Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Protecting the New Most Vulnerable Population – The Grandparent Scam
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Protecting the New Most Vulnerