SlideShare a Scribd company logo
Internet Scams and Fraud
Information Security & Privacy Office
Before We Start…
• I need your help
• I have a large sum of money that I’m trying
to get out of the country
• For your help, I’ll gladly pay you a
percentage or about 1.5 million dollars
Received1/21/2009byIlene’spersonalemailaccount
Nigerian 419 Scam
• A wealthy foreigner who needs help moving millions of
dollars from his homeland promises a hefty percentage
of this fortune as a reward
– Claims to be Nigerian official, businessman, or the surviving
spouse of former government honchos
• If you respond, you may receive “official looking”
documents and asked to provide your bank account
numbers, as well as some money to cover transaction
and transfer costs and attorney’s fees
• AKA “4-1-9 fraud” (after the section of the Nigerian penal
code that addresses these schemes)
Today’s Objective
• Learn to recognize
online scams
• Don’t be a victim
What is a scammer’s goal?
Money!
• Money they can get directly from you!
• Information that can be sold for money!
• Control of your PC that could be used to
generate money!
– By using your PC to send spam
– By using your PC to launch DDoS attacks
Advanced Fee Fraud
• Class of fraud where scammers convince victims
to pay a fee to receive something of value
– But scammers never deliver
Received9/15/2011byIlene’spersonalemailaccount
Foreign Lottery AFF Scam
• Congrats! You’ve won a large sum of
money in a foreign lottery (that you never
entered)
– But you need to send a small “transaction fee”
• You may even get a check as proof of
your winnings… but the check bounces
Need a Job? Work from Home!!
Work-at-Home Scam
• Advertisers offer kits that enable home workers
to make money posting links on the Internet
– You need to pay $2 for a kit
• What often happens?
• Terms and Conditions state you authorize $80
monthly charge to bank account or credit card
Protection Strategies
• It’s unlikely an African official knows you and
needs your help
• Sorry, but it’s unlikely you won a lottery you
didn’t enter
– And don’t pay fees for winning something
• Don’t pay a company to hire you
• Read the fine print
“Click Here” Scams
Why Click – Malware Goals
• Get your identity or account credentials
– Keystroke loggers
• Get control of your PC to create a big
network of “robot” computers (a botnet)
– Viruses and worms
– Botnets are used for spam and launching
distributed denial-of-service attacks
Typical “Click Here” eMail
Variation on a Theme
Important “Click Here” eMail
Variation on a Theme
Wrong Transaction Scam
• A hotel made a “wrong transaction” while
processing your credit card
– Click here to get a refund
• Variant: Your recent
iTunes purchase
• Yep – it installs malware
on your PC
Natural Disaster / Current Event
Scams
• OMG!!! Something happened and you need to
know about it. Click here!!
• Takes advantage of your curiosity
• They’re fast and sophisticated
– Barely hours after the Japan tragedies, bad guys
began using emails, fake websites, and malicious
downloads to try to steal money or plant malware on
user systems
Examples
• “Bloody Photos of Gadhafi Death”
– Malware BEHAV-103
• “Osama found!”
– Malware BOBAX
• “London bomb” CNN message
– Malware TROJ.DONBOMB.A
• “Tsunami Victim Fund”
– Phish to get your personal information
• “Michael Jackson suicide attempt”
– Malware VBS_PHEL.A
About Your Job Application...
• Problem: Accepting email attachments
from strangers may contain malware
– Resumes and job applications
• Example: You post on LinkedIn that
you’re looking for a job
– Scammer targets you
Scareware aka Rogue Software
• Fake security software
– Gets you to load malicious software AND
– Gets your personal / credit card info
Classic Protection Strategies
• Pick strong passwords
– Easy to remember, but hard to guess or crack
• Don’t post too much information about yourself
• Use anti-virus software and keep it up to date
– Know what your AV warnings look like
• Apply security patches immediately, including those from
Adobe and other trusted sources
– Configure your computer to apply patches automatically
– Also update your mobile devices (smartphones, tablets…)
Oooohhhh – Aaaaahhhh
Check out the iPhone 5G!
Click Here!!!
Youjustgotthisemail…
When You Click Here…
• You get redirected to download an application
called iphone5.gif.exe
– It’s hosted on a hacked server
• Bad guy takes control of your PC
• Malware contains this text inside it:
“I wanna be a billionaire so frickin bad!”
