What methods do scammers use?

chushpan

Professional
Messages
940
Reaction score
742
Points
93
Fraudsters use a variety of methods to deceive people and organizations to gain access to money, data, or confidential information. These methods are constantly being improved as technology advances. Let's look at the main methods used in the modern world:

1. Phishing​

  • Description: Fraudsters create fake websites, letters or messages, posing as legitimate organizations (banks, online stores, social networks).
  • Purpose: To obtain logins, passwords, bank card details or other confidential information.
  • Examples:
    • Fake letters from "support service" asking to confirm data.
    • Links to fake websites that look like real ones.

2. Hacking accounts​

  • Description: Hackers gain access to accounts through stolen passwords, brute force, or system vulnerabilities.
  • Purpose: Access financial data, personal information or accounts.
  • Methods:
    • Using weak or compromised passwords.
    • Data theft through malware (e.g. keyloggers).

3. Social engineering​

  • Description: Manipulating people to obtain confidential information.
  • Purpose: To force the victim to voluntarily provide data or perform actions.
  • Examples:
    • Calls from "bank employees" asking to provide the code from the SMS.
    • Personal meetings or telephone conversations where the fraudster poses as a trusted person.

4. Skimming​

  • Description: Installation of devices on ATMs or POS terminals to intercept card data.
  • Purpose: To clone cards and use them for fraudulent transactions.
  • Examples:
    • Bluetooth skimmers for remote data collection.
    • Attachable devices for card readers.

5. Malware​

  • Description: Programs that are installed on computers or phones to steal data.
  • Purpose: Interception of passwords, card data or other confidential information.
  • Examples:
    • Trojans (e.g. Zeus, Emotet).
    • Spyware for monitoring user activities.

6. SIM jacking​

  • Description: Taking control of the victim's SIM card by contacting the mobile operator with fake documents.
  • Purpose: Gaining access to SMS messages, including one-time codes for two-factor authentication.
  • Examples:
    • Attacks on cryptocurrency wallets.
    • Hacking bank accounts.

7. Carding​

  • Description: Using stolen bank card data for purchases or withdrawal of money.
  • Purpose: Carrying out illegal transactions.
  • Methods:
    • Creating clones of cards.
    • Purchasing goods online using stolen data.

8. Brute force and password cracking​

  • Description: Automated attempt to guess the password to the account.
  • Purpose: Gaining access to accounts.
  • Methods:
    • Using dictionaries or password generators.
    • Attacks on systems with poor security.

9. Deepfake​

  • Description: Using artificial intelligence to create realistic fake video or audio.
  • Purpose: To deceive people by posing as someone else.
  • Examples:
    • Fake videos of company executives for fraud.
    • Fake voice messages asking for money.

10. NFC skimming​

  • Description: Interception of data from contactless cards via NFC technology.
  • Purpose: Cloning cards or making illegal transactions.
  • Methods:
    • Using special devices to read data.
    • Attacks on terminals supporting contactless payments.

11. Cryptocurrency Scams​

  • Description: Scamming users to get cryptocurrency.
  • Purpose: Theft of funds or data.
  • Examples:
    • Fake ICOs (Initial Coin Offerings).
    • Attacks on wallets via phishing or malware.

12. Caller ID Spoofing​

  • Description: Change the caller ID to look like a trusted organization.
  • Goal: To make the victim believe that the call is legitimate.
  • Examples:
    • Calls from the "bank" asking to confirm data.
    • Messages about winning prizes or having to pay a fine.

13. Darknet Scams​

  • Description: Using the darknet to sell stolen data, software or services.
  • Goal: To make money through illegal activities.
  • Examples:
    • Sale of card databases (CVV, numbers).
    • Providing services for hacking or bypassing protection.

14. Investment fraud​

  • Description: Cheating people to get money under the guise of profitable investments.
  • Goal: To attract funds that then disappear.
  • Examples:
    • Pyramids and financial schemes.
    • Fake platforms for trading stocks or cryptocurrency.

15. Delivery Fraud​

  • Description: Cheating users through fake websites or delivery services.
  • Goal: To receive advance payment for non-existent goods.
  • Examples:
    • Fake stores with low prices.
    • False notifications of parcels with demands for payment.

16. Fraud with guarantees and returns​

  • Description: Deceiving companies in order to obtain money for non-existent goods or services.
  • Purpose: To return money for an item that was not purchased.
  • Examples:
    • Counterfeit checks or receipts.
    • Complaints about non-existent problems with the product.

17. Rental Scams​

  • Description: Cheating tenants or landlords through fake ads.
  • Goal: To receive an advance payment for non-existent housing.
  • Examples:
    • Fake ads on popular platforms.
    • Requirement to transfer money before viewing the apartment.

Conclusion​

Fraudsters are constantly adapting to new technologies and changing conditions. To protect yourself from them, it is important to follow these rules:
  • Use complex passwords and two-factor authentication.
  • Be careful with suspicious links, emails and calls.
  • Check your bills and statements regularly.
  • Educate yourself and your loved ones about the basics of cybersecurity.
 
