{"id":22834,"date":"2024-05-31T08:39:40","date_gmt":"2024-05-31T12:39:40","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=22834"},"modified":"2024-06-19T10:36:23","modified_gmt":"2024-06-19T06:36:23","slug":"message-board-scam","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/message-board-scam\/22834\/","title":{"rendered":"How to sell your TV without losing your shirt (and banking data)"},"content":{"rendered":"<p>Popular message boards have long been a haven for scammers \u2014 you know, the ones who typically offer too-good-to-be-true deals on popular items? A brand new TV at half price? A near-mint-condition scooter with a 70% discount? A smartphone, still in the box and with receipt but 40% cheaper than retail? Scams, every last one.<\/p>\n<p>There\u2019s nothing complicated here: the scammer-seller asks the victim-buyer to pay for the given product through a <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">special link<\/a>. The unsuspecting victim-buyer clicks the link, \u201cpays\u201d for the item, and loses their money. This common trick is known as <em>scam 1.0<\/em> or the \u201cbuyer scam\u201d \u2014 and since most online buyers are already aware of it, it\u2019s practically vintage.<\/p>\n<p>Another fraudulent scheme is the \u201cseller scam\u201d or <em>scam 2.0<\/em>, where scammers pose as buyers to deceive sellers. Let\u2019s break it down, and then discuss how to buy and sell safely on message boards.\n<\/p>\n<h2>How the \u201cseller scam\u201d works<\/h2>\n<p>\nThe key difference between this scheme and the classic one is that the scammer pretends to be a buyer \u2014 not a seller. Scammers contact sellers with an offer to buy their product, but with a caveat \u2014 the transaction must be made as a \u201csecure payment\u201d on a \u201csecure\u201d site that acts as a guarantor. The scammer-buyer claims to have already deposited the funds into the system, and the victim-seller just needs to click a link (of course, a phishing one), enter their bank card details, and hit the \u201cReceive money\u201d button. And voil\u00e0! The banking card details are stolen, the account is drained, and the item stays on the shelf.<\/p>\n<p>First seen in Russia, this scam has spread around the world rapidly. We\u2019ve found evidence of it in Austria, Canada, France, Norway and Switzerland to date. We therefore recommend arming yourself with <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a>\u00a0before scammers target your country.\n<\/p>\n<h3>Choosing a victim<\/h3>\n<p>\nMost often, scammers target listings that sellers promote through paid advertising. This indicates that the seller is more likely to have a nice fat wallet and is eager to make a quick sale \u2014 making them less likely to scrutinize a potential buyer\u2019s legitimacy. This sense of urgency plays right into the scammer\u2019s hands.<\/p>\n<p>Although businesses using message boards also use promoted listings, these are easy to identify by their high-quality photos and detailed descriptions. Therefore, scammers target only individual sellers who often have simpler photos, fewer reviews, and product descriptions that clearly haven\u2019t been written by a professional marketer.<\/p>\n<p>Finally, scammers look for sellers willing to share their phone number and switch the communication to external messengers. Whether the seller is willing to do so is ascertained through communicating with them.\n<\/p>\n<h3>Warm-up and deception<\/h3>\n<p>\nHaving chosen a potential victim, scammers follow a fairly simple script: they greet the seller, ask a few questions (<em>\u201cWhy are you selling? What condition is the item in?\u201d<\/em>)<em>, <\/em>and immediately proceed to the deal. The scammer says they\u2019re satisfied with the item, but can\u2019t pick it up in person \u2014 it needs to be delivered, which can be arranged after a \u201csecure payment\u201d. They then describe the payment scheme to the victim in detail:\n<\/p>\n<ol>\n<li>I pay for your item;<\/li>\n<li>You receive a link to receive the money;<\/li>\n<li>You follow the link and enter your account number to get the money;<\/li>\n<li>You\u2019ll be contacted by the order-processing service, which will pack, process, and ship the item to me.<\/li>\n<\/ol>\n<p>\nIf the seller refuses such a payment method or insists on continuing communication on the official marketplace channel, the scammer simply disappears. There\u2019s no point in wasting time trying to persuade the seller, who\u2019s most likely <a href=\"https:\/\/www.kaspersky.com\/blog\/subscribe\/\" target=\"_blank\" rel=\"noopener nofollow\">one of our readers<\/a> and stays up to date with <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/fraud\/\" target=\"_blank\" rel=\"noopener nofollow\">typical fraudulent tactics<\/a>.<\/p>\n<p>However, if the victim falls for the trick, follows the phishing link and enters their payment details, the scammers immediately drain their bank account.\n<\/p>\n<h3>How to recognize phishing<\/h3>\n<p>\nIn the scam 2.0 scheme, two types of phishing pages are particularly common. The first type replicates the marketplace listing page almost identically \u2014 with one small difference. See for yourself: this phishing page looks exactly like the original listing but, instead of the <em>Inserent kontaktieren<\/em> (\u201cContact the seller\u201d) button, the scammer\u2019s button says <em>Receive 150 CHF<\/em> (CHF = Swiss francs).<\/p>\n<div id=\"attachment_51384\" style=\"width: 1284px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/05\/31164123\/message-board-scam-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51384\" class=\"size-full wp-image-51384\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/05\/31164123\/message-board-scam-01.jpg\" alt=\"The original listing for a monitor (left) and the phishing page with the scam button on a fake site (right)\" width=\"1274\" height=\"798\"><\/a><p id=\"caption-attachment-51384\" class=\"wp-caption-text\">The original listing for a monitor (left) and the phishing page with the scam button on a fake site (right)<\/p><\/div>\n<p>Upon clicking the link, the seller sees their listing on what they believe to be the legitimate marketplace site (although the website address differs from the original if they look closely). They click the \u201cReceive money\u201d button, and land on another phishing page with a form to enter their bank card details.