With incidents such as the Colonial Pipeline infection and the Kaseya supply chain attack making so many headlines these days, it can be easy to forget that malicious actors are still preying on individual users. They’re not using ransomware to do that so much anymore, though. Not since the rise of big game hunting, anyway. This term marks ransomware actors’ shift away from attacks against individual users and towards operations targeting large enterprises, noted CNBC. But attacks like phishing and scam calls are still an issue.
So, how are malicious actors preying upon individual users? Let’s discuss three kinds of attacks below.
Scam Phone Calls
According to the Federal Trade Commission (FTC), a scam phone call involves a malicious actor cold-calling victims to try to steal their personal information or financial details. They can then use that data to commit identity theft or to perform credit card fraud.
Attackers use various lures to trick their targets. Provided below are a few of the most common types:
- Imposter scams – In this type of ruse, a scammer calls someone and pretends to be a person that the recipient trusts. They might claim to be a government agency such as the Social Security Administration (SSA), for instance, or a tech giant like Microsoft. To add to the scam, they could use a fake name or spoof the caller ID.
- Debt relief scams – Fraudsters conduct these types of ruses by offering people lower credit card…