Youjustgotthisemail…
Clickonlinkandgoto…
Fake PayPal Website
You’ve Been Phished!
• Phishing – “Spoofed”
emails and fraudulent
websites designed to fool
recipients into divulging
personal information
• eMails look very authentic
with company logos
and link to authentic-
looking web sites
Protection Strategies
• Check out file names
– iPhone scam file name is iphone5.gif.exe
– Note double extension!!
• Check out links – Hover your mouse over the link and
look at the bottom-left corner of your browser window
– Phish scam URL is
http://www.mittemaedchen.de/twg176/admin/www.paypal.co.uk/
details.php?cmd=_login-done&login_access=1193476743
• Enter web addresses manually and/or telephone the
company using a well-publicized phone number
Before We Continue…
• I feel funny admitting this, but I’m in love with you
• I want to meet you in person – I just don’t have the
money to visit you
• But I can’t wait to see you face-to-face
• And feel your arms around me
• I just wish I could afford to come to you
Romance Scams
• Bad guy/gal uses online dating or social
networking sites and posts attractive picture
• Communicates and gains
victim’s confidence
• Then asks for money
– Travel expenses to meet in person
– Medical expenses
– Information about the fidelity
of the victim’s significant other
Scammers’ Tricks
Psychology of a Scam
Scammers Craft Messages to…
• Get you to react (not act)
– Make you think you’re heading off “impending disaster” or you’re
getting a “great deal” by doing what the scammer says
– Bypass your normal, rational thought process
• Play upon your desire to help
– Once a person has accepted the helper role, they usually find it
awkward or difficult to back off from helping
• Start small and create a “momentum of compliance” by
making a series of requests, starting with innocuous
ones
Scammers Prey on Our…
Psychological Trickery
• There are six basic tendencies of human nature
that can be exploited
• We have a tendency to comply with and help
– Authority figures
– People we like
– People who have already done something to help us
– When we’ve made a verbal promise or commitment to do so
– When the behavior seems to be supported by our peers
– When the object being sought is in short supply, is creating
competition, or is only available for a limited time
Before We Continue…
• Grandma, I’m on vacation in Canada and was in
a car accident. Please wire me $3,000 to pay
for medical expenses.
• I’m on vacation in London and was mugged. I
can’t pay my hotel bill and they’re going to send
me to jail. Please wire me $2,500 ASAP! I’ll pay
you back when I get home.
Scams Come From Everywhere
• Text message
received
on Ilene’s
cell phone
October 5, 2011
You Owe Money!!
• A man telephones victim at work claiming to be
from Parker and Parker law firm
• He demands that she pay $1,000 to settle a
payday loan, which she never took out
• Caller is extremely aggressive, refusing to hang-
up the phone when a co-worker asked that he
call back at a later time
– Caller also had the consumer’s Social Security and
Drivers License numbers
Windows Service Center
• Setup: Receive phone call from a man claiming
to be from Microsoft’s “Windows Service Center”
– Caller says my computer has lots of malware on it,
which is showing up at Microsoft
– Man will clean it up for me
• Talks me through opening the Windows Event
Viewer to see errors and warnings “proving” my
PC needs his help
Windows Service Center
• Man’s name is “Richard Thomas”
– Man has heavy Indian accent
• Phone number caller ID shows “011”
• Man wants me to allow him to remotely access my
computer so he could “clean” my PC
• Hung up on me when I asked his phone number
– To call back in case we got disconnected
What Would You Do?
• You get a call at work from the Help Desk
• They need your password to fix a network
problem
Phone Scam Safeguards
• Don’t immediately respond
• Verify caller’s identity – Get caller’s name and (desk)
phone number
– If claiming to be an employee, look him up in employee directory
• Does his phone number start with expected prefix?