Fraudsters are constantly improving their methods of deception, but most attacks come down to a few key schemes. Here are the current methods for 2025, with an explanation of how they work and how to protect yourself:

1. Social engineering​

A. Fishing​

  • How it works:
    • Fake emails/SMS (“Your bank account is blocked!”) with links to fake websites.
    • The victim enters the login, password, and CVV code of the card.
  • Example: Letter “from Bank” with a request to “confirm the transaction”.
  • Protection:
    • Check URL (official domain - https://www.bank.com).
    • Do not follow links - enter the address manually.

B. Vishing (voice phishing)​

  • How it works:
    • A call “from the bank” with a threat (“Your account has been hacked!”) and a request to provide the code from the SMS.
  • Example: A fraudster introduces himself as a security officer and asks to “confirm your identity.”
  • Protection:
    • Banks never ask for SMS codes or PIN.
    • Call the bank back on the official number.

2. Technical attacks​

A. Skimming​

  • How it works:
    • The device on the ATM reads the card data + camera for PIN.
  • Where: gas stations, street ATMs.
  • Protection:
    • Cover the keyboard with your hand.
    • Use contactless payment (NFC).

B. Malicious software​

  • How it works:
    • Viruses in pirated programs/applications steal data (for example, Trojan.Zeus).
  • Example: "Cracked" version of Photoshop with keygen.
  • Protection:
    • Do not download software from dubious sites.
    • Use antivirus software (Kaspersky, Malwarebytes).

B. SIM-swap attacks​

  • How it works:
    • The fraudster reissues the victim's SIM card using a fake document.
    • Gains access to SMS codes.
  • Protection:
    • Connect the “reissue ban” option with your operator.
    • Use Google Authenticator instead of SMS.

3. Cards not present (CNP fraud)​

  • How it works:
    • Stolen card data (via database leaks) is used for online purchases.
  • Example: Purchasing airline tickets using someone else's card.
  • Protection:
    • Enable 3D-Secure (confirmation of transactions via the bank).
    • Use virtual cards with a limit.

4. Crypto fraud​

  • A. Fake investments
    • "Invest in our BTC fund - 300% per annum!" → money disappears.
  • B. Phishing on wallets
    • Fake sites like "MyEtherWallet" for stealing seed phrases.
  • Protection:
    • Check contracts via Etherscan.
    • Do not store large amounts of money on exchanges.

5. New Methods (2025)​

  • DeepFake calls – the voice of a “relative” asks to urgently transfer money.
  • Hacking cloud storage – searching for passport scans in iCloud/Google Drive.
  • Business Enforcement Attacks (BEC) – fake emails “from the director” to the accountant.

How to protect yourself?​

  1. For all:
    • Enable two-factor authentication (2FA) everywhere.
    • Do not store document scans in the cloud.
  2. For cards:
    • Disable PIN-less payments abroad.
    • Set limits on transactions.
  3. For cryptocurrencies:
    • Use hardware wallets (Ledger, Trezor).

Statistics (2025)​

  • 83% of attacks begin with phishing (Verizon data).
  • The average damage from BEC attacks is $5 million per company (FBI).

Need more details about a specific type of fraud? Ask!
 
Fraudsters use a variety of methods to deceive people, and their approaches are constantly evolving. Here are the main categories and examples of methods they use:

1. Internet fraud​

  • Phishing: Fraudsters send fake emails or messages that look like official requests from banks, social networks, or other organizations. The goal is to gain access to personal data, passwords, or bank accounts.
  • Romance Scams: Fraudsters create fake profiles on dating sites to trick victims into giving them money by playing on their emotions.
  • Fake Wins: Messages claiming to have won a lottery or prize that requires "taxes" or "fees" to be paid.

2. Telephone fraud​

  • Calls from "banks": Fraudsters pose as bank employees and convince the victim to provide card details or codes from SMS, supposedly to protect the account.
  • "Relative in Trouble" Messages: Fraudsters call and report that a loved one has been in an accident or is at the police station, and demand money to "solve the problem."

3. Bank fraud​

  • Skimming: Using special devices to read data from bank cards through ATMs or terminals.
  • Fake Transfers: Scammers send fake transfer notifications and demand the return of money that did not actually happen.

4. Social engineering​

  • Trust manipulation: Fraudsters use psychological tricks to get the victim to voluntarily provide confidential information or money.
  • Fake Jobs: Work-from-home offers with advance payment for "materials" or "training" that turn out to be scams.

5. Fraud with goods and services​

  • Fake Online Stores: Creating websites where customers pay for products that are never delivered.
  • Advance Fee Fraud: Requesting advance payment for services or goods that will not be provided.

6. Investment fraud​

  • Pyramids and Ponzi schemes: Promise of high profits by attracting new participants rather than real investments.
  • Fake Cryptocurrency Projects: Creating fake cryptocurrency trading platforms or ICOs (Initial Coin Offerings).

How to protect yourself from fraud?​

  • Never give out personal information or passwords to strangers.
  • Verify the authenticity of the websites and organizations you interact with.
  • Be wary of suspicious calls, messages and offers that seem too good to be true.

Fraudsters exploit people's trust and ignorance, so it is important to be vigilant and informed to avoid becoming their victim.
 
Top