Email Scams Have Been With Us Since The 1980s
Email Provides Us A Convenient And Powerful Communications Tool
Unfortunately, it also provides scammers and other malicious individuals an easy means for luring potential victims.
The scams they attempt run from old-fashioned bait-and-switch operations to phishing schemes using a combination of email and bogus websites to trick victims into divulging sensitive information. To protect yourself from these scams, you should understand what they are, what they look like, how they work, and what you can do to avoid them. The following recommendations can minimize your chances of falling victim to an email scam A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost.:
- Filter spam.
- Don’t trust unsolicited emails.
- Treat email attachments with caution.
- Don’t click links in email messages.
- Install antivirus software and keep it up to date.
- Install a personal firewall and keep it up to date.
- Configure your email client for security.
These recommendations are explained below in the section “What You Can Do to Avoid Becoming a Victim.” Ignoring them may leave you vulnerable to identity theft Identity theft is when someone uses another person's personal identifying information, without their permission, to commit fraud or other crimes. In both the U.K. and the United States it is the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources., information theft, the abuse of your computer for illegal activity, the receipt of bogus or illegal merchandise, and financial loss.
Recognizing Email Scams
Unsolicited Commercial Email Or Spam Is The Starting Point For Many Email Scams
Before the advent of email, a scammer had to contact each potential victim individually by post, fax, telephone, or through direct personal contact. These methods would often require a significant investment in time and money. To improve the chances of contacting susceptible victims, the scammer might have had to do advance research on the “marks” he or she targeted.
Email has changed the game for scammers. The convenience and anonymity of email, along with the capability it provides for easily contacting thousands of people at once, enables scammers to work in volume. Scammers only need to fool a small percentage of the tens of thousands of people they email for their ruse to pay off. For tips on reducing spam in your email in-box, see our FAQ on Reducing Spam
The following sections provide information to help you spot an email scam when it lands in your mailbox. They describe some but by no means all, of the many email-based scams you’re likely to encounter. Armed with this information, you will better recognize email scams, even those not specifically mentioned here.
Regular Email Fraud In law, fraud is intentional deception to secure unfair or unlawful gain (money or other assets), or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, for example by obtaining a passport, travel document, or driver's license, or mortgage fraud, where the perpetrator may attempt to qualify for a mortgage by way of false statements.
A fraud can also be a hoax, which is a distinct concept that involves deliberate deception without the intention of gain or of materially damaging or depriving a victim. Schemes
Many email scams have existed for a long time. In fact, a number of them are merely “recycled” scams that predate the use of email.
The list includes:
- bogus business opportunities
- chain letters
- work-at-home schemes
- health and diet scams
- easy money
- “free” goods
- investment opportunities
- bulk email schemes
- cable descrambler kits
- “guaranteed” loans or credit
The following sections describe some common fraud schemes initiated through email.
Bogus Business Opportunities
These scams promise the opportunity to make a great deal of money with very little effort.
They’re normally full of enticements such as “Work only hours a week,” “Be your own boss,” “Set your own hours,” and “Work from home.” The email messages offering these “opportunities” often have subject lines that look like the following:
- Make a Regular Income with Online Auctions
- Put your computer to work for you!
- Get Rich Click
- Use the Internet to make money
- eBay Insider Secrets Revealed 6228
In most cases, the email gives very little detail about the nature of the business opportunity. Most provide an address or website from which you can, for a fee, obtain an “information kit” about the opportunity. These opportunities, however, usually amount to nothing more than pyramid schemes Pyramid schemes are scams that need a constant flow of new participants to keep them going. They are marketed as multi-level marketing programs or other types of legitimate businesses. They use new recruits’ "investments" to pay “profits” to those participating longer. Pyramid schemes collapse when they can't recruit enough new participants to pay earlier investors. These scams always fail—it’s mathematically guaranteed. in which the “opportunity” involves your ability to recruit more unsuspecting people to buy into the scam. Eventually, the scam is uncovered or the pool of new recruits runs dry and it fails.
Health and Diet Scams
Health and diet scams prey on the insecurities some people have about the state of their well-being. These insecurities make some people particularly susceptible to the scams because they may be reluctant or embarrassed to discuss their problems with a doctor, or they can’t afford to buy legitimate drugs or treatment. The scams attempt to lure consumers with promises of quick fixes and amazing results, discount pricing, fast delivery, waived prescription requirements, privacy, and discreet packaging. The email offering these items will have subject lines that look like the following:
- Need to lose weight for summer?
- Reduce body fat and build lean muscle without exercise
- Increase Your Sexual Performance Drastically
- Young at any age
- CONTROL YOUR WEIGHT!!
- Takes years off your appearance
- Natural Health Remedy That Works!
