{"id":4782,"date":"2015-04-21T11:21:55","date_gmt":"2015-04-21T15:21:55","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4782"},"modified":"2020-02-26T18:59:42","modified_gmt":"2020-02-26T14:59:42","slug":"stop-or-my-mom-will-shoot","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/stop-or-my-mom-will-shoot\/4782\/","title":{"rendered":"How to save $2000 on one call, or Why I am so proud of my Mom"},"content":{"rendered":"<p>Hello there! Usually, I write about topics concerning\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/author\/rodion\/\" target=\"_blank\" rel=\"noopener nofollow\">technical support or problem-solving<\/a>, but not this time \u2013 though it will be relevant to the cybersecurity world. Today\u2019s post concerns phone fraud. I read \u00a0a lot of articles on racketeers, and I know their methods in theory, but this is about the very first time I encountered them in the wild.<\/p>\n<p>It all started with my Mom calling me at 12.30 a.m. I had been enjoying a second solid hour of sleep by that time, so her very first question surprised me just a tad.<\/p>\n<p>\u201cRodion, where are you?\u201d I was still half asleep so it took me a moment to figure out the correct response. Then I assured Mom I was in bed, sleeping, and this wouldn\u2019t change for at least several hours. Then I asked,\u201dWhat happened?\u201d<\/p>\n<p>What happened was the following: In the dead of the night, a guy called her on the landline phone and said in a weary voice: \u201cMom, I got into an accident. I need your help. I\u2019ll pass the phone to the officer, he\u2019ll fill you in.\u201d<\/p>\n<p>Then the \u201cpolice officer\u201d took over and referred to himself as Alexander.<\/p>\n<p>Mom: \u201cWhat happened?\u201d<br>\nAlexander: \u201cYour son has run over a woman. He is facing serious charges. Are you going to help him?\u201d<br>\nMom: \u201cSure, how much would that be?\u201d<br>\nAlexander: \u201c100,000 Rubles (it\u2019s about $2000 at the moment).\u201d<br>\nMom: \u201cWhere is he?\u201d<br>\nAlexander: \u201cDo you need the exact address?\u201d<br>\nMom: \u201cYes, the address I need to bring the money to.\u201d<\/p>\n<p>Unfortunately for \u201cAlexander,\u201d he and his partner had just tried to impersonate someone who works in the\u00a0sphere of information security, and his Mom knows a lot about the stuff. So, while\u00a0Mom was having this discussion with Alexander the Policeman, she was also dialing me on her mobile to\u00a0clarify a couple of facts. Well, as soon as I answered the phone, the fraudsters hung up.<\/p>\n<p>I talked to Mom and reassured her she had nothing to worry about, and I was filled with pride upon hearing how cool-headed she was when talking to the fraudsters. As soon as the dust settled, she called the real police.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>How to save $2000 on one call, or Why I am so proud of my Mom<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fb3Zz&amp;text=How+to+save+%242000+on+one+call%2C+or+Why+I+am+so+proud+of+my+Mom\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Many people who face such a situation don\u2019t consider a call to the police an option, at least in Russia. They think that they would be laughed at or ridiculed \u2014 but let me assure you it\u2019s not the case. When we called to precinct, the first thing we were told that under no circumstances should we transfer money, and that Mom should immediately revoke the payments if they have been already executed.<\/p>\n<p>The police have treated the matter with the utmost care and seriousness and sent an investigator directly to Mom\u2019s home. He arrived at 4 a.m. (!), took her statement, briefed her on similar cases of fraud and instructed her on how to behave in circumstances like those.<\/p>\n<p>Now, it\u2019s time to analyze. The aforementioned situation is not a rare case, and fraudsters employ varied channels, including phone, SMS, email, social networks,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/skype-fraud-story\/7247\/\" target=\"_blank\" rel=\"noopener nofollow\">popular messengers (like Skype)<\/a>, etc.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Fraudsters hacked <a href=\"https:\/\/twitter.com\/hashtag\/Skype?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Skype<\/a> and tricked victim\u2019s friends to send them about $5000: <a href=\"https:\/\/t.co\/lv9nlyGvVg\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/lv9nlyGvVg<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/580457900579123200?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 24, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I can\u2019t assess why a person would go to these lengths to make an easy buck. These people don\u2019t ever think of the possibility that their intended victim might have a heart condition and such a stunt might cause an attack. Anyway, making money on others\u2019 fears is detrimental for karma, or whatever counterpart of this ethical concept you believe.<\/p>\n<p>But let\u2019s leave aside the philosophy and get down to business. Fraudsters like those we encountered try to play the family or friendship card. What parent or friend would neglect a grave situation and refuse to help? A fraudster will try to bully, scare, or confuse their victim, so the unfortunate interlocutor would bring them money without asking too many questions.<\/p>\n<p>However, there\u2019s one thing you should bear in mind. Usually, choosing a\u00a0target for such social engineering tricks is a completely random process. It might be that scammers laid their hands on a database of phone numbers and started to approach all of them on a carpet-bombing principle.