IDENTITFY FRAUDS DONE ONLINE
- Get link
- X
- Other Apps
We have all been spending more time online. Whether it's ordering food for delivery, streaming live concerts, hosting virtual parties, or participating in a little retail therapy, digital interactions are on the rise. This means that we also share more personal and financial information online, with each other, and with the organizations we interact with. Unfortunately, as always, there are bad guys in every digital corner looking for a piece of the action.
The bottom line is that personally identifiable information
is the bargaining chip for internet crime. And cybercriminals will do
everything they can to achieve it. When they commit fraud using identity theft,
it can be tricky, and it can take banks and businesses months to investigate
before you can get your money and credit score back. In a time of extreme
financial difficulty, this is the last thing anyone needs.
Therefore, it is worth being careful how you use your data
and how you protect it. Even more: it is time to be pro-active and monitor, to
try to detect from the beginning if it has been stolen.
Here's what you would like to understand to guard your identity
data.
How
Identity Theft Works
First, some facts about the scope of the problem. In the
second quarter of 2020 alone, 349,641 complaints of identity theft were filed.
To put that in perspective, it's more than half of what was reported in 2019
(650,572). In 2019, consumers reported losing quite $ 1.9 billion to fraud.
What drives this huge industry? A criminal economy
estimated at $ 1.5 trillion annually.
Specialized online marketplaces and personal forums provide
how for cyber criminals and scammers to simply buy and sell stolen identity
data. Many are on the so-called dark web, which is hidden from search engines
and requires a specialized anonymized browser like Tor to access. However, much
of this criminal activity also occurs with the naked eye, on social media sites
and messaging platforms. This clandestine industry is an unstoppable force: as
the forces of order or criminal infighting close the roads, others appear.
Personal data at risk can be anything from email and
account users to medical information, social security numbers, bank and card
details, insurance details and much more. Everything has value in the
underground of cybercrime and the price that fraudsters are willing to pay will
depend on supply and demand, just like in the "real" world.
There are several ways that attackers can obtain your data.
The main ones are:
Phishing -
Usually aims to steal your usernames and passwords or trick you into
downloading a Keylogger or other information stealing malware. Phishing occurs
primarily through email, but it can also occur through the web, text messages,
or the phone.
Malicious mobile applications disguised as legitimate
software.
Eavesdropping
on social media: If you over-share even innocuous personal
data (pet names, dates of birth, etc.), scammers could use it to access your
accounts.
Public
Wi-Fi Snooping - If you're using it, the bad guys might be
too.
Stealing devices or finding lost or misplaced devices in
public places.
Attacking
the organizations you interact with: Unfortunately, this is often
somewhat out of your control, but no less serious. 1,473 corporate violations
were reported in 2019, 17% more than the previous year.
Covertly collecting card data from the sites you shop with.
Incidents related to this type of “web skimming” increased 26% in March, as
more users flocked to e-commerce sites during the lockdown.
The COVID-19 Challenge
As if this weren't enough, consumers are especially at risk
during the current pandemic. Hackers are using the COVID-19 threat as a decoy
to infect your PC or steal identity data through the phishing tactics described
above.
They often pose as institutions, trusted officials, and
emails may claim to include new information about outbreaks or vaccines.
Clicking or disclosing your personal information will get you in trouble. Other
fraud attempts will attempt to sell counterfeit or non-existent medical or
other products to help fight infection, collecting your card details in the
process.
In March, Interpol seized 34,000 counterfeit COVID
products, such as surgical masks and potentially dangerous pharmaceuticals
worth $ 14 million.
Telephone attacks are also on the rise, especially those
posing as government officials.
What
do cybercriminals do with my identity data?
Once your data is stolen, it is usually sold on the dark
web to those who use it for malicious purposes.
It could be used to:
Enter services that share the same users and password
(through credential filling). There were 30 billion such attempts in 2018.
Log into your online bank accounts to drain your funds.
Open bank accounts, lines of credit in your name (this can
affect your credit rating).
Order phones in your name or transfer your SIM to a new
device (this affects 7,000 Verizon customers per month).
Buying expensive items in your name, such as a new watch or
television, to resell for criminal reasons. This is often done by hijacking
your accounts online. E-commerce fraud is claimed to be worth around $ 12
billion per annum.
Submit fraudulent tax returns to collect refunds on your
behalf.
Request medical attention using your insurance details.
Potentially hack into your work accounts to attack your
employer.
How do
I protect my identity online?
The good news among all these bad news is that if you
remain skeptical about what you see online, are cautious about what you share,
and follow a few other simple rules, you have a better chance of keeping your
personal identity under lock and key. You should be keep track of what you are
looking at and which websites you are logging in everything is being traced and
sometimes few websites are not good for visit but you do and you share your
data and to be safe from that you should use an antivirus that will be
fighting with the virus and will give you complete security from all fraudulent
activity. Keeping your information private and make sure it doesn’t gets leak.
- Get link
- X
- Other Apps
Comments
Post a Comment