Protect Yourself: 11 Common Tactics Used In Email Scams

Protect Yourself: 11 Common Tactics Used In Email Scams

Email scams have become increasingly common each year in the United States and for most people and businesses email is an extremely vulnerable point to target.

They are designed to deceive recipients into providing sensitive information, downloading malware, or sending money. Even the City of Tulsa was recently targeted by an apparent email hacking scheme that cost the city $191,972.52.

Related Story: Tulsa Reports Loss Of Nearly $200,000 From Email Hacking Scheme, FBI Investigating

Recognizing the tactics is a key element to preventing a compromising situation. Always be cautious when opening unsolicited emails or clicking on unfamiliar links.

Lori's Crime Tips

Here are 11 common tactics used in email scams:

Phishing

  1. How it Works: Scammers send emails that appear to be from legitimate organizations (banks, retailers, government agencies) to trick recipients into providing personal information, such as passwords, credit card numbers, or Social Security numbers.
  2. Tactics:
  3. Urgent requests to "verify" or "update" account details.
  4. Fake login pages that imitate legitimate websites.
  5. Alarming subject lines (e.g., "Your account has been hacked").

Spear Phishing

  1. How it Works: This is a targeted form of phishing where scammers personalize the email, addressing the recipient by name or referencing specific information (like their job or organization).
  2. Tactics:
  3. Pretending to be a colleague, boss, or friend.
  4. Asking for sensitive work-related data, like client information or internal documents.
  5. Requests for wire transfers or payment to a vendor.

Business Email Compromise (BEC) attacks

  1. How it Works: Scammers impersonate a high-level executive or a trusted vendor to trick employees into transferring funds or providing sensitive company information.
  2. Tactics:
  3. "Urgent" emails from the CEO or CFO requesting an immediate bank transfer.
  4. Posing as a vendor with new payment instructions.
  5. Instructing employees to purchase the gift cards.

Fake Invoice Scams

  1. How it Works: Scammers send fake invoices that appear to come from legitimate companies, hoping the recipient will pay without verifying the charges.
  2. Tactics:
  3. Sending an invoice that looks legitimate but refers to a service or product that was never purchased.
  4. Pressuring the recipient with overdue payment reminders.

Lottery and Prize Scams

  1. How it Works: Recipients are told they've won a lottery, prize, or sweepstakes they never entered, and must pay a fee to claim their winnings.
  2. Tactics:
  3. Offering large sums of money, vacations, or expensive items.
  4. Requesting payment for "processing fees" or "taxes" to release the prize.
  5. Asking for personal details like bank account numbers or home addresses.

Tech Support Scams

  1. How it Works: Scammers pretend to be tech support from well-known companies (like Microsoft or Apple), claiming there's a problem with the recipient's computer that needs immediate attention.
  2. Tactics:
  3. Offering help to fix a "virus" or "malware infection."
  4. Asking the recipient to install remote access software, allowing scammers to take control of the device.
  5. Charging fees for unnecessary "fixes" or stealing personal data.

Advance-Fee Fraud (Nigerian Prince Scam)

  1. How it Works: Scammers claim to be a foreign dignitary, wealthy individual, or government official needing help to transfer money out of their country in exchange for a share of the fortune.
  2. Tactics:
  3. Asking for bank details or upfront payments to cover "processing fees" or "legal costs”
  4. Promising a large sum of money if the recipient helps.

Malware and Ransomware Links/Attachments

  1. How it Works: Emails contain malicious links or attachments that, once clicked, download malware to the recipient’s device, giving scammers access to files and personal data.
  2. Tactics:
  3. Sending fake invoices, order confirmations or shipping notices with infected attachments.
  4. Embedding malicious links that look like legitimate URLs.
  5. Using zip files or PDFs that hide malicious software.

Charity and Disaster Relief Scams

  1. How it Works: Scammers take advantage of natural disasters, crises, or other tragedies to solicit donations for fake charities.
  2. Tactics:
  3. Using emotional stories to encourage recipients to donate.
  4. Setting up fake donation sites that look real.
  5. Requesting donations via wire transfer, gift cards, or cryptocurrency.

Fake Job Offers

  1. How it Works: Scammers send fake job offers or listings, asking recipients to provide personal information or pay for training, equipment, or background checks.
  2. Tactics:
  3. Offering high-paying jobs with little or no qualifications required.
  4. Requesting upfront fees for background checks, certifications, or supplies.
  5. Asking for Social Security numbers or bank details to "set up direct deposit."

CEO Fraud

  1. How it Works: Scammers impersonate the CEO or other high-ranking executives to convince employees to wire money or share sensitive data.
  2. Tactics:
  3. Spoofing the CEO's email or using a similar domain name to the CEO.
  4. Marking emails as "urgent" and asking for quick transfers.
  5. Often targets the finance or HR departments.