The Cyber Security Council affirmed that the fraudulent hunting operations only succeed with the response of the victims to the fake messages and the fake performances that are being promoted, warning against clicking on the links sent before making sure of their safety.
And identified six common fraudulent methods implemented through social engineering, including first: fraudulent hunting via email, where cyber criminals use fake email messages that appear to be from banks or reliable companies, to deceive the target victim, and push him to click on dangerous links, or share words Its traffic, and secondly: vocal hunting (fraud through calls), where CPR criminals make phone calls demonstrators that they are representatives of reliable institutions, with the aim of stealing personal information, such as the details of the account or secret numbers, and thirdly: fraudulent hunting through text messages, where the fraudsters are used Displacing text messages to lure the victims, through attractive links or fake rewards offers, as clicking on these links may lead to loading malware or stealing personal data, and fourth: lure, and often hides free download offers or gifts that are not visible, and malware threatening The security and privacy of personal data, and fifth: the analysis of fake stories, where cyber criminals create fake stories, such as the claim that they are from the technical support team, with the aim of winning the person’s confidence and luring him to share his sensitive data, and sixth: fraudulent barter, where fraudsters offer fake technical support services, or gifts Like purchasing vouchers, in exchange for sensitive information.
And the council published through its official account on the “X” website an awareness video, entitled “E -hunting from deception to penetration”, in which he warned of the design of cyber criminals, false messages and websites, which appear to be issued by trusted parties, pointing to sending messages via email Or text messages or ads to users, accurately simulates official sources.
He reviewed examples of such messages: including “alert: the validity of your password ends today, please update your bank information urgently”, and “urgent .. an unauthorized entry attempt has been discovered.”
He warned that the victims fall into the trap by clicking on the link or providing their sensitive information, thinking that they are protecting it, indicating that the stolen information is used in fraud, or sold in the dark network to achieve profits.
He pointed out that the fraudulent processing operations were designed with the aim of deception, as they begin with false messages or websites that appear as if issued by reliable institutions, and urges users to take immediate action, such as updating the details of the account, to deceive individuals and push them to share their sensitive information, and once the data is obtained, they are used In fraud or sold online.
He called to verify messages and protect personal and banking information.
The council shed light on the dangers of social engineering attacks that weave the fraud of fraud by impersonating reliable identities, and said that criminals use false messages, deceptive calls, and fake performance It does not ask for sensitive information.
On how cyber criminals exploit individuals ’confidence through social engineering, the Council stressed that social engineering attacks are designed to access the victim by seizing his confidence and stealing his personal information, and it may start with something simple such as a fake email, or a sudden call from the bank you deal with and request to confirm information the account.
On how to discover signs of fraud through social engineering, the council stated that there are warning signs such as fake links, discovering a suspicious entry attempt and requesting the verification of the account within 24 hours to secure data, or send a message that the payment process failed, and what is required is an immediate procedure to avoid the suspension of the account, And the alert: “Your account has been hacked”, as well as suspicious offers, such as “obtaining a 50% discount on any request by filling in the required information.”
On steps to address social engineering, the Council stressed the need to verify the source, communicate directly with official channels, examine e -mail, verify spelling errors or suspicious ranges, slows down before clicking, avoiding rushing to click on links or download files.
In the context of the launch of the community 2025, in cooperation with the Abu Dhabi Councils in the Office of Citizen and Society Affairs at the Presidential Court, the Cyber Security Council launched a new awareness campaign to enhance the digital security of the family and society, calling for the knowledge of the most important cyber threats and the best ways to confront them, and to know the best ways to protect children One of the cyber risks.
Follow our latest local and sports news and the latest political and economic developments through Google News