A Plausible Domestic Hack To Beware Of

Local crime often used break-in or front door fake service and subsequent theft as methods to steal from your home – this still goes on but new hacking methods are now also used which can be far more effective for the criminals.

Here is a Hacking Example

The phone rings at home, you answer and the voice at the other end says that it is a particular service provider. They might say this is your water supplies, electricity or telecoms et al. The person phoning is from an overseas phone service centre and they tell you that there is a serious problem with your account as it has been hacked which is why they are phoning you to re-establish security and save you from theft or fraud. 

They give you the website address to log into the supplier’s website which sounds right and so you log on. They then take you through the process of checking your account and show you that it has been hacked and money stolen. They say they will secure this and return the money.

You are still not completely sure and ask for a name and that you will phone them back.

You then put the phone down and look through the web site and get a customer service phone number to call. The apparent service supplier answers your call and then you are put through to the named person you were speaking with earlier.

You feel secure as you have checked their website which looks fine and you begin to answer the questions about your account and then details about your bank account payments. They then ask more financial details and information about your bank account, passwords and details.

Now You have been Hacked.

This process is not unusual and has been going on for some time as many suppliers know but unfortunately most of us don’t realise the sophistication of these hackers.

Their phone calls sound and seem very professional, they are very customer engaged and civil and they get you to go to what seems like an official and legitimate website and then even after you have been uncertain and called back you are submerged into the hacking process.

Positive Outcome

If this has happened to you take charge of the call and phone back the service supplier but do not use the information that they send via your phone or web. Shut down the call and your computer and then restart and go to the supplier’s web site and get a phone number and start the process again and see if it was real or an attempted hack.

If this has happened to you contact your local police, ActionFraud and Crime Stoppers and if you would like more information. 

You Might Also Read:

Crime Has Become Cybercrime:

Police Can’t Reduce Cybecrime:

« Healthcare Organisations In The Cloud
Winter Olympics Targeted »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ITrust

ITrust

French cybersecurity pure player since 2007. ITrust offers its Cyber expertise services and develops disruptive products in Cyber/Artificial Intelligence.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

CyberArts

CyberArts

CyberArts is founded on the belief that every single organization deserves and requires the creme de la creme when there is a need for Cyber services.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Department of Justice - Office of Cybercrime (DOJ-OOC)

Department of Justice - Office of Cybercrime (DOJ-OOC)

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

CPP Group UK

CPP Group UK

CPP Group UK develops products to help insurers add further value to their products and services through its innovative suite of new products in FinTech, InsurTech and cyber security.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

Google Cloud

Google Cloud

Accelerate your digital transformation. Whether your business is early in its journey or well on its way to digital transformation, Google Cloud can help solve your toughest challenges.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.