Cyber ​​Fraud

The digital transformation experienced with the rapid development of technology continues to show its effects in every environment. On the one hand, hardware and software technologies are developing, on the other hand, criminals have started to transfer their skills to the digital environment.

Today, another segment that benefits from the possibilities of the internet has been fraudsters, namely cyber fraudsters with their new name. These cybercriminals, who choose their targets from social networks, achieve their goals even more easily. First, they start by collecting information. They either pre-select the target and collect information about it, or they search for a target by randomly browsing social networks. In both methods, the tool is social networks and the information that users leave on these networks. The most important information gathering tool for cyber crooks is the internet and social media. So who are these cyber crooks?

Cyber ​​Scams

They are not very knowledgeable people. Don’t think of software experts who spend their days in front of the computer as you imagine. This type of criminal; They are people who seek easy profits and analyze people’s curiosities, fears, reservations and weaknesses well. These criminals, who love the dark side of the internet more, are hunters who search for their prey by “surfing” on social networks. Like every normal person, they learn about current issues from television and other widely followed communication tools and use this information to deceive people in the scenarios they prepare. In the scenarios they design, they sometimes become law enforcement personnel, sometimes they become an old friend of a family member. What they do best is build trust using the right information they’ve gathered about themselves.

baiting/fishing

It is one of the most used methods by cyber fraudsters. If a person you do not know asks for your Instagram account password, you will never give it. But you can’t say no to a password reset message from the Instagram company. The aim here is to make you believe that the incoming message is from the Instagram company. The target of cyber crooks is sometimes to seize the password of a social network account, and sometimes to obtain the password of the bank account for larger purposes. The victim’s bank account is always more attractive, although cyber attackers will not only get the password of the Instagram account and use that account to defraud every user defined in that account. In all kinds of unfair access attacks, baiting messages are sent to deceive the user and seize his password. The content of these messages varies according to the user’s interests, profession, age and many other distinguishing features.

Bank Fraud

One of the fraud incidents that we have encountered recently is the fraud incidents made with the aim of bank accounts. The purpose of this method is to capture the information that users log in to mobile electronic banking applications through baiting messages. After capturing the mobile banking application information, they use this information to transfer all the deposits in the target user’s account to their own account and immediately withdraw this money physically from ATMs. Since all these transactions are done in just a few hours, the targeted users experience a great financial loss when they realize the incident.

Solution

It is obvious that technology has not only benefits, but also aspects that are used by malicious people and harm internet users. The only way to avoid such harm is to increase technology literacy. If the increase in the use of technology is inevitable, it is equally imperative that every user in this field has sufficient knowledge. The result of momentary distraction can be financial losses that are very difficult to compensate or even irreparable. In order not to encounter such sad situations, it is a requirement of the information age we live in, to receive information literacy training as much as possible and to raise awareness about cybercrime. It is possible to benefit from online training given by professional cyber security experts to ensure personal internet and social network security. If you think your personal information has been compromised by cyber crooks, seek help from a cybersecurity expert immediately. Each lost minute will cause the lost values ​​to increase even more and it will not be possible to regain them.