- Gives energy and burns fat
Though they may be backed by customer testimonials, beware: the products don’t work.
Discount Software or App Offers
These scams frequently consist of advertisements for cheap versions of commercial software like Windows XP or Photoshop. The discounts offered may be hard to believe, and with good reason: the scammers either do not deliver the promised software at all or provide illegal, pirated versions preloaded with Trojan horse Software that's hidden within apparently harmless data — or masquerades as a regular program — and when activated, can deliver such blows as corrupting data on your hard drive or sending files and account information to hackers. Unlike viruses and worms, Trojans do not self-replicate and spread to other computers. software the scammer or other malicious individuals can use to exploit your computer and the information it contains.
Nigerian Prince – 419 An advance fee scam or fraud (419 scam) is a form of fraud and is one of the most common types of online confidence tricks. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster claims will be used to obtain the large sum. If a victim makes the payment, the fraudster either invents a series of further fees for the victim or simply disappears. The 419 comes from the Nigerian law against this type of scam. Advanced Fee Fraud
These schemes are quite elaborate and despite their somewhat preposterous appearance manage to hook a surprising number of victims. Essentially, these scams attempt to entice the victim into a bogus plot to acquire and split a large sum of cash. Many perpetrators of this kind of fraud have been Nigerian citizens. Consequently, the name “419 scheme” is taken from the section of the Nigerian penal code that addresses fraud.
419 scams are recognizable by their subject lines, which frequently call for an urgent response or refer to a personal introduction, and sender names, which are frequently (though not always) African or African inspired. Examples of senders and subject lines include those in the list below.
You should note, however, that these examples are merely a few of the many thousands of variations of names, subject lines, or stories used in these scams.
||URGENT REPLY NEEDED
||Re: Pleased to meet you!
|Miss Kate Kasaka
||Miss Kate Kasaka
|MR. Michael Okpala.
||Good dey from MR. Michael Okpala.
A 419 advance fee fraud An advance fee scam or fraud is a form of fraud and is one of the most common types of online confidence tricks. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster claims will be used to obtain the large sum. If a victim makes the payment, the fraudster either invents a series of further fees for the victim or simply disappears. begins with an email that looks like this:
Date: Wednesday, August 24, 2008 5:55 PM -0700
From: “Mr. Henry Bassey Udoma” <email@example.com>
Subject: From: Henry (Regarding Dr. H. Paul Jacobi)
From: Henry (Regarding Dr. H. Paul Jacobi)
I am sending you this private email to make a passionate appeal to you for assistance. Kindly accept my apology for contacting you this way and forgive What Is Forgiveness?
Psychologists generally define forgiveness as a conscious, deliberate decision to release feelings of resentment or vengeance toward a person or group who has harmed you, regardless of whether they actually deserve your forgiveness. me if this is not acceptable to you. My name is Henry Bassey Udoma; I am an auditor at one of the Nigerian Banks. On Tuesday, 19 January, 2006, one Dr. H. Paul Jacobi a foreigner, made a numbered time (Fixed) Deposit, valued at £10,550,000.00 (Ten Million, Five Hundred and Fifty Thousand Pounds) for twelve calendar months in my Bank Branch.
Upon Maturity, we sent a routine notification to his forwarding address but got no reply. After a month, we sent a reminder and finally we discovered from his company that Dr. Paul A. Jacobi was aboard the Egypt Air Flight 990, which crashed into the Atlantic Ocean on October 31, 2006. After further investigation, it was discovered that he died without making a WILL and all attempts to trace his next of kin proved abortive….
These schemes work by getting the victim to take the initial bait, then slowly convincing him or her of the legitimacy of the plot through a series of forged documents, carefully crafted communications, and even visits by the victim to the country of origin for meetings with bogus “officials” in phony “government offices.” At key junctures in the scam, the perpetrators will ask the victim to advance them money to pay bogus fees or bribes. Additionally, they may extract what amounts to an extortion payment by threatening to cut the victim out of the plot. Once the perpetrators believe they’ve gotten all they could from the victim, they cut off communication and vanish.
In short, if you discover an email in your inbox proposing a complicated arrangement to secure and split funds in a foreign land, you can safely assume someone is trying to ensnare you in a 419 scam.
Social Engineering Social engineering is the psychological manipulation of people into performing actions or divulging confidential information. It is used as a type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
It has also been defined as "any act that influences a person to take any action that may or may not be in their best interests."/Phishing Email
Social engineering is a strategy for obtaining information people wouldn’t normally divulge, or prompting an action people normally wouldn’t perform, by preying on their natural curiosity and/or willingness to trust. Perpetrators of scams and other malicious individuals combine social engineering with email in a number of ways.
