Connect with us

Technology

Iranian hackers ramp up digital attacks on US political campaigns

Published

on

Iranian hackers ramp up digital attacks on US political campaigns

Elections are coming up, and threat actors are ramping up efforts to manipulate voters and attack political campaigns. Cybersecurity researchers have discovered new network infrastructure set up by Iranian hackers, aimed at targeting U.S. political campaigns. They use phishing emails and links to trick users into installing malicious software, often pretending to be cloud services.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Illustration of a hacker using phishing techniques (Kurt “CyberGuy” Knutsson)

What you need to know

The infrastructure has been discovered by Recorded Future’s Insikt Group, which has been tracking it since June 2024. The cybersecurity company has linked the infrastructure to GreenCharlie, an Iran-nexus cyberthreat group with connections to Mint Sandstorm, Charming Kitten, and APT42.

“GreenCharlie’s phishing operations are highly targeted, often employing social engineering techniques that exploit current events and political tensions,” Recorded Future said.

Advertisement

The hackers have set up their systems very carefully, using specific services to create websites for phishing attacks. These fake websites often look like they belong to cloud services, file-sharing platforms or document-viewing tools to trick people into sharing personal information or downloading harmful files.

Some examples of these fake website names include “cloud,” “uptimezone,” “doceditor,” “joincloud” and “pageviewer.” Most of these sites were registered with the .info domain, which is a change from the other domains like .xyz, .icu and .online that hackers used in the past.

Iranian hackers ramp up digital attacks on US political campaigns

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

DON’T FALL PREY TO THIS ELECTION SEASON’S CRAFTIEST SCAMS

It’s not their first rodeo

The threat actors are known for launching highly targeted phishing attacks, where they use sophisticated social engineering tricks to infect users with malware. Some of the malware they use includes POWERSTAR (also known as CharmPower and GorjolEcho) and GORBLE, which was recently identified by Google’s Mandiant as being used in attacks against Israel and the U.S.

“Iran and its associated cyber-espionage actors have consistently demonstrated both the intent and capability to engage in influence and interference operations targeting U.S. elections and domestic information spaces. These campaigns are likely to continue utilizing hack-and-leak tactics aimed at undermining or supporting political candidates, influencing voter behavior, and fostering discord,” the cybersecurity company said.

Advertisement
Iranian hackers ramp up digital attacks on US political campaigns

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

HACKED, SCAMMED, EXPOSED: WHY YOU’RE 1 STEP AWAY FROM DISASTER ONLINE

Phishing attacks are more advanced than ever

A phishing email or message is often the start of a cyberattack. Hackers send you a link that is designed to look legitimate, but it’s not. Instead, it delivers malware to your computer, giving hackers access to your system and allowing them to steal your money and data. You can’t blame yourself if you don’t recognize a phishing link.

Earlier this month, I reported on malware called “Voldemort,” which tricks people into clicking malicious links by pretending to be a government agency. This highlights how clever these scammers are in using deceptive techniques to infect your devices.

The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4 additional ways to protect yourself from phishing attacks

To protect yourself from phishing attacks that use fake cloud services and other deceptive tactics, here are some specific steps you can take.

Advertisement

1) Verify website URLs: Always check the URL of a website before entering any sensitive information. Look for signs of a secure connection, such as “https://” and a padlock symbol in the browser’s address bar. Be cautious of slight misspellings or unusual domain extensions like .info.

2) Invest in data removal services: Hackers target you based on your publicly available information. That could be anything from your leaked info through a data breach to the information you provided to an e-commerce shop. Check out my top picks for data removal services here.

3) Keep software and systems updated: Regularly updating your operating system, browsers and security software is crucial to protect against vulnerabilities that hackers could exploit. Updates often include security patches, bug fixes and performance improvements. Enable automatic updates to ensure you don’t miss important patches. Manually check for updates if automatic options aren’t available. Staying current helps maintain device security and functionality.

4) Use strong, unique passwords: Employ strong, unique passwords for each account to prevent unauthorized access. Create passwords with a mix of letters, numbers and symbols, and avoid using the same password for multiple accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Get more details about my best expert-reviewed Password Managers of 2024 here.

