{"id":10544,"date":"2017-11-20T06:30:10","date_gmt":"2017-11-20T14:30:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/20\/news-4316\/"},"modified":"2017-11-20T06:30:10","modified_gmt":"2017-11-20T14:30:10","slug":"news-4316","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/20\/news-4316\/","title":{"rendered":"A friend in need \u2014 or is it?"},"content":{"rendered":"<p><strong>Credit to Author: Tatyana Sidorina| Date: Mon, 20 Nov 2017 14:00:49 +0000<\/strong><\/p>\n<p>Scammers keep things fresh by continually devising inventive new methods to steal from unsuspecting victims by using novel or revamped social engineering techniques. Today&#8217;s lesson comes from platforms such as Telegram, WhatsApp, and others that use phone numbers as user IDs.<a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/11\/17103725\/messengers-scam-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/11\/17103725\/messengers-scam-featured-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" class=\"aligncenter size-large wp-image-20180\" \/><\/a><\/p>\n<p>A few years ago, we examined the case of a Skype account that was <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/skype-fraud-story\/\">hijacked<\/a> and then used under various pretexts to finagle money out of the victim&#8217;s contacts. Today we discuss a somewhat similar scenario \u2014 but this one doesn&#8217;t even require hacking into other people&#8217;s accounts. The crook simply sets up a fake account in a popular messaging app.<\/p>\n<p>It can begin with an innocent call for help on a social media page, with the user giving their phone number to their friends. But criminals don&#8217;t even have to wait for someone to upload a post with personal information. People are in the habit of revealing all sorts of personal data, making it available to anyone who cares to harvest it.<\/p>\n<p>Phone number obtained, the scammer looks at the target&#8217;s list of friends and selects someone to use as bait. Then, they create a profile in a messaging app, using the name and downloaded photo of the chosen friend.<\/p>\n<p>The attacker then sends a message to the victim, seemingly from the chosen friend. It all looks very plausible: an old friend reaching out for help. Who wouldn&#8217;t lend a hand? You don&#8217;t immediately cotton on. Why would you? No one remembers phone numbers these days anyway, and it&#8217;s easy to fall for such a convincing ruse. Making things even easier, some messaging apps forgo the friend-confirmation step, letting users open communications without anyone having to say &#8220;Yes, I accept this friend request.&#8221; A criminal can use this scheme again and again, finding new phone numbers online and registering new IM accounts.<\/p>\n<p>How can you avoid becoming a victim of this type of fraud?<\/p>\n<ul>\n<li>Think about what data you make public in social media. We have separate posts about what privacy settings to change in <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/facebook-privacy-settings\/\">Facebook<\/a>, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/vk-privacy\/10743\/\">VK.com<\/a>, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/keep-instagram-secure\/\">Instagram<\/a>, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/linkedin-security-tips\/\">LinkedIn<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/twitter-security\/\">Twitter<\/a>, and how to change them.<\/li>\n<li>In particular, consider hiding your friends list on Facebook. It&#8217;s easy to do: Go to <em>Settings<\/em> -&gt; <em>Privacy<\/em> -&gt; <em>Who can see your friends list?<\/em> and change to <em>Friends<\/em> or even <em>Only me.<\/em><\/li>\n<li>If you receive a request for help from someone, it&#8217;s best to check that this person really is who they claim to be. Ask questions that only the two of you could possibly answer, or call to discuss it voice-to-voice.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/give-me-your-money\/20182\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Tatyana Sidorina| Date: Mon, 20 Nov 2017 14:00:49 +0000<\/strong><\/p>\n<p>Attackers pretending to be acquaintances asking for money \u2014 the story is old, the approaches new. We show you how to avoid the e-bait.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[16684,3589,9751,3921,5897,3985,1932,11642,10438],"class_list":["post-10544","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-deceit","tag-facebook","tag-fraud","tag-identity-theft","tag-privacy","tag-scam","tag-social-media","tag-telegram","tag-threats"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10544"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10544\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}