• Call the organization / company / Help Desk and ask
– Use the normal, published phone number
• For “family members in distress,” call family / friends to
verify
Facebook Survey Scams
• Pointless surveys that make money for scammers via
affiliate revenue from unscrupulous marketing firms
• Some surveys attempt to trick
victims into signing up for expensive
premium-rate texting subscription
services
• Some surveys are just ways to gather information about
you that can be used to guess your password or target
you for a scam
Get More Twitter Followers
• “GET MORE FOLLOWERS MY BEST
FRIENDS? I WILL FOLLOW YOU BACK IF YOU
FOLLOW ME - [LINK]”
– Just enter your Twitter username and password
• You’ve just given control of your account to
someone else
– They may then post spam or malicious updates and
links, send unwanted messages, or violate other
Twitter rules with your account
Shortened (Tiny) URLs
• Problem: Clicking on shortened URLs may go to
a malicious site
• Example: @twitterguy, what do you think about
what Obama said? http://shar.es/HNGAt
– Scammers can choose to redirect you to any
webpage they like (malicious, porn, phishing)
– Scammers are also embedding malicious links into
tweets with popular hash terms (#term)
Skimmers
• A device that reads and copies card numbers
• Data is then
transferred
onto cloned
credit cards
• Used to
withdraw cash
at other ATMs or purchase goods
To Spot a Skimmer
• Skimmers are hard to identify!!
• Look for
– Wrong colors or materials (cheap plastic vs. metal)
– Glue or sticky spots
– A card reader “sticking out” more than usual
• Wiggle the slot before sliding a card into an ATM slot
– ATM slots with skimmers will appear loose, while those without
skimmers will not wiggle at all
• Get to know “your” ATM
• Use ones in well lit, public places, especially with
surveillance cameras around
Scams and-fraud-presentation
Internet Allows Bad Guys to
Reach More Potential Victims
But Wait – There’s More…
Internet Crime is a Problem
• Internet Crime Complaint Center (IC3) received
303,809 complaints in 2010
– Averaging 25,317 per month
Before We Continue…
• Hi! My name is Heidi, and I see you
have a room for rent.
• I’m coming over to the U.S. for a
work/study program that’s sponsored by
the Swedish government.
– So there’s no risk of renting to me
• But I only got one check to cover both
rent and travel.
• So I’ll send you the check. You can
deposit it, keep the rent payment, and
send me the rest.
Overpayment Scam
• Bad guy sends you a check for more than the
correct amount
• Rather than canceling and reissuing the check –
since the scammer trusts you – you are asked to
deposit the check and refund the difference
• Except the check bounces and you’re liable
Secret Shopper Scam
• Advertisers seek applicants for paid positions as
“secret” shoppers
– But you need to pay fees to purchase training
materials, obtain certification, or register with a
database of secret shoppers
• Updated version: You get an employment
packet with a cashier’s check for about $3,000
– Your assignment is to pose as bank customer, cash
the check, and wire the funds to an address
– Check bounces and you’re liable for the money
Before We Finish Today…
• *WARNING* *WARNING*
GAMING FRIENDS – TAKE NOTE !!!
• This was on CNN this morning
• Do not click on a link that says it is a game for
Twilight the Movie “BREAKING DAWN”
• Facebook says this is the worst virus ever!!!
• PLEASE FORWARD TO YOUR FRIENDS
Hoax
• Tell-tale hoax signs
– Threatens dire consequences if you don’t obey
– Promises money or prize for performing some action
– Claims it’s not a hoax
– Contains technical-sounding language and/or specific
names and organizations to make the message seem
legitimate
– Urges you to forward the message to EVERYBODY
– Has already been forwarded multiple times (evident
from the trail of email headers in the body of the
message)
Be Aware
• Be skeptical!!