3 MOST DANGEROUS TECH THREATS TO 2024 ELECTIONS

Advertisement

Kurt’s key takeaway

U.S. elections not only matter to Americans but also to the rest of the world, which is one reason foreign adversaries are attempting to manipulate the campaigns. Hackers are working hard to infect people’s devices to conduct espionage, spread misinformation and cause financial losses. The best thing you can do is stay alert, avoid clicking any links you don’t trust and invest in antivirus software. Hackers are changing their methods, so it’s important to take advantage of the available tools to protect yourself.

Do you verify the authenticity of a website or email before clicking on links or providing personal information? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

An all-in-one app for the internet

Published

on

An all-in-one app for the internet

Hi, friends! Welcome to Installer No. 51, your guide to the best and Verge-iest stuff in the world. (If you’re new here, welcome, I hope you love spy shows as much as I do, and also you can read all the old editions at the Installer homepage.) 

This week, I’ve been reading about cobalt miners and religious AI and the history of the Moleskine, listening to pop-punk Disney songs on repeat, finally starting The Sopranos (I know, I know), soundtracking my workday with the Earth.fm app, giving Tweek another whirl for simple task and calendar stuff, and spending too much time debating whether NFL Sunday Ticket is worth the money. It’s definitely not, but it also, like, kind of is.

I also have for you everybody’s favorite new PlayStation game, a new documentary about money in sports, two new cameras worth a look, and a terrific E Ink note-taking device. Oh, and apologies: I included the wrong link to my homescreen icon pack last week. (Luckily, the one I did link to is also very good.) Mine are actually from Nate Wren’s Lines pack.

Anyway, so many gadgets this week! Let’s dig in.

(As always, the best part of Installer is your ideas and tips. What are you into right now? What should everyone else be watching, reading, playing, cooking, downloading, or building this weekend? Tell me everything: installer@theverge.com. And if you know someone else who might enjoy Installer, tell them to subscribe here.)

Advertisement

The Drop

  • Reeder. It’s a podcast app, a YouTube queue, an RSS reader, a social feed, and a whole bunch more, all in one place. (And for Apple devices only.) It’s a reading app for feeds from all over the internet, it’s gorgeous, and as we talk about the fediverse and the future of the web, this is the kind of app that gets me really excited.
  • Slow Horses season 4. I avoided this Apple TV Plus show for a while because I didn’t love the book, which is very well done but just kind of… slow. (I eventually soldiered through the first third of the first book, at which point it does start moving.) The show is not slow. It’s just funny and smart and exactly the right amount of action-packed.
  • Astro Bot. I promised myself I was going to wait until Black Friday to buy a PS5… but this new game, an adorable platformer that seems to have charmed absolutely everyone who tried it, is going to make me pull the trigger sooner. Seriously, people love this game.
  • The Remarkable Paper Pro. This thing is pure E Ink overkill, with an overengineered color display and a bunch of extremely fancy features. It’s like $800 for the whole setup including the keyboard, which is an awful lot, but this is a heck of a note-taking device.
  • The Money Game. A miniseries about the NIL revolution in college sports, which is actually a story about social media and the internet and the way that everybody, including athletes, struggles to balance life and content.
  • Circle to Search for music. Forget Gemini — Google’s most clever AI features are all happening through Circle to Search. Google’s song lookup tool is the best in the biz, and with Circle to Search and Android 15, you can get at it from anywhere. 
  • The Peak Design Outdoor Line. Peak Design’s stuff is just always great, and the new line of rugged gear looks like a winner. (Don’t be thrown by the Kickstarter, it’s just how the company rolls for some reason. PD is legit.) I’ve recently become a sling convert for daily use, and I’m very into the new one here.
  • The GoPro Hero 13 Black. Every new GoPro is kind of the same: a little better in a bunch of ways but still a GoPro. And that’s fine! Adding some new lenses and improving transfer speeds goes a long way here, too.
  • The DJI Neo. The other nifty camera launch of the week: a simple selfie drone that follows you around, does cool camera moves, and lands in your hand. Getting real Snap Pixy vibes from this thing, but I think this one might be a hit. 
  • The PlugBug with Find My. My first reaction to the idea of a wall plug with Find My support was, just, why? But then I thought about how many hotels and coffee shops I’ve left chargers in, and I think this $70 gizmo might pay for itself pretty fast. Plus, Twelve South stuff rarely disappoints.

