The phone call is the only thing criminals need to deceive their victims and even investigate identity theft, so the National Committee for the Protection and Defense of Financial Services Users (Condusef) warned of this fraudulent practice, Trolling.
The authority revealed through its social networks the characteristics of this fraud, which seeks to obtain financial and personal information. the term Phishing is divided by “voice”, which means voice, and phishing, which is a computer term It seeks to engage with people by pretending to be a person, company, or other service to lead them to disclose personal and confidential information.
Its main goal is information theft; However, it is also used for transplantation Malware, Any malicious program responsible for damaging the system without the knowledge of the user. In addition to the ability to reveal your identity and banking details.
“Be careful with calls or text messages sent to you by your bank!” Condusef wrote through his Twitter account.
How does phishing work?
* The perpetrator makes a phone call to his victim.
Impersonation as an employee of any bank.
* He argues that there are unnecessary fees on the personal account.
* If you fall in love with him, he will steal your confidential data.
In this sense, the committee called on residents to exercise caution in these types of situations and recommended the following:
* Do not provide financial information and contact the bank branch directly.
* No operator should request a personal identification card from its customers or verify the account by e-mail, text message, or over the phone.
For its part, a few days ago, a dangerous message began circulating that endangered people’s privacy and bank data via WhatsApp chains.
Based on phishing and through messages, a campaign process has been detected warning that it may be phishing.
According to some netizens, a message arrives via these chains that is supposed to be giving a gift to mark the 30th anniversary of Amazon.
It is important to note that it is a scam, because the e-commerce company they use to fulfill their mission in the first place is only 30 years old, since the company was founded on July 5, 1994.
How is deception done?
Users send the supposed anniversary chain to various contacts with a promise that they will receive a gift, but clicking on the link will bring up a wheel to choose the prize.
By spinning the wheel, the user is asked to download an app and keep it open for at least 30 seconds, which is the time that would be used to access data on the mobile device or implant a malware or Trojan horse.
According to specialized media, malware can damage mobile devices, both independently and in a network. They are used by hackers who, upon entering the computer, extract information from the citizen via e-mail or specific links.
A Trojan horse pretends to be an application that, unlike viruses, does not reproduce but can cause great harm, in addition to making it easier for malware to enter, which leads to confidential data theft.