• Be suspicious of sensational, upsetting, or exciting (but
false) statements
– Goal is to get you to click / react immediately without thinking
• Be wary of attachments
• Verify (and then ignore) commands and requests for
action
– Verify identity of message sender
– Hover your mouse over the link and look at the bottom left corner
of your browser window
– Enter web addresses manually and/or telephone the company
using a well-publicized phone number
Prevent Donation Fraud
• Know the organization, be sure they’re
legitimate
– Check the Better Business Bureau and other online
resources
• Don’t respond to any email donation request
• Never open attached files from people or
organizations you aren’t familiar with
– Like “disaster photos” that may contain viruses
• And most importantly, use common sense
For More Information
• Anti Phishing Working Group
– http://www.antiphishing.org/
• Internet Crime Complaint Center
– http://www.ic3.gov/default.aspx
• Looks too Good to be True
– http://www.lookstoogoodtobetrue.com/
• Snopes – Hoax resource
– www.snopes.com
• U.S. Secret Service
– http://www.secretservice.gov/criminal.shtml
• U.S. Federal Trade Commission
– http://www.ftc.gov/bcp/consumer.shtm
If You Think You’ve
Been Scammed
• File a report with the City of Phoenix Police Electronic
Crimes Division
– Non-Emergency - 602-262-6151
• File a complaint with the Internet Crime Complaint
Center (IC3)
– http://www.ic3.gov/complaint/default.aspx
– IC3 reviews each complaint and refers it to the appropriate
federal, state, local, or international law enforcement or
regulatory agency
• Depending on the type of scam, you may be instructed
to take more steps
Scams and-fraud-presentation
Questions? Contact
ispo@phoenix.gov
Scams and-fraud-presentation
Buy My Bonds
• A 52-year-old Missouri man made $100 million from selling
worthless financial documents
• Used his home PC to create 2,000 “bonded promissory notes”
– Claimed they were backed by a U.S. Treasury Department account
– Sold them for a fee at the “Private Bank of Denny Ray Hardin,” which he
ran out of his Kansas City home
• “Private Bank” owner convicted September 15, 2011 of 21 federal
fraud charges (creating fictitious obligations and mail fraud)
Get Your iPad Here
• 8/29/2011 – A 22-year-old woman in South Carolina
McDonald’s parking lot was approached by two men who
offered her an iPad for $300
– Claiming they had bought iPads in bulk, men showed her an
actual iPad and agreed to take $180 for it
• She was handed one of several FedEx boxes from their
car’s trunk
– She drove home without looking inside
• When she opened the box at home, it contained “a piece
of wood painted black with an Apple logo”
Verify Your Purchases
• Get names and addresses of companies
• Check with the Better Business Bureau
• Get references
• Get a warranty
• Keep any documentation (evidence)
– Canceled checks, credit card receipts
– Emails, chats, texts, or website screen prints
– Pamphlets or brochures
• If it looks too good to be true, it probably is!

More Related Content

PDF
Online Scams and Frauds
PPT
Internet Fraud
PPTX
Internet Fraud
PPTX
Internet fraud #scichallenge2017
 
PPTX
Cyber crime ppt
PPTX
Cybercrime Awareness
PPTX
Cyber crime
PPT
CYBER CRIME
Online Scams and Frauds
Internet Fraud
Internet Fraud
Internet fraud #scichallenge2017
 
Cyber crime ppt
Cybercrime Awareness
Cyber crime
CYBER CRIME

What's hot (20)

PPTX
Cyber Crime
PPTX
Cyber crime
PDF
Cyber security
PPTX
Cyber security
PPTX
Different Types of Phishing Attacks
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPTX
Phishing awareness
PPTX
Cyber crime
PPT
Cyber Security and Cyber Awareness
PPT
Cyber Crime and Security
PPTX
Cyber Crime And Security
PPTX
Phishing attack
PPTX
PPTX
Cybersecurity Awareness Overview.pptx
PPT
Avoiding Fraud and Identity Theft - October 2008
PPTX
What is Phishing and How can you Avoid it?
PPTX
Cyber crime ✔
PPTX
Cyber security and its advantages
PPTX
Hacking ppt
PPTX
Cyber Crime and Cyber Security
Cyber Crime
Cyber crime
Cyber security
Cyber security
Different Types of Phishing Attacks
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Phishing awareness
Cyber crime
Cyber Security and Cyber Awareness
Cyber Crime and Security
Cyber Crime And Security
Phishing attack
Cybersecurity Awareness Overview.pptx
Avoiding Fraud and Identity Theft - October 2008
What is Phishing and How can you Avoid it?