Group project

Over the last couple of weeks, I’ve asked you all to share your favorite lesser-known creators. This was, as always, at least partly selfish: I love my favorites on YouTube, TikTok, Instagram, and the rest, but my feeds are starting to feel a little static. I had a feeling you all might be able to help me liven things up — and that maybe a few of you were looking for some good new stuff, too.

As ever, you all delivered. I got hundreds of emails, messages, Threads posts, and comments from folks with great ideas and recommendations. I hardly got any duplicate recommendations, either, which is just delightful — there’s so much good stuff out there. And rather than keep it all for myself, I figured I’d share some of the best folks I’ve been turned onto in the last couple of weeks. I’m going to mostly link to YouTube channels, both because that’s what most people recommended but also because you can find folks’ other social links from their channel pages.

(One small caveat before we dive in: I haven’t been able to thoroughly vet everything all these folks have done forever. So if someone turns out to be the worst, in whatever way, I’m really sorry. If I’m missing something I should know about, definitely let me know. But y’all rarely steer me wrong, so I have high hopes.)

No surprise, a lot of what I heard about were tech creators. Here are a bunch of the folks you recommended, in no particular order:

Advertisement
  • Work From Hype: all about desk setups and WFH gear
  • Macho Nacho: retro gaming
  • Elliotisacoolguy: a very funny graphic designer
  • Brandon Talbot: fitness and health tech reviews
  • MobileTechReview: gadget reviews
  • Brandon James Greer: a pixel artist sharing their process
  • Easy Allies: video game news and reviews
  • Ritvikmath: data science and predictions
  • Technology Connections: everyday tech explainers
  • Enrico Tartarotti: essays on how tech works and how we use it
  • Byte Review: gadget lifestyle videos, especially Apple stuff
  • Salem Techsperts: stories from a computer repair shop
  • The Serial Port: all things tech history

Also, it turns out you all love a good video essay and explainer as much as I do, and you shared a bunch of great channels for just that:

  • Paul E.T. (on movies)
  • Not Just Bikes (on urban planning)
  • What’s So Great About That? (on… everything)
  • Answer in Progress (also on… everything)
  • Kaptainkristian (on movies and TV)
  • Golden Owl (on video game design)
  • Blast Processing (on video game history)
  • Middle 8 (on music culture)
  • MinuteFood (on food)
  • Calum (on transportation history)

Then there were just a lot of miscellaneous folks you all shared. Here are a few I’ve been enjoying:

  • Berm Peak, all about bikes and scooters and anything you can ride on
  • Slickerdrips, with lots of board game tutorials and playthroughs
  • Vanwives, on van life, DIY, and off-grid living
  • Boulder Creek Railroad: a model builder half working and half teaching
  • Escape to rural France, a guy chronicling his attempt to rebuild a chateau
  • Jelle’s Marble Runs, because marble runs are never not fun
  • Adventure Chasing, a guy and his dog exploring the outdoors

I could keep going, and I’m sure I will at some point. Thanks again to everyone who sent stuff in! My watch list will never be the same, and I couldn’t be happier about it.

Screen share

From now on, if you’re a Vergecast listener and you like the way the show sounds, you’ll have Erick Gomez to thank. He joined the team this week as our audio engineer and has, in his career, worked on some of the best podcasts and radio shows on the planet. 

I like to have new folks share their homescreen with us, both because I think it’s a fun way to get to know someone and I like having a work-appropriate reason to make fun of people’s silly wallpapers and app choices. But from the first time I met Erick, it became abundantly clear he was a person who brokered no chaos and would have a homescreen that Just Made Sense.