<\/p>\n<p>In the second type of phishing page, the scammers don\u2019t bother replicating the victim\u2019s listing and instead send them directly to a fake copy of a secure payment service like Twint.<\/p>\n<div id=\"attachment_51383\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/05\/31164136\/message-board-scam-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-51383\" class=\"size-full wp-image-51383\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/05\/31164136\/message-board-scam-02.jpg\" alt='Phishing pages for conducting a \"secure payment\"' width=\"1400\" height=\"1925\"><\/a><p id=\"caption-attachment-51383\" class=\"wp-caption-text\">Phishing pages for conducting a \u201csecure payment\u201d<\/p><\/div>\n<p>As you can see from these screenshots, the potential victim needs to enter not only their bank card number but also the CVC code, cardholder\u2019s name, expiration date, as well as their email address and personal phone number. In the first case, they\u2019re even asked to disclose their account balance. With all this data, the scammers can effortlessly steal every last penny in the account.<\/p>\n<p>This type of scam has been industrialized: entire groups of cybercriminals are involved, having developed specialized tools for deceiving both buyers and sellers on message boards as effectively as possible. You can read more about the inner workings of this illegal business in our <a href=\"https:\/\/securelist.com\/message-board-scam\/112691\/\" target=\"_blank\" rel=\"noopener\">investigation<\/a>.\n<\/p>\n<h2>How to trade safely on message boards<\/h2>\n<p>\nTo avoid falling victim to scammers when selling or buying goods on marketplaces, follow these rules:\n<\/p>\n<ul>\n<li>\n<strong>Don\u2019t switch to third-party messengers<\/strong>; use the platform\u2019s built-in chat. Scammers often try to move the conversation to WhatsApp or Telegram as quickly as possible to bypass the security measures built into most boards that block link sharing. Little do they know that <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>\u00a0prevents users from following phishing links in various services and messengers.<\/li>\n<li>\n<strong>Trust only official payment resources<\/strong>. Carefully examine the website address and the page itself before entering your bank card details to avoid becoming a <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing<\/a> If you notice typos in the domain name or errors on the page, be wary and check the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-online-scam\/43908\/#:~:text=4.%20Check%20who%20registered%20the%20domain%20and%20when\" target=\"_blank\" rel=\"noopener nofollow\">domain registration date<\/a>. If the site is only a week old, it\u2019s most likely a fake.<\/li>\n<li>\n<strong>Use a virtual bank card<\/strong> with a set limit. If you\u2019re selling an item, there should be no funds on the card \u2014 then there\u2019ll be nothing for scammers to get their hands on. When buying an item, avoid prepayments whenever possible, and only pay upon receiving and inspecting the item.<\/li>\n<li>\n<strong>Be cautious about deliveries<\/strong>. Many message boards don\u2019t offer built-in options for shipping goods to other cities, so scammers might try to take advantage of this, urging you to send the item through their \u201ctrusted service\u201d.<\/li>\n<li>\n<strong>Sell locally or use cash on delivery (COD)<\/strong>. The safest transactions take place offline. If you can\u2019t find local buyers, use postal services or similar options that offer COD. This ensures that the buyer won\u2019t receive the item until they\u2019ve paid for it at the pickup point.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers posing as buyers are targeting sellers on message boards. We explain the details of this scam, and offer tips for safe online trading.<\/p>\n","protected":false},"author":2706,"featured_media":22836,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,1486],"tags":[80,76,695],"class_list":{"0":"post-22834","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"tag-fraud","10":"tag-phishing","11":"tag-scam"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/message-board-scam\/22834\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/message-board-scam\/27515\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/message-board-scam\/11744\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/message-board-scam\/30187\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/message-board-scam\/27667\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/message-board-scam\/27419\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/message-board-scam\/30081\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/message-board-scam\/28975\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/message-board-scam\/37575\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/message-board-scam\/12424\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/message-board-scam\/51379\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/message-board-scam\/21922\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/message-board-scam\/22658\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/message-board-scam\/31323\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/message-board-scam\/36555\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/message-board-scam\/29126\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/message-board-scam\/27829\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/message-board-scam\/33660\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/message-board-scam\/33325\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22834"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22834\/revisions"}],"predecessor-version":[{"id":22912,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22834\/revisions\/22912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22836"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}