paint-brush
How to Protect Yourself from Evolving Phishing Scamsā€‚by@induction
139 reads

How to Protect Yourself from Evolving Phishing Scams

by Vision NPOctober 31st, 2023
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Viruses and trojans are common for Windows OS-based machines, and Linux distributions are not completely immune to the virus, but they are comparatively more secure. Attackers are evolving every day with new tricks and techniques to inject malware into your system. This is the article to protect you from such scams in your online world.
featured image - How to Protect Yourself from Evolving Phishing Scams
Vision NP HackerNoon profile picture

Viruses and trojans are common for Windows OS-based machines, and Linux distributions are not completely immune to viruses, but they are comparatively more secure. Attackers are evolving every day with new tricks and techniques to inject malware into your system. The most common method they have been using for a long time is the technique of phishing, in which they create fake domains that resemble almost the same as the original one. This is the article to protect you from such scams in your online world.


Here are several examples and remedies for you to be protected.


šŸ“„The First Example:


Figure 1: Phishing email sent to detect Facebook password and install the Malware


Here, the scammer has cleverly adjusted the phishing link in any of the clickable options in this email, which could potentially be dangerous, as it may enable them to steal your sensitive login credentials or remotely install malware on your machine.


šŸ’€What you should not do in this case?

  • Don't rush to click on 'Report the user' or 'Yes, me,' or any of the clickable options.
  • Don't respond to this email; scammers might detect your IP address when you reply to their email.
  • Don't open the email if it is already in your 'Spam Folder.' Some spam emails like this can contain a virus body or malicious attachments with dangerous scripts.


šŸ’€The Second Example: ā€œIā€™ve Recorded You!ā€ Scam

Figure 2: The most notorious scam email is entitled ā€œ I RECORDED YOUā€ and that claims BTC from victims


Let's take a look here. The email appears alarming, expecting your immediate action. Sometimes attackers may include your publicly available phone numbers or other details in this type of email. However, in reality, this is an outright scam, and they have not yet hacked your device.


šŸ’€What you should not do in this case?

  • Donā€™t take enough stress, locate where the email is sent. If it is in your ā€œSpam Folderā€, safely ignore it which will be deleted after 10 days as per your email preferences.
  • Donā€™t rush to pay BTC as the scammer demanded in this sort of email without understanding the crux of the matter.



šŸ“„The Third Example:

Figure 3: Scam offer-related phishing email

In this example, the attacker has attempted to deceive the victim with attractive fake offers, increasing the likelihood of ordinary users clicking on the highlighted clickable options.


šŸ’€What you should not do in this case?

  • Donā€™t be greedy to act quickly ! Itā€™s a TRAP !! Donā€™t click on the any of the options mentioned in this sort of emails.
  • Donā€™t reply to this sort of email even you know this is scam.


šŸ“„The Fourth Example:

Figure 4: Fake gift card-related phishing email

It is quite similar to the third one, and the same precautions should be applied in this case as well. Here, attackers have presented an enticing fake offer, making it highly likely that common users will click on the mentioned options.


šŸ“„The Last Example:

Figure 5: Fake ā€œMicrosoft account loginā€ phishing email


This is one of the most notorious spam emails in which attackers attempt to lure users into clicking on a malicious link. Their ultimate goal is to steal your Microsoft passwords registered on your PC. Although it may appear similar to a Microsoft email, it is, in fact, a scam. You can verify the sender's address to determine its authenticity.


Again, donā€™t click on their ā€œ Report The Userā€ button without confirming the senderā€™s email.


āœ…So, what steps should you take to protect yourself from these types of email-based phishing attacks?

Here is the most actionable stepwise guide:

  • Avoid storing your passwords in online browsers, regardless of software companies' claims about their safety. Instead, consider creating an offline copy and storing it in a secure location. While this process may seem somewhat complicated, it can help safeguard you from substantial losses.


  • If you are registered on any crypto trading platforms, please adjust the secret phrase in your settings. This way, whenever an exchange sends you emails, your secret phrase will be present, making it easier for you to confirm that the email has been sent from an authentic source.


  • Once you receive such alarming emails (as mentioned above), check your account first to track the active sessions. You can easily do this on popular platforms like Facebook, Outlook, Gmail, and many more. In the case of a Google account, you can find the options in your settings below. If you are not familiar with any of these devices, you should immediately change your passwords and remove such devices from the list. If you confirm that unknown devices have already gained illegal access, you should report it to the relevant authority as soon as possible.


    Figure 6: Device activity


  • Don't forget to create the strongest passwords, like "34VgH67$5%#HJkl," by mixing upper and lower-case letters, numbers, and special characters. This will make it challenging for scammers to decrypt your passwords. Also, avoid using the same password for multiple accounts.


  • Enable multi-factor (2FA) authentication on your important accounts so that passwords alone will not be sufficient for attackers to access your accounts.


  • Some malicious adware could also install malware on your devices, so it's advisable to install ad blockers to prevent aggressive ads.


  • Install high-quality antivirus software, which serves as your lifeline, and enable the firewall. Regularly update both the virus database and the software product, and scan your devices. This software is invaluable in protecting you, even if you accidentally click on a malicious link.


  • If you have a habit of neglecting browser and OS updates, be warned! Developers continuously work to patch their systems against new and evolving threats, so ensure that all your software is up to date to the latest version.


  • Don't add random add-ons to your browsers without checking their reputations. If they don't serve a necessary purpose on your machine, consider removing them rather than keeping them on your devices. It's worth noting that some of these add-ons may be equipped with crypto-mining capabilities.


  • If you are asked to provide your work email for any kind of subscription, exercise caution and think twice before proceeding.


  • Once you receive phishing or spam emails, establish rules to block the senders. Furthermore, report them so that your service providers' developers can fine-tune the system to automatically block such emails. Always double-check the sender's email address, as many of these messages may come from compromised, random servers like cfgty.cz, vfgrynmjghg.com, and so on.


Stay Safe, Be Safe! Thank YoušŸ™ !