Here’s Erick’s homescreen, plus some info on the apps he uses and why:

The phone: iPhone 14 Pro Max

Advertisement

The wallpaper: I’ve been gaming since I was about five years old, and it is still one of my greatest hobbies and passions, so my lock screen is that of a Game Boy Advance SP — a cherished handheld from my childhood. I love how the widgets make it seem as though they’re part of the Game Boy display.

My homescreen wallpaper is my daughter Charlie in her Elmo costume from last year. We are a BIG Halloween family, and we are always counting the days until spooky season.

The apps: Eufy Security, Dot, Passwords, Delta, Journal, Parcel, Overcast, Hey Email, Arc Search.

I’m a big fan of widgets and glanceable information — the less I have to pop into an app, the better. I don’t have any social media apps installed on my phone and will only reinstall them whenever I feel compelled to post something. As I’ve gotten older, I’ve realized the insane amounts of time I’ve spent mindlessly scrolling Instagram and the like, so I’ve channeled that energy into journaling apps.

Dot: It’s an AI companion chatbot thing. It’s actually really cool. It’s very much like a journal or friend that responds to you and can give you some feedback and spark ideas. It’s great until it confuses some facts about you, which breaks the immersion. It will often text me during the day when I’m super busy so I don’t get a chance to respond. If you ignore it for long enough, it will stop reaching out to you. Just like a friend in real life!

Advertisement

Delta: Did I mention I’m a gamer? It was LONG overdue for emulators to come into the App Store, and this is by far the best for playing retro games. If I find myself waiting around for something, I’ll quickly pop into a game of NBA Jam or Streets of Rage.

Hey: Hey is my favorite email client and service. The email screener and privacy-focused approach make it well worth the yearly subscription. And it looks better than most email apps.

Arc: This is a new addition to the homescreen and has quickly replaced Safari for me in most cases. Its “Browse For Me” feature is a godsend. I also love the app’s alternate icon, which pays homage to Netscape Navigator. It’s 1994 all over again!

I also asked Erick to share a few things he’s into right now. Here’s what he sent back:

  • I’m currently reading MCU: The Reign of Marvel Studios. As a Marvel zombie from way back, I’m a huge fan of the movies and am fascinated by the behind-the-scenes look at how the sausage was made.
  • I’m currently watching Dark Matter on Apple TV Plus. A thought-provoking sci-fi show that more people need to be watching! It’s been renewed for a second season, so that should tell you something.
  • I’m trying to get through my ginormous backlog of video games (there are TOO MANY games, y’all), and I’m currently playing the Paper Mario: The Thousand-Year Door remake on Switch. It’s an absolutely beautiful gem of a game that needs to be experienced by everyone.

Crowdsourced

Here’s what the Installer community is into this week. I want to know what you’re into right now as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. For even more great recommendations, check out the replies to this post on Threads.

Advertisement

“Just moved my work Windows PC to Zen Browser. A Firefox version that has a very strong Arc feeling.” – Maciej

“Was away at a cabin with family and we did not bring a camera. When the baby fell asleep, we popped in one AirPod and turned on Live Listen, left the phone in the room, and went about our business! Two birds with one stone, really, since then I didn’t have my phone. I am curious if Android has anything similar!” – Saad

Four Thousand Weeks by Oliver Burkeman is rocking my world right now. For those in constant search of productivity optimization (speaking of no one in particular, of course…), this book hits home.” – Ryan

Diggnation came back. So that’s been some fun nostalgia.” – Brian

“The HandleStash — a shock absorbing beverage holder for bikes. Game-changer for morning commute / weekend morning rides with coffee.” – Jim

Advertisement

“I switched from Spotify to YouTube Music a few years ago after Joe Rogan-gate and haven’t looked back! The audio quality is SO MUCH BETTER than Spotify. Feel that bass. There aren’t as many playlists, but just enough, and I tend to really enjoy checking out the new releases each week. It’s like a digital Best Buy from the ’90s. Plus, if you’re already paying for YouTube Premium, it’s included.” – Ellen

“I just got a rice cooker, and I’m eyeballing rice cooker cornbread for this weekend.” – Daniel

Kaos on Netflix is amazing. A perfect blend of Greek mythology and modern-day politics. Highly recommended.” – Sacchi