Phishing emails are crafted to look as if they’ve been sent from a legitimate organization. These emails attempt to fool you into visiting a bogus website to either download malware Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts. (viruses and other software intended to compromise your computer) or reveal sensitive personal information. The perpetrators of phishing scams carefully craft the bogus website to look like the real thing.
For instance, an email can be crafted to look like it is from a major bank. It might have an alarming subject line, such as “Problem with Your Account.” The body of the message will claim there is a problem with your bank account and that, in order to validate your account, you must click a link included in the email and complete an online form.
The email is sent as spam to tens of thousands of recipients. Some, perhaps many, recipients are customers of the institution. Believing the email to be real, some of these recipients will click the link in the email without noticing that it takes them to a web address that only resembles the address of the real institution. If the email is sent and viewed as HTML, the visible link may be the URL of the institution, but the actual link information coded in the HTML will take the user to the bogus site.
- the visible link: “yourbank.com/accounts/”
- the actual link to bogus site: “itcare.co.kr/data/yourbank/index.html”
The bogus site will look astonishingly like the real thing and will present an online form asking for information like your account number, your address, your online banking username, and password—all the information an attacker needs to steal your identity and raid your bank account.
What to Look For
Bogus communications purporting to be from banks, credit card companies, and other financial institutions have been widely employed in phishing scams, as have emails from an online auction and retail services. Carefully examine any email from your banks and other financial institutions.
Most have instituted policies against asking for personal or account information in emails, so you should regard any email making such a request with extreme skepticism.
Phishing emails have also been disguised in a number of other ways. Some of the most common phishing emails include the following:
- fake communications from online payment and auction services, or from internet service providers – These emails claim there is a “problem” with your account and request that you access a (bogus) web page to provide personal and account information.
- fake accusation of violating the Patriot Act – This email purports to be from the Federal Deposit Insurance Corporation (FDIC). It says that the FDIC is refusing to ensure your account because of “suspected violations of the USA Patriot Act.” It requests you provide information through an online form to “verify your identity.” It’s really an attempt to steal your identity.
- fake communications from an IT Department – These emails will attempt to ferret passwords and other information phishers can use to penetrate your organization’s networks and computers.
- low-tech versions of any of the above asking you to fax back information on a printed form you can download from a (bogus) website.
The Anti-Phishing Working Group maintains a helpful phishing archive. The archive catalogs reported phishing scams and present not only the content of the phishing email but also screen captures of the bogus websites and URLs used in the scams. A review of several of the phishing scams cataloged in the archive can provide you insight into how these scams work and arm you with the information you need to avoid falling for them. You can find the Anti-Phishing Working Groups phishing archive at the following address: APWG | The APWG eCrime Exchange (eCX)
Trojan Horse Email
Trojan horse email offers the promise of something you might be interested in—an attachment containing a joke, a photograph, or a patch A software program update that corrects known bugs or problems, or adds new features to a software program already installed on your computer. for a software vulnerability. When opened, however, the attachment may do any or all of the following:
- create a security vulnerability on your computer
- open a secret “backdoor A hidden method for bypassing normal computer authentication or access systems.” to allow an attacker future illicit Illicit means something that is not legally permitted or authorized under the law; unlicensed; unlawful. It can also mean disapproved of or not permitted for moral or ethical reasons. access to your computer
- install software that logs your keystrokes and sends the logs to an attacker, allowing the attacker to ferret out your passwords and other important information
- install software that monitors your online transactions and activities
- provide an attacker access to your files
- turn your computer into a “bot” an attacker can use to send spam, launch denial Denial is a refusal or unwillingness to accept something or to accept reality. Refusal to admit the truth or reality of something, refusal to acknowledge something unpleasant; And as a term of Psychology: denial is a defense mechanism in which confrontation with a personal problem or with reality is avoided by denying the existence of the problem or reality.-of-service attacks, or spread the virus A computer program that can replicate itself and spread from computer to computer or file to file. It comes to life only when you take a specific action, such as running a particular program. to other computers
What to Look For
Trojan horse emails have come in a variety of packages over the years. One of the most notorious was the “Love Bug” virus, attached to an email with the subject line “I Love You” and which asked the recipient to view the attached “love letter.” Other Trojan horse emails have included the following:
- email posing as a virtual postcard
- email masquerading as security bulletin from a software vendor requesting the recipient apply an attached “patch”
- email with the subject line “funny” encouraging the recipient to view the attached “joke”
- email claiming to be from an antivirus vendor encouraging the recipient to install the attached “virus sweeper” free of charge
Note that, in some cases, a familiar “from” address does not ensure safety: Many viruses spread by first searching for all email addresses on an infected computer and then sending themselves to these addresses. So, if your friend’s computer has become infected with such a virus, you could receive an email that may, in fact, come from your friend’s computer but which was not actually authored by your friend. If you have any doubts, verify the message with the person you believe to be the sender before opening any email attachment.
