A Plausible Domestic Hack To Beware Of

Local crime often used break-in or front door fake service and subsequent theft as methods to steal from your home – this still goes on but new hacking methods are now also used which can be far more effective for the criminals.

Here is a Hacking Example

The phone rings at home, you answer and the voice at the other end says that it is a particular service provider. They might say this is your water supplies, electricity or telecoms et al. The person phoning is from an overseas phone service centre and they tell you that there is a serious problem with your account as it has been hacked which is why they are phoning you to re-establish security and save you from theft or fraud. 

They give you the website address to log into the supplier’s website which sounds right and so you log on. They then take you through the process of checking your account and show you that it has been hacked and money stolen. They say they will secure this and return the money.

You are still not completely sure and ask for a name and that you will phone them back.

You then put the phone down and look through the web site and get a customer service phone number to call. The apparent service supplier answers your call and then you are put through to the named person you were speaking with earlier.

You feel secure as you have checked their website which looks fine and you begin to answer the questions about your account and then details about your bank account payments. They then ask more financial details and information about your bank account, passwords and details.

Now You have been Hacked.

This process is not unusual and has been going on for some time as many suppliers know but unfortunately most of us don’t realise the sophistication of these hackers.

Their phone calls sound and seem very professional, they are very customer engaged and civil and they get you to go to what seems like an official and legitimate website and then even after you have been uncertain and called back you are submerged into the hacking process.

Positive Outcome

If this has happened to you take charge of the call and phone back the service supplier but do not use the information that they send via your phone or web. Shut down the call and your computer and then restart and go to the supplier’s web site and get a phone number and start the process again and see if it was real or an attempted hack.

If this has happened to you contact your local police, ActionFraud and Crime Stoppers and if you would like more information. 

You Might Also Read:

Crime Has Become Cybercrime:

Police Can’t Reduce Cybecrime:

« Healthcare Organisations In The Cloud
Winter Olympics Targeted »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of Maryland (CAMI)

CAMI’s mission is to create a global cybersecurity marketplace in Maryland and generate thousands of high-pay jobs through the cybersecurity industry.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

Elemental Cyber Security

Elemental Cyber Security

Elemental is a game changing cyber security compliance automation and enforcement technology provider.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Qeros

Qeros

Qeros is a next-generation distributed system enables secure data and transaction processing at the velocity of thought.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

SixMap

SixMap

SixMap is a continuous threat exposure management platform that automatically provides comprehensive enterprise visibility, contextual threat intelligence, and a suite of remediation actions.