“This week, I’m procrastinating by deciding whether I should stick with Bear, go back to Obsidian, or accept my fate and move back to Apple Notes. It is torture.” – Eitan

A Short History of Nearly Everything. I know that this book is pretty old and many people have already read it, but if you haven’t read it, you should surely give it a try.” – Aashwath

Advertisement

“I lost most of my Labor Day weekend to Shapez 2. It’s incredible!” – Alec

Signing off

Apple’s annual iPhone launch event is on Monday, and we’re going to get a whole bunch of new gear: sounds like phones, watches, headphones, and maybe even desktops are all on the docket. We’re also going to get upgrades to all of Apple’s software, too. Which is mostly good news! But after watching this video about what Apple’s updates do to the very oldest devices they technically support, I’m also thinking of everyone whose devices are supposedly about to be “upgraded” and might instead just begin to fall apart. Best of luck to all the Intel-powered Mac owners out there. 

Continue Reading

Technology

Nanoleaf finally launches a smart switch after eight years of trying

Published

on

Nanoleaf finally launches a smart switch after eight years of trying

After nearly a decade of development, Nanoleaf’s smart switch is finally here. You can pre-order the $30 Sense Plus Smart Wireless “Anywhere” Switch today, and it should ship in October. But to get to this point, Nanoleaf had to pivot from its adoption of Thread and create a new, proprietary protocol called Litewave.

The battery-powered device brings physical control to Nanoleaf’s smart lighting system, allowing you to press a button to turn lights on or off, dim or brighten, or change colors. Plus, built-in motion and light sensors let the Sense adjust your lighting based on room conditions.

“We needed to make sure that our products would work reliably with less dependence on the platforms,” Gimmy Chu

The Sense, a version of which was first announced in 2020 and then again in 2023, has been long anticipated by fans of the company’s RGB lighting line. The wireless smart switch allows you to control all the lights in one room or multiple rooms without using voice or pulling out your phone. It’s a similar concept to Philips Hue’s wireless dimmer switch or Lutron Caseta’s Pico remote, and can also be mounted on a wall plate like a traditional light switch or used as a portable remote.

I got some hands-on time with the Sense at the IFA tech show. It has six buttons: on/off, dim/brighten, and the two configurable buttons. It’s a tad bulky but lightweight.
Photo by Jennifer Pattison Tuohy / The Verge
Advertisement

However, in addition to standard lighting controls, the Sense features two configurable buttons that can be programmed in Nanoleaf’s app or set up to work with Apple Home and Samsung SmartThings through Matter.

This lets you create automations with other devices to have, say, a “Movie Time” scene that closes the shades, dims the lights, and adjusts the thermostat with the press of a button. But, because not all Matter platforms support smart buttons yet, the Sense’s Matter integration is currently in an early access program.

The Sense uses two protocols simultaneously to connect with Nanoleaf’s lights. Matter over Thread and Litewave, a technology the company developed specifically for this product. A proprietary local protocol that works over the same 802.15.4 radio as Bluetooth/Thread, Litewave allows the switch to communicate with all Nanoleaf lights, whether they use Thread, Bluetooth, or Wi-Fi.

1/2

The Sense works with all Nanoleaf’s current smart lights, regardless of their protocol. These Essentials bulbs and light strips use Thread and Bluetooth.
Image: Nanoleaf
Advertisement

According to Nanoleaf co-founder and CEO Gimmy Chu, finding the right technology to produce a reliable wireless switch experience has taken eight years. “We needed a low-power networking solution, like Thread, and we also needed a common communication protocol — like Matter,” he says. However, while the company is a big proponent and early adopter of Thread, it has struggled with its Matter over Thread implementation. This led it to develop the proprietary protocol to ensure its new smart switch would work reliably with all its smart lights. 

In an interview with The Verge, Chu attributes some of these struggles to the complexity of Matter and its multiple platforms. “We don’t have control over the Matter controller, which is responsible for making sure that things like pairing work correctly and that Thread network is being maintained correctly,” he says. “We needed to make sure that our products would work reliably with less dependence on the platforms.” 