What You Can Do to Avoid Becoming a Victim
Because most email scams begin with unsolicited commercial emails, you should take measures to prevent spam from getting into your mailbox. Most email applications Applications or Apps
An application (software), commonly referred to as an ‘app’ is a program on a computer, tablet, mobile phone or device. Apps are designed for specific tasks, including checking the weather, accessing the internet, looking at photos, playing media, mobile banking, etc.
Many apps can access the internet if needed and can be downloaded (used) either for a price or for free.
Apps are a major point of vulnerability on all devices. Some are designed to be malicious, such as logging keystrokes or activity, and others can even transport malware.
Always be careful about any app you are thinking about installing. and web mail services include spam-filtering features or ways in which you can configure your email applications to filter spam. Consult the help file for your email application or service to find out what you must do to filter spam.
You may not be able to eliminate all spam, but filtering will keep a great deal of it from reaching your mailbox. You should be aware that spammers monitor spam filtering tools and software and take measures to elude them. For instance, spammers may use subtle spelling mistakes to subvert spam filters, changing “Potency Pills” to “Potençy Pills.”
Regard Unsolicited Email with Suspicion
Don’t automatically trust any email sent to you by an unknown individual or organization. Never open an attachment to unsolicited emails. Most importantly, never click on a link sent to you in an email. Cleverly crafted links can take you to forged websites set up to trick you into divulging private information or downloading viruses, spyware A type of malware installed on computers or cellphones to track your actions and/or collect information without your knowledge. Some spyware can change computer settings for pharming redirection., and other malicious software.
Spammers may also use a technique in which they send unique links in each individual spam email.
Example: Victim 1 may receive an email with the link <http://dfnasdunf.example.org/>, and victim 2 may receive the same spam email with the link <http://vnbnnasd.exaple.org/>.
By watching which links are requested on their web servers, spammers can figure out which email addresses are valid and more precisely target victims for repeat spam attempts.
Remember that even emails sent from a familiar address may create problems: Many viruses spread themselves by scanning the victim’s computer for email addresses and sending themselves to these addresses in the guise of an email from the owner of the infected computer.
Treat Email Attachments with Caution
Email attachments are commonly used by online scammers to sneak a virus onto your computer.
These viruses can help the scammer steal important information from your computer, compromise your computer so that it is open to further attack and abuse, and convert your computer into a ‘bot’ for use in denial Denial is a refusal or unwillingness to accept something or to accept reality. Refusal to admit the truth or reality of something, refusal to acknowledge something unpleasant; And as a term of Psychology: denial is a defense mechanism in which confrontation with a personal problem or with reality is avoided by denying the existence of the problem or reality.-of-service attacks and other online crimes. As noted above, a familiar “from” address is no guarantee of safety because some viruses spread by first searching for all email addresses on an infected computer and then sending themselves to these addresses. It could be your friend’s computer is infected with just such a virus.
Use Common Sense
When an email arrives in your mailbox promising you big money for little effort, accusing you of violating the Patriot Act, or inviting you to join a plot to grab unclaimed funds involving persons you don’t know in a country on the other side of the world, take a moment to consider the likelihood that the email is legitimate.
Install Antivirus Software and Keep it Up to Date
If you haven’t done so by now, you should install antivirus software on your computer. If possible, you should install an antivirus program that has an automatic update feature. This will help ensure you always have the most up-to-date protection possible against viruses. In addition, you should make sure the antivirus software you choose includes an email scanning feature. This will help keep your computer free of email-born viruses.
Install a Personal Firewall and Keep it Up to Date
A firewall will not prevent scam email from making their way into your mailbox. However, it may help protect you should you inadvertently open a virus-bearing attachment or otherwise introduce malware to your computer by following the instructions in the email. The firewall, among other things, will help prevent outbound traffic from your computer to the attacker. When your personal firewall detects suspicious outbound communications from your computer, it could be a sign you have inadvertently installed malicious programs on your computer.
Learn the Email Policies of the Organizations You Do Business With
Most organizations doing business online now have clear policies about how they communicate with their customers by email. Many, for instance, will not ask you to provide account or personal information via email. Understanding the policies of the organizations you do business with can help you spot and avoid phishing and other scams. Do note, however, that it’s never a good idea to send sensitive information via unencrypted email.
Configure Your Email Client for Security
There are a number of ways you can configure your email client to make you less susceptible to email scams. For instance, configuring your email program to view email as “text-only” will help protect you from scams that misuse HTML in email.
Also, view our SCARS FAQs here – FAQs