Man
Professional
- Messages
- 3,059
- Reaction score
- 585
- Points
- 113
The attackers turned the tax period into a big hunting season.
Fraudsters have begun to use a new scheme to hack accounts on state online services, the press service of VTB reported. Attackers call the victim on behalf of government officials, report that she has received a registered letter, and offer to send a notification to the postal or email address. To make such an application, attackers ask to dictate a verification code that comes to the victim's phone with the text "access recovery code" to the account.
If the victim interrupts the call, suspecting deception, after a while he receives a second call from the same allegedly state institution. This time, the attackers assure the victim that the first conversation was with scammers, and the account has already been hacked. Under the pretext of data protection, they again ask to transfer the code from the SMS. "At this moment, a person, being under psychological pressure from unknown people and fully trusting them, becomes a victim of further deception," VTB commented.
As noted in the bank, such calls account for about 30% of the total number of attacks, and this scheme has become especially active during the tax period. He urged users not to transfer personal data and codes from SMS to strangers, as well as to use caller IDs.
VTB notes that in the first eight months of 2024, fraudsters most often used three schemes: they introduced themselves as employees of Gosuslugi, Mosenergo or potential buyers on ad sites, forcing victims to install programs to remotely access their accounts.
Source
Fraudsters have begun to use a new scheme to hack accounts on state online services, the press service of VTB reported. Attackers call the victim on behalf of government officials, report that she has received a registered letter, and offer to send a notification to the postal or email address. To make such an application, attackers ask to dictate a verification code that comes to the victim's phone with the text "access recovery code" to the account.
If the victim interrupts the call, suspecting deception, after a while he receives a second call from the same allegedly state institution. This time, the attackers assure the victim that the first conversation was with scammers, and the account has already been hacked. Under the pretext of data protection, they again ask to transfer the code from the SMS. "At this moment, a person, being under psychological pressure from unknown people and fully trusting them, becomes a victim of further deception," VTB commented.
As noted in the bank, such calls account for about 30% of the total number of attacks, and this scheme has become especially active during the tax period. He urged users not to transfer personal data and codes from SMS to strangers, as well as to use caller IDs.
VTB notes that in the first eight months of 2024, fraudsters most often used three schemes: they introduced themselves as employees of Gosuslugi, Mosenergo or potential buyers on ad sites, forcing victims to install programs to remotely access their accounts.
Source