Hackers are targeting online users through complex scams. Even trusted tech giants like Apple and Microsoft are vulnerable to such cybersecurity threats.
There can be a significant rise in online scams especially shortly after the new pricey product launches, for example, the latest iPhone, which was recently released. The hackers create authentic brand-selling pages to scam unsuspecting users.
According to Cliff Steinhauer, the Director of Information Security and Engagement at The National Cybersecurity Alliance, “Hackers use the reputation of the brand for legitimacy purposes to make it seem more real. Because who doesn’t know Microsoft or Apple as a brand?” he stated in a report by CNBC.
There are various tactics by which the hackers draw the victims, including:
1. Deceptive Pop-Up Messages: Those scam messages normally appear in the form of bogus pop-up warnings on computers, warning users that their device is infected and asking them to call support.
For example, a user will see a pop-up saying their Apple device is attacked, asking them to call "Apple Support." When the user clicks the fake link to call support, the scammers hack and extract their sensitive bank information. This sensitive information includes passwords and bank details of the user.
Another example can be pop-up messages appearing to be part of e-mails. On opening their e-mail, some users receive a fake warning message from Microsoft informing them that their account has been compromised. Then the email would ask them to go to what appears to be a support site to "verify" the account information.
Such phishing messages can seem pretty legitimate but are usually loaded with malicious software to compromise unsuspecting users' computer security.
2. Malvertising: It explains the method of installing malware in the advertising posted through numerous search engines, including Google or Microsoft Bing. Scammers purchase these ads because they appear to be legitimate support services to the users.
For example, a user searching for "Microsoft support" could be redirected through a scam ad to a malicious website where a false support number is displayed. And when they click on it, the malware will compromise their system, making it easy for the hackers to extract sensitive bank information.
A recent example of such hacks is when the legitimate OpenAI X account, @OpenAINewsroom was hacked. The hackers managed to deceive approximately 54,000 followers with a phishing message proclaiming the recently launched cryptocurrency token, $OPENAI. The fake post declares that users of OpenAI can stake their claim of a share of the initial supply and turn the token into "the bridge for AI and blockchain." Read more
Although people are more aware of such frauds, reliance on AI makes it harder to detect. Scammers will make very complex messages and websites that look virtually indistinguishable from real service functionalities. Even the most cautious users may be taken off guard when distinguishing between actual support and the scam.
You need to act fast if you suspect that you have become a target for one of the scams.
1. Change Your Credentials: Change the username and password for all affected accounts in time.
2. Notify Financial Institutions: Inform your bank and all financial services that may be involved, of the suspected breach.
3. Report to Authority: Report the scam to the authorities to try to stop other similar incidents.
4. Install Antivirus Software: Try to install reputable antivirus software that will protect your systems against future malware attacks.
AI-integrated communication by hackers presents new challenges to users. Hackers, with the backhand advantage of brand reputation, continue to use trust-associated brands such as Apple and Microsoft. Only with awareness and vigilance can you protect yourself from such scams.