sent in the name of banks or payment systems. The most common message subjects are related to account blocking or \u201csuspicious activity\u201d on the client\u2019s personal account.<\/p>\n<p>Under the pretext of restoring access, confirming identity, or canceling a transaction, the user is asked to enter bank card details (often including the CVV\/CVC code) on a fake bank website. On receiving the data, the criminals immediately withdraw money from the victim\u2019s account. It\u2019s the same story with payment systems, but in those cases, victims are asked only to log in to their accounts.<\/p>\n<div id=\"attachment_24891\" style=\"width: 1012px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174149\/phishing-spam-hooks-screen2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-24891\" class=\"size-full wp-image-12376\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174149\/phishing-spam-hooks-screen2.png\" alt=\"Phishers most popular tricks: Fake notifications from banks and payment systems\" width=\"1002\" height=\"904\"><\/a><p id=\"caption-attachment-24891\" class=\"wp-caption-text\">Phishers most popular tricks: Fake notifications from banks and payment systems<\/p><\/div>\n<h3>3. Fake notifications from popular services and sellers<\/h3>\n<p>Likewise, fake notifications are created using the brand names of popular online stores, delivery services, booking sites, multimedia platforms, job search websites, and other popular online services. Cybercriminals rely on the odds their spam messages will reach at least some genuine users of such services, who are likely to panic and click or tap whatever they see.<\/p>\n<div id=\"attachment_24892\" style=\"width: 1012px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174158\/phishing-spam-hooks-screen3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-24892\" class=\"size-full wp-image-12378\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174158\/phishing-spam-hooks-screen3.png\" alt=\"Phishers most popular tricks: Fake notifications from various services and shops\" width=\"1002\" height=\"793\"><\/a><p id=\"caption-attachment-24892\" class=\"wp-caption-text\">Phishers most popular tricks: Fake notifications from various services and shops<\/p><\/div>\n<h3>4. Fake notifications from e-mail services<\/h3>\n<p>Scammers use this kind of spam to harvest usernames and passwords for e-mail services. One of two common pretexts is typically deployed: Users are prompted either to restore their password or to increase the available space in their mailbox, which is supposedly full. In the latter case, the phishing link promises a manifold increase in storage capacity, which in the era of cloud computing and the ever-growing need for storing large amounts of data does not seem all that suspicious.<\/p>\n<div id=\"attachment_24893\" style=\"width: 1012px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174205\/phishing-spam-hooks-screen4.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-24893\" class=\"size-full wp-image-12380\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174205\/phishing-spam-hooks-screen4.png\" alt=\"Phishers most popular tricks: Fake notifications from e-mail services\" width=\"1002\" height=\"539\"><\/a><p id=\"caption-attachment-24893\" class=\"wp-caption-text\">Phishers most popular tricks: Fake notifications from e-mail services<\/p><\/div>\n<h3>5. \u201cNigerian prince\u201d fraud<\/h3>\n<p>Lastly, one of the oldest types of spam \u2014 the promise of fortune from a relative or a lawyer of a dead millionaire in exchange for an up-front payment \u2014 is still making the rounds. A variation on the theme involves the scammer posing as a celebrity in a difficult situation. Victims are promised an impressive reward if they agree to help the unfortunate millionaire withdraw funds trapped in various bank accounts. To do so, they must, of course, first send detailed information about themselves (passport details, account data, etc.) and a modest amount of money for paperwork.<\/p>\n<div id=\"attachment_24894\" style=\"width: 1012px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174214\/phishing-spam-hooks-screen5.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-24894\" class=\"size-full wp-image-12382\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/12\/10174214\/phishing-spam-hooks-screen5.png\" alt=\"Phishers most popular tricks: Nigerian prince fraud\" width=\"1002\" height=\"756\"><\/a><p id=\"caption-attachment-24894\" class=\"wp-caption-text\">Phishers most popular tricks: Nigerian prince fraud<\/p><\/div>\n<p>The list of spammers\u2019 favorite topics and techniques does not end there, but the five methods described above are the most effective and thus the most common.<\/p>\n<h3>Don\u2019t be a victim<\/h3>\n<p>The best advice is to be careful. But that\u2019s a bit vague, so here\u2019s some nitty-gritty:<\/p>\n<ul>\n<li>When you receive a message with a notification from a company or service, check that it was sent from a bona fide address. Using Google as an example, the message should come from <em>no-reply@accounts.<strong><strong>google.com<\/strong><\/strong><\/em>, and not <em>no-reply@accounts.<strong><strong>google.scroogle.com<\/strong><\/strong><\/em> or something like that.<\/li>\n<li>If you do follow a link in such a message, again, make sure that you are taken to the real website, not a fake.<\/li>\n<li>Use <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">a reliable security solution<\/a> with antispam and antiphishing protection \u2014 it will detect fraudulent e-mails and warn you clearly.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>The 5 most common ways spammers can trick you into paying them or giving up your personal information.<\/p>\n","protected":false},"author":2495,"featured_media":12372,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1815,76,240,521],"class_list":{"0":"post-12371","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-e-mail","9":"tag-phishing","10":"tag-spam","11":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-spam-hooks\/12371\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/phishing-spam-hooks\/14770\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/phishing-spam-hooks\/6129\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/phishing-spam-hooks\/16710\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-spam-hooks\/14905\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/phishing-spam-hooks\/13853\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/phishing-spam-hooks\/17521\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/phishing-spam-hooks\/16689\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phishing-spam-hooks\/21850\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/phishing-spam-hooks\/5507\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-spam-hooks\/24888\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/phishing-spam-hooks\/11260\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/phishing-spam-hooks\/11174\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/phishing-spam-hooks\/10141\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/phishing-spam-hooks\/18243\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/phishing-spam-hooks\/22134\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/phishing-spam-hooks\/23534\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phishing-spam-hooks\/17727\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-spam-hooks\/21620\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-spam-hooks\/21617\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2495"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12371"}],"version-history":[{"count":7,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12371\/revisions"}],"predecessor-version":[{"id":14553,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12371\/revisions\/14553"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12372"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}