Cyber crime ✔
Cyber security and its advantages
Hacking ppt
Cyber Crime and Cyber Security
Ad

Similar to Scams and-fraud-presentation (20)

ODP
Week 5 protect yourself from cyber threats
PPT
Week 5 protect yourself from cyber threats
PDF
IWC - Phishing and Internet Scams
PPTX
Cyber safety for seniors at a day center
PPT
Protect Yourself From Cyber Threats (v.2.0)
PPTX
Email Security Awareness
PPT
Protecting Yourself from Cyber Threats
PDF
Fraud Awareness Guide for Individuals
PPTX
cot-2022.pptx
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPTX
Internet Scams, Identity Theft And
PPT
Computer crime by inqilab patel
PDF
Unmasking the Scammers. pdf by Mathias. O.O
PDF
Online Security
PPSX
How to Avoid Getting Malware on Your Computer
PPSX
How to Avoid Getting Malware on your Computer
PPTX
Day 2
PDF
National Life IT Department's Cyber Security Awareness Presentation
PPTX
Internet Security
PPTX
Top Ten Scams of 2012
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
IWC - Phishing and Internet Scams
Cyber safety for seniors at a day center
Protect Yourself From Cyber Threats (v.2.0)
Email Security Awareness
Protecting Yourself from Cyber Threats
Fraud Awareness Guide for Individuals
cot-2022.pptx
IDENTIFYING CYBER THREATS NEAR YOU
Internet Scams, Identity Theft And
Computer crime by inqilab patel
Unmasking the Scammers. pdf by Mathias. O.O
Online Security
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on your Computer
Day 2
National Life IT Department's Cyber Security Awareness Presentation
Internet Security
Top Ten Scams of 2012
Ad

More from Roel Palmaers (20)

PDF
Ddos extortion campaigns
PDF
Hoe ontwerp ik een agile organisatie
PDF
Evaluating law enforcement_bradford_9_24
PDF
The effectiveness of policing cybercrime
PDF
Ipv6 evolution
PDF
Irish travelers presentatie
PDF
Food for thought_29 feb 2016
PDF
Straathoekwerk en politie
PDF
Cahiers politiestudies presentatie rva 03 12 2009
PDF
Financiële risico’s participatiewet
PDF
Afval=grondstof
PDF
Electronics reference sheet
PDF
Digging into google
PDF
Google cheat-sheet-nederlands
PDF
Google cheat-sheet-english
PDF
Working with facebook graph presentation
PDF
Ips pearls in policing factsheet en
PDF
Financiële problematiek en de impact daarvan
PDF
Een goede nacht nachtarbeid
PDF
10 tips voor gezonde ogen
Ddos extortion campaigns
Hoe ontwerp ik een agile organisatie
Evaluating law enforcement_bradford_9_24
The effectiveness of policing cybercrime
Ipv6 evolution
Irish travelers presentatie
Food for thought_29 feb 2016
Straathoekwerk en politie
Cahiers politiestudies presentatie rva 03 12 2009
Financiële risico’s participatiewet
Afval=grondstof
Electronics reference sheet
Digging into google
Google cheat-sheet-nederlands
Google cheat-sheet-english
Working with facebook graph presentation
Ips pearls in policing factsheet en
Financiële problematiek en de impact daarvan
Een goede nacht nachtarbeid
10 tips voor gezonde ogen

Recently uploaded (20)

DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
E -tech empowerment technologies PowerPoint
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Digital Literacy And Online Safety on internet
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
artificial intelligence overview of it and more
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Sims 4 Historia para lo sims 4 para jugar
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Job_Card_System_Styled_lorem_ipsum_.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
E -tech empowerment technologies PowerPoint
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
INTERNET------BASICS-------UPDATED PPT PRESENTATION
presentation_pfe-universite-molay-seltan.pptx
Power Point - Lesson 3_2.pptx grad school presentation
newyork.pptxirantrafgshenepalchinachinane
An introduction to the IFRS (ISSB) Stndards.pdf
Digital Literacy And Online Safety on internet
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
SAP Ariba Sourcing PPT for learning material
artificial intelligence overview of it and more
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Sims 4 Historia para lo sims 4 para jugar

Scams and-fraud-presentation

  • 1. Internet Scams and Fraud Information Security & Privacy Office
  • 2. Before We Start… • I need your help • I have a large sum of money that I’m trying to get out of the country • For your help, I’ll gladly pay you a percentage or about 1.5 million dollars
  • 4. Nigerian 419 Scam • A wealthy foreigner who needs help moving millions of dollars from his homeland promises a hefty percentage of this fortune as a reward – Claims to be Nigerian official, businessman, or the surviving spouse of former government honchos • If you respond, you may receive “official looking” documents and asked to provide your bank account numbers, as well as some money to cover transaction and transfer costs and attorney’s fees • AKA “4-1-9 fraud” (after the section of the Nigerian penal code that addresses these schemes)
  • 5. Today’s Objective • Learn to recognize online scams • Don’t be a victim
  • 6. What is a scammer’s goal?
