New Terms Hitting the Scam Market – Educate Yourself!

Have you heard of Smising? Porting? Sim Swap? Social Engineering? Man in the Middle Attack? These are just a handful of new terms hitting the scam market. And nowadays, it seems like there is a different swindle happening every other week.

Fraudsters are getting creative and finding loopholes around ways to gain access to your personal information. Read on to learn about the current scams, so you can protect yourself from becoming a victim of these horrible offenses.

Smishing gets its name from the term SMS (short messaging system), which is a text message. It is a mash up from the term phishing, which refers to a fraudster’s attempt to get you to reveal personal information that can be used to scam you.

Most of the time, a scammer will ask you for information via text that includes a link that they want you to click on. Or you might receive a phone call. An example might be when you receive an email or text that says you won a contest or maybe a message that looks like it came from your bank. If anyone asks for your birthdate, social security number, credit card number, name of the street you live on, or any other personal details, it’s most likely someone is trying to trick you.

Porting is when you change phone carriers, but you want to keep the same phone number. For example, your current cell number is with AT&T, but you want to switch Verizon. You want to take your number with you, which is super convenient.

This is the scary thing – If someone can impersonate you and port your number to a new carrier without you knowing about it, they can intercept messages coming in from your personal accounts, which mean they would even get authentication messages that are connected to your login details. You won’t even know it happened until your phone has lost service and try to gain access to your accounts.

Sim Swap
Sim refers to a SIM card. A SIM card is the small chip that usually goes in a tiny slot on the side of your cell phone. It connects you to your mobile network.

A fraudster can initiate a SIM swap by using your own personal information against you. Once they have your information, they could try to call your cell phone service. If they convince the provider rep that they are you, they will ask them to link your service to a SIM card that they own. This allows them to re-route all your calls and text messages to their device, which gives them access to authenticate and deactivate your phone.

Social Engineering
You probably know this one, you just didn’t know there was a term for it. Social Engineering is when a scammer tries to convince you that they are someone you know. They try to get you to reveal some personal information about that person that they can use against them. For example, a scammer might tell you that one of your family members (John, for example), is in jail and needs your help. They might say that John needs bail money to get out. They might say that they are willing to work with you and might even pretend to be kind and concerned for John.

Don’t fall for it. Hang up, don’t respond to social media messages, and don’t click on links.

Man in the Middle Attack
This type of attack happens when a fraudster puts themselves in the middle of your authentication process by attempting to get your code, so they can use it to impersonate you to the company that issued the code. It sounds a bit complicated, but it isn’t. Once a scammer has your login, they can trigger an authorization code and make changes to your account.

An authentication code is sent to you, then the scammer calls or texts you pretending to be the company, so they can complete their scam transaction. Once they have that code from you, they can change your password and lock you out of your account.

Cyber-attacks and scams are scary to think about, because they can happen through phone calls, text messages, social media, even regular mail. Continue to educate yourself and know the warning signs, so that you know what to do if a scammer tries to contact you.

This entry was posted in Uncategorized. Bookmark the permalink.