Chu says Litewave provides a robust and reliable local connection that enables instantaneous control — as fast as flipping a light switch. “With it, we can simultaneously be part of the Matter over Thread mesh network and also support our communication,” he says. Litewave also doesn’t require a Thread border router or Matter controller to work, making setup simpler for users. You only need those additional devices if you choose to enable Matter.

Advertisement

Over Litewave, the Sense controls multiple Nanoleaf lights immediately with no “popcorn” effect (where lights pop on one after another). Chu showed me this in action during our video interview: a dozen downlights turned on and off instantly as he pressed the button. “We’ve tested it with over 100 devices across 10,000 square feet, and everything is instantaneous with about 100 percent reliability,” he says.

In another shift away from relying solely on Thread, Nanoleaf is releasing its first Matter over Wi-Fi light bulb — all its current bulbs use Thread. The full-color and tunable white Essentials Matter Wi-Fi A19 Smart Bulb is developed for Walmart and costs $29.99 for a two-pack (you can also buy it at Nanoleaf’s webstore for $49.99 for four).

Chu says they decided to go with Wi-Fi because they feel like Thread is still too niche for the Walmart customer. “The mass market does not know what Thread is,” he says. “When launching into a place like Walmart, we wanted to make sure we were catering to as broad an audience as possible.”

“The mass market does not know what Thread is,” Gimmy Chu

Nanoleaf isn’t the only company hedging its bets on Matter over Thread. After several Thread-only launches, Aqara’s latest lighting products work with Thread and Zigbee — the protocol it used to connect all its devices prior to working with Thread. The company says it did this because Zigbee currently provides more features on its platform than Matter over Thread, and it wanted to give its users the choice. 

Advertisement

The just-released Thread 1.4 update is supposed to address many of the current issues, and as Matter develops, feature parity should arrive. But it will take a while for manufacturers to implement the new Thread spec. In the meantime, companies like Nanoleaf have little choice but to look for alternative solutions while Thread sorts itself out.

Continue Reading

Technology

The mystery behind those creepy 'Unknown' spam calls

Published

on

The mystery behind those creepy 'Unknown' spam calls

Scammers are becoming more sophisticated in their attempts to steal your sensitive data. One particularly concerning trend is the rise of targeted phone scams, where callers possess just enough information to seem legitimate but are actually phishing for more details to exploit.

Recently, we received an email from James in LA detailing his unsettling experience with a series of suspicious phone calls. His story serves as a stark reminder of the importance of vigilance in protecting our personal information. Here’s what James shared with us:

“I have received multiple random unknown calls (in the past two months), and they always start with the person calling me on the phone (listed as unknown) and providing my full name. Absolutely Correct. Then, ask if I am that ‘name, in (insert city). Then, when I say no, you have the wrong guy, they provide a birthdate and ask if it is mine, which, of course, it is Not. Then, they politely apologize, say thank you, and hang up. At that point, you realize that they never told you who they are representing. Maybe I’m paranoid, but it just seems strange.”

James’ experience is not unique. Many people across the country are reporting similar incidents, where callers seem to have a partial set of personal information and are attempting to verify or expand upon it. This tactic, known as “social engineering,” is a common method used by scammers to gain trust and extract valuable data.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Advertisement

A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)

Where scammers get their information

The mystery behind these creepy ‘Unknown’ spam calls often begins with data breaches or information leaks. Scammers obtain partial information from various sources, including public records, social media profiles or purchased data from the dark web. They then use this incomplete data as a starting point for their phishing attempts, aiming to fill in the gaps and create a more complete profile of their targets.

man on phone

A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

Understanding the scammer’s playbook

Let’s break down the tactics used in these calls:

Partial Knowledge: The scammer starts with some correct information, like a full name and city. This creates an illusion of legitimacy and can catch you off guard. However, they might be phishing for more details, like your birthdate.

Advertisement

Verification requests: By asking to confirm additional details like a birthdate, the scammer is attempting to gather more valuable personal information.

Vague identity: The caller never identifies themselves or their organization, making it difficult to verify their legitimacy or report them later.