  • 7. Money! • Money they can get directly from you! • Information that can be sold for money! • Control of your PC that could be used to generate money! – By using your PC to send spam – By using your PC to launch DDoS attacks
  • 8. Advanced Fee Fraud • Class of fraud where scammers convince victims to pay a fee to receive something of value – But scammers never deliver
  • 10. Foreign Lottery AFF Scam • Congrats! You’ve won a large sum of money in a foreign lottery (that you never entered) – But you need to send a small “transaction fee” • You may even get a check as proof of your winnings… but the check bounces
  • 11. Need a Job? Work from Home!!
  • 12. Work-at-Home Scam • Advertisers offer kits that enable home workers to make money posting links on the Internet – You need to pay $2 for a kit • What often happens? • Terms and Conditions state you authorize $80 monthly charge to bank account or credit card
  • 13. Protection Strategies • It’s unlikely an African official knows you and needs your help • Sorry, but it’s unlikely you won a lottery you didn’t enter – And don’t pay fees for winning something • Don’t pay a company to hire you • Read the fine print
  • 15. Why Click – Malware Goals • Get your identity or account credentials – Keystroke loggers • Get control of your PC to create a big network of “robot” computers (a botnet) – Viruses and worms – Botnets are used for spam and launching distributed denial-of-service attacks
  • 17. Variation on a Theme
  • 19. Variation on a Theme
  • 20. Wrong Transaction Scam • A hotel made a “wrong transaction” while processing your credit card – Click here to get a refund • Variant: Your recent iTunes purchase • Yep – it installs malware on your PC
  • 21. Natural Disaster / Current Event Scams • OMG!!! Something happened and you need to know about it. Click here!! • Takes advantage of your curiosity • They’re fast and sophisticated – Barely hours after the Japan tragedies, bad guys began using emails, fake websites, and malicious downloads to try to steal money or plant malware on user systems
  • 22. Examples • “Bloody Photos of Gadhafi Death” – Malware BEHAV-103 • “Osama found!” – Malware BOBAX • “London bomb” CNN message – Malware TROJ.DONBOMB.A • “Tsunami Victim Fund” – Phish to get your personal information • “Michael Jackson suicide attempt” – Malware VBS_PHEL.A
  • 23. About Your Job Application... • Problem: Accepting email attachments from strangers may contain malware – Resumes and job applications • Example: You post on LinkedIn that you’re looking for a job – Scammer targets you
  • 24. Scareware aka Rogue Software • Fake security software – Gets you to load malicious software AND – Gets your personal / credit card info
  • 25. Classic Protection Strategies • Pick strong passwords – Easy to remember, but hard to guess or crack • Don’t post too much information about yourself • Use anti-virus software and keep it up to date – Know what your AV warnings look like • Apply security patches immediately, including those from Adobe and other trusted sources – Configure your computer to apply patches automatically – Also update your mobile devices (smartphones, tablets…)
  • 26. Oooohhhh – Aaaaahhhh Check out the iPhone 5G! Click Here!!! Youjustgotthisemail…
  • 27. When You Click Here… • You get redirected to download an application called iphone5.gif.exe – It’s hosted on a hacked server • Bad guy takes control of your PC • Malware contains this text inside it: “I wanna be a billionaire so frickin bad!”
  • 30. You’ve Been Phished! • Phishing – “Spoofed” emails and fraudulent websites designed to fool recipients into divulging personal information • eMails look very authentic with company logos and link to authentic- looking web sites
  • 31. Protection Strategies • Check out file names – iPhone scam file name is iphone5.gif.exe – Note double extension!! • Check out links – Hover your mouse over the link and look at the bottom-left corner of your browser window – Phish scam URL is http://www.mittemaedchen.de/twg176/admin/www.paypal.co.uk/ details.php?cmd=_login-done&login_access=1193476743 • Enter web addresses manually and/or telephone the company using a well-publicized phone number
  • 32. Before We Continue… • I feel funny admitting this, but I’m in love with you • I want to meet you in person – I just don’t have the money to visit you • But I can’t wait to see you face-to-face • And feel your arms around me • I just wish I could afford to come to you
  • 33. Romance Scams • Bad guy/gal uses online dating or social networking sites and posts attractive picture • Communicates and gains victim’s confidence • Then asks for money – Travel expenses to meet in person – Medical expenses – Information about the fidelity of the victim’s significant other
  • 35. Scammers Craft Messages to… • Get you to react (not act) – Make you think you’re heading off “impending disaster” or you’re getting a “great deal” by doing what the scammer says – Bypass your normal, rational thought process • Play upon your desire to help – Once a person has accepted the helper role, they usually find it awkward or difficult to back off from helping • Start small and create a “momentum of compliance” by making a series of requests, starting with innocuous ones
  • 37. Psychological Trickery • There are six basic tendencies of human nature that can be exploited • We have a tendency to comply with and help – Authority figures – People we like – People who have already done something to help us – When we’ve made a verbal promise or commitment to do so – When the behavior seems to be supported by our peers – When the object being sought is in short supply, is creating competition, or is only available for a limited time
  • 38. Before We Continue… • Grandma, I’m on vacation in Canada and was in a car accident. Please wire me $3,000 to pay for medical expenses. • I’m on vacation in London and was mugged. I can’t pay my hotel bill and they’re going to send me to jail. Please wire me $2,500 ASAP! I’ll pay you back when I get home.