<\/p>\n<p>With so many addressees available, they have a solid chance of finding a random mother who has a son, who, in turn, drives a car.<\/p>\n<p>But even with such a high degree of probability, the scammers neither know the son\u2019s name, nor the brand of the car. All in all, they don\u2019t know anything about people they are about to trick.<\/p>\n<p>Of course, there are exceptions, but mostly, it happens just the way I described above. Consequently, in order to make the fraudster back off, the very first thing you need to do is switch off your emotions (of course, it is challenging when you hear shocking news) and try to ask a question that a fraudster would not be able to answer.<\/p>\n<p>For instance, in our case, my Mom could have asked, which of her sons they mean. The culprit would have tried to avoid answering or been forced to abandon his initial plan, but in the end he would not be able to name the son in question. Then the \u2018police officer\u2019 would never even have started to talk. Another question could have been: Who are you calling?<\/p>\n<p>The second recommendation: independently of the manner the \u2018shocking news\u2019 was conveyed to you, try to reach the person who allegedly got into trouble. This is just what my Mom did. As soon as scammers realized their victim did not lose control\u00a0and continued to analyze the situation, they immediately lost their confidence and hung up.<\/p>\n<p>A phone call is much more difficult to handle in terms of emotions than SMS, messengers or other text-centric channels: you could be unable to use another phone for fact-checking, whereas the culprits would use their entire social engineering arsenal, from tonality of the voice to the acting talent. So, the main thing here is handling your emotions.<\/p>\n<p>Here is an anti-fraudster playbook which will help you to ensure\u00a0the scammers don\u2019t take advantage of you:<\/p>\n<ol>\n<li>Don\u2019t panic!<\/li>\n<li>Don\u2019t accept anything at its face value!<\/li>\n<li>Don\u2019t transfer money!<\/li>\n<li>Try to get in touch with the person in question (i.e. with the one on whose behalf the fraudster pretends to communicate).<\/li>\n<li>Ask detailed questions that only your real relative or friend would be able to answer.<\/li>\n<li>Last but not least, call the police! This is the only means of making society comprehend the problem of scamming and make this world a bit safer. It does not only include fake calls of SMS messages with pleas to transfer some money and help with some grave problem. It equally has relevance to\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/new-version-ctb-locker\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-blockers-a-new-approach-to-fighting-them\/\" target=\"_blank\" rel=\"noopener nofollow\">Windows blockers<\/a>, which\u00a0<a href=\"https:\/\/me.kaspersky.com\/en\/advert\/total-security-multi-device-trial?redef=1&amp;THRU&amp;reseller=me-en_SoMe-2015_pro_ona_smm__onl_b2c__lnk____ktsmd___\" target=\"_blank\" rel=\"noopener\">Kaspersky Lab products<\/a>can easily\u00a0<a href=\"http:\/\/support.kaspersky.com\/11151\" target=\"_blank\" rel=\"noopener\">deal with<\/a>. All these threats are small bricks in the enormous Evil Tower, which we need to rock and demolish.<\/li>\n<\/ol>\n<p>I am pretty sure there are other ways to fight off the scammers. Let\u2019s share our experiences and tips in the comments to this post. So, all of you, have good nights, be cool-headed and enjoy pleasant phone calls from your relatives and friends! Together, we will take down any threat and make this world a safer and more pleasant place to be.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello there! Usually, I write about topics concerning\u00a0technical support or problem-solving, but not this time \u2013 though it will be relevant to the cybersecurity world. Today\u2019s post concerns phone fraud.<\/p>\n","protected":false},"author":208,"featured_media":4783,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1737,80,980,742],"class_list":{"0":"post-4782","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-advice","9":"tag-fraud","10":"tag-personal-experience","11":"tag-police"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/stop-or-my-mom-will-shoot\/4782\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/stop-or-my-mom-will-shoot\/5287\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/stop-or-my-mom-will-shoot\/5837\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/stop-or-my-mom-will-shoot\/5935\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/stop-or-my-mom-will-shoot\/7567\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/stop-or-my-mom-will-shoot\/8484\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/stop-or-my-mom-will-shoot\/7412\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/stop-or-my-mom-will-shoot\/7567\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/stop-or-my-mom-will-shoot\/8484\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/stop-or-my-mom-will-shoot\/8484\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/advice-2\/","name":"advice"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/208"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4782"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4782\/revisions"}],"predecessor-version":[{"id":15997,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4782\/revisions\/15997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4783"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}