Polite disengagement: The quick, polite end to the call is designed to leave the recipient feeling that nothing suspicious has occurred, reducing the likelihood of immediate suspicion or action.

These tactics are carefully crafted to exploit human psychology. The initial correct information builds trust, the request for verification seems reasonable and the polite exit leaves the recipient with a positive final impression.

seated man with phone

A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

Advertisement

The dangers of information gathering

You might wonder, “What harm can come from confirming my birthdate?” Unfortunately, in the wrong hands, even small pieces of information can be dangerous. Scammers can use these details to:

  • Build a more complete profile for identity theft
  • Access accounts or reset passwords
  • Impersonate you in other scams or fraudulent activities
  • Sell your information on the dark web

Data is a valuable commodity these days, and every piece of personal information should be guarded carefully.

woman speaking on phone

A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)

MASSIVE DELL DATA BREACH HITS 49 MILLION USERS — WHAT THIS MEANS FOR YOUR PRIVACY AND SECURITY

8 steps to protect your personal information

In light of the sophisticated tactics employed by scammers, it is important to protect your personal information. Here are some measures you can implement:

1. Avoid sharing information with unknown callers

It is essential to never provide personal information over the phone to unknown callers. Always use caller ID and refrain from answering calls from numbers you do not recognize. If you do answer a call, avoid confirming or denying any information the caller claims to have. Be particularly wary of callers who create a sense of urgency or use fear tactics to manipulate you.

man speaking on phone

A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)

2. Verify caller identity

When you receive a suspicious call, ask for the caller’s name, the company they represent and a callback number. However, do not call back immediately; instead, take the time to research the company independently. Look up official contact information online and call that number to verify the legitimacy of the initial call.

Advertisement
another woman speaking on a phone

A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)

3. Enable spam-blocking features

To further protect yourself, enable spam-blocking features on your phone. You may also consider using call blocking apps which can help screen calls and identify potential spam. 

Additionally, regularly updating your phone’s operating system will ensure that you benefit from the latest security features and protections.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4. Report suspicious activity

If you encounter suspicious calls, it is important to report them to your phone carrier. You should also file a complaint with the Federal Trade Commission (FTC). If you believe you have been a victim of fraud, consider reporting the incident to local law enforcement to help protect yourself and others in your community.

woman in purple hat talking on phone

A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)

5. Remove your personal information from the internet

To reduce your online presence, consider using a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  

Advertisement

It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Additionally, make it a habit to regularly Google your name and phone number to see what information is publicly available about you.

6. Use an identity theft protection service

Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

7. Secure your accounts

To enhance the security of your online accounts, use strong and unique passwords for each one. It is also wise to avoid using easily guessable information, such as birthdates, in your passwords. Consider using a password manager to generate and store complex passwords. Also, enabling two-factor authentication wherever possible on your devices adds an extra layer of security.

Advertisement

8. Be cautious on social media

When using social media, review and tighten your privacy settings to limit who can see your personal information. Be mindful of the details you share publicly, as scammers often use social media to gather information. Additionally, avoid accepting friend requests or messages from unknown individuals to reduce the risk of falling victim to scams.

By implementing these comprehensive steps, you will significantly reduce your risk of falling victim to phone scams and identity theft. Remember that protecting your personal information is an ongoing process that requires vigilance and regular attention.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaways

Scammers are constantly evolving their tactics, making it crucial for us to stay one step ahead. James’ experience serves as a wake-up call for all of us. It’s not just about being cautious; it’s about being proactively defensive with our personal data.

Remember, every piece of information you share, no matter how small, can be a puzzle piece for scammers. Your birthdate, your city, even your social media posts — they’re all potential tools in a scammer’s arsenal. But don’t let this paralyze you with fear. Instead, let it empower you to take control of your digital footprint. 

Advertisement

By implementing the steps we’ve discussed — from being alert on phone calls to using data removal and identity protection services — you’re not just protecting yourself. You’re also making it harder for scammers to operate, potentially saving others from falling victim.

What’s the most unusual or clever scam attempt you’ve encountered, and how did you handle it? Your experiences could help others recognize and avoid similar scams in the future. Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Trending