  • 39. Scams Come From Everywhere • Text message received on Ilene’s cell phone October 5, 2011
  • 40. You Owe Money!! • A man telephones victim at work claiming to be from Parker and Parker law firm • He demands that she pay $1,000 to settle a payday loan, which she never took out • Caller is extremely aggressive, refusing to hang- up the phone when a co-worker asked that he call back at a later time – Caller also had the consumer’s Social Security and Drivers License numbers
  • 41. Windows Service Center • Setup: Receive phone call from a man claiming to be from Microsoft’s “Windows Service Center” – Caller says my computer has lots of malware on it, which is showing up at Microsoft – Man will clean it up for me • Talks me through opening the Windows Event Viewer to see errors and warnings “proving” my PC needs his help
  • 42. Windows Service Center • Man’s name is “Richard Thomas” – Man has heavy Indian accent • Phone number caller ID shows “011” • Man wants me to allow him to remotely access my computer so he could “clean” my PC • Hung up on me when I asked his phone number – To call back in case we got disconnected
  • 43. What Would You Do? • You get a call at work from the Help Desk • They need your password to fix a network problem
  • 44. Phone Scam Safeguards • Don’t immediately respond • Verify caller’s identity – Get caller’s name and (desk) phone number – If claiming to be an employee, look him up in employee directory • Does his phone number start with expected prefix? • Call the organization / company / Help Desk and ask – Use the normal, published phone number • For “family members in distress,” call family / friends to verify
  • 45. Facebook Survey Scams • Pointless surveys that make money for scammers via affiliate revenue from unscrupulous marketing firms • Some surveys attempt to trick victims into signing up for expensive premium-rate texting subscription services • Some surveys are just ways to gather information about you that can be used to guess your password or target you for a scam
  • 46. Get More Twitter Followers • “GET MORE FOLLOWERS MY BEST FRIENDS? I WILL FOLLOW YOU BACK IF YOU FOLLOW ME - [LINK]” – Just enter your Twitter username and password • You’ve just given control of your account to someone else – They may then post spam or malicious updates and links, send unwanted messages, or violate other Twitter rules with your account
  • 47. Shortened (Tiny) URLs • Problem: Clicking on shortened URLs may go to a malicious site • Example: @twitterguy, what do you think about what Obama said? http://shar.es/HNGAt – Scammers can choose to redirect you to any webpage they like (malicious, porn, phishing) – Scammers are also embedding malicious links into tweets with popular hash terms (#term)
  • 48. Skimmers • A device that reads and copies card numbers • Data is then transferred onto cloned credit cards • Used to withdraw cash at other ATMs or purchase goods
  • 49. To Spot a Skimmer • Skimmers are hard to identify!! • Look for – Wrong colors or materials (cheap plastic vs. metal) – Glue or sticky spots – A card reader “sticking out” more than usual • Wiggle the slot before sliding a card into an ATM slot – ATM slots with skimmers will appear loose, while those without skimmers will not wiggle at all • Get to know “your” ATM • Use ones in well lit, public places, especially with surveillance cameras around
  • 51. Internet Allows Bad Guys to Reach More Potential Victims
  • 52. But Wait – There’s More…
  • 53. Internet Crime is a Problem • Internet Crime Complaint Center (IC3) received 303,809 complaints in 2010 – Averaging 25,317 per month
  • 54. Before We Continue… • Hi! My name is Heidi, and I see you have a room for rent. • I’m coming over to the U.S. for a work/study program that’s sponsored by the Swedish government. – So there’s no risk of renting to me • But I only got one check to cover both rent and travel. • So I’ll send you the check. You can deposit it, keep the rent payment, and send me the rest.
