Types of Suspicious Messages by Cyber Sprinters and Urgent Call for Assistance

Slide Note
Embed
Share

Cyber Sprinters are warning about three types of suspicious messages: Evil Emailers using phishing tactics, Malicious Messenger engaging in smishing, and Phoney Phone Caller utilizing vishing. The South West Constabulary urgently seeks the Cyber Crime Response Unit's help to investigate a group of criminal scammers. These individuals mimic official sources, create urgency, and trick victims into sharing personal information or downloading harmful content. Be cautious and report any such suspicious activities.


Uploaded on Aug 14, 2024 | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Cyber Sprinters: Activity 3a Types of suspicious messages

  2. CYBER CRIME EMERGENCY RESPONSE UNIT Urgent Request for Assistance

  3. South West Constabulary Dear CCERU, We have become aware of a particularly nasty group of criminals targeting innocent people in recent weeks. These are criminals we are already aware of, but who have become increasingly sneaky and are therefore more likely to succeed in their evil plans. We urgently request the assistance of the Cyber Crime Response Unit. We re sharing our current intelligence, and request that you undertake an undercover investigation to see if you can bring these criminals to justice. Kind regards, South West Constabulary

  4. Suspect 1: Evil Emailers Has been known to imitate an email from an official source, like a bank, doctor or online game designer. Can be really convincing, using official looking logos. Often creates a sense of urgency by giving a limited time to respond. Can be threatening. Uses fines or negative consequences to make you click on things, or share your details. Might offer extraordinary deals like large sums of money, or things that are much cheaper than they should be. Can use current events to make themselves seem even more plausible and relevant. Can encourage victims to offer up personal information that can then be used to hack into other accounts (eg usernames or passwords). Has also been known to get users to click on a link which downloads a virus onto their computer. Crime: Phishing (Email pretending to be from someone as bait to hook you into doing something that will cause you harm)

  5. Suspect 2: Malicious Messenger Has been known to imitate a text from an official source, like a bank, doctor or online game maker. Often creates a sense of urgency by giving a limited time to respond. Can be threatening. Uses fines or negative consequences to make you click on things or share your details. Might offer extraordinary deals like large sums of money or incredible bargains. Can use things happening at the time to make themselves seem even more plausible and relevant. Can encourage victims to share personal information that can then be used to hack into other accounts (eg usernames or passwords). Has also been known to get users to click on a link which downloads a virus onto their phone. Crime: Smishing (Text message from someone as bait to hook you into doing something that will cause you harm)

  6. Suspect 3: Phoney Phone Caller Has been known to imitate a phone call from an official source, like a bank, doctor or even someone you know. Can be really convincing, using authentic sounding information. Can be threatening. Uses fines or negative consequences to make the victim reveal details about their bank accounts, or usernames or passwords. Can use current events to make themselves seem even more plausible and relevant. Can create a sense of urgency and make you feel under pressure to act quickly. Crime: Vishing (voice message from someone as bait to hook you into doing something that will cause you harm)

  7. What did these cyber criminals have in common? They all pretended to be someone that they weren t. They all tried to get you to do something that could cause you harm. They use different ways to catch you out (scaring you, promising you something, getting you to act quickly). It s a bit like someone having some bait on a fishing line that hooks you, which is why it s called phishing.

More Related Content