  • 55. Overpayment Scam • Bad guy sends you a check for more than the correct amount • Rather than canceling and reissuing the check – since the scammer trusts you – you are asked to deposit the check and refund the difference • Except the check bounces and you’re liable
  • 56. Secret Shopper Scam • Advertisers seek applicants for paid positions as “secret” shoppers – But you need to pay fees to purchase training materials, obtain certification, or register with a database of secret shoppers • Updated version: You get an employment packet with a cashier’s check for about $3,000 – Your assignment is to pose as bank customer, cash the check, and wire the funds to an address – Check bounces and you’re liable for the money
  • 57. Before We Finish Today… • *WARNING* *WARNING* GAMING FRIENDS – TAKE NOTE !!! • This was on CNN this morning • Do not click on a link that says it is a game for Twilight the Movie “BREAKING DAWN” • Facebook says this is the worst virus ever!!! • PLEASE FORWARD TO YOUR FRIENDS
  • 58. Hoax • Tell-tale hoax signs – Threatens dire consequences if you don’t obey – Promises money or prize for performing some action – Claims it’s not a hoax – Contains technical-sounding language and/or specific names and organizations to make the message seem legitimate – Urges you to forward the message to EVERYBODY – Has already been forwarded multiple times (evident from the trail of email headers in the body of the message)
  • 59. Be Aware • Be skeptical!! • Be suspicious of sensational, upsetting, or exciting (but false) statements – Goal is to get you to click / react immediately without thinking • Be wary of attachments • Verify (and then ignore) commands and requests for action – Verify identity of message sender – Hover your mouse over the link and look at the bottom left corner of your browser window – Enter web addresses manually and/or telephone the company using a well-publicized phone number
  • 60. Prevent Donation Fraud • Know the organization, be sure they’re legitimate – Check the Better Business Bureau and other online resources • Don’t respond to any email donation request • Never open attached files from people or organizations you aren’t familiar with – Like “disaster photos” that may contain viruses • And most importantly, use common sense
  • 61. For More Information • Anti Phishing Working Group – http://www.antiphishing.org/ • Internet Crime Complaint Center – http://www.ic3.gov/default.aspx • Looks too Good to be True – http://www.lookstoogoodtobetrue.com/ • Snopes – Hoax resource – www.snopes.com • U.S. Secret Service – http://www.secretservice.gov/criminal.shtml • U.S. Federal Trade Commission – http://www.ftc.gov/bcp/consumer.shtm
  • 62. If You Think You’ve Been Scammed • File a report with the City of Phoenix Police Electronic Crimes Division – Non-Emergency - 602-262-6151 • File a complaint with the Internet Crime Complaint Center (IC3) – http://www.ic3.gov/complaint/default.aspx – IC3 reviews each complaint and refers it to the appropriate federal, state, local, or international law enforcement or regulatory agency • Depending on the type of scam, you may be instructed to take more steps
  • 66. Buy My Bonds • A 52-year-old Missouri man made $100 million from selling worthless financial documents • Used his home PC to create 2,000 “bonded promissory notes” – Claimed they were backed by a U.S. Treasury Department account – Sold them for a fee at the “Private Bank of Denny Ray Hardin,” which he ran out of his Kansas City home • “Private Bank” owner convicted September 15, 2011 of 21 federal fraud charges (creating fictitious obligations and mail fraud)
  • 67. Get Your iPad Here • 8/29/2011 – A 22-year-old woman in South Carolina McDonald’s parking lot was approached by two men who offered her an iPad for $300 – Claiming they had bought iPads in bulk, men showed her an actual iPad and agreed to take $180 for it • She was handed one of several FedEx boxes from their car’s trunk – She drove home without looking inside • When she opened the box at home, it contained “a piece of wood painted black with an Apple logo”
  • 68. Verify Your Purchases • Get names and addresses of companies • Check with the Better Business Bureau • Get references • Get a warranty • Keep any documentation (evidence) – Canceled checks, credit card receipts – Emails, chats, texts, or website screen prints – Pamphlets or brochures • If it looks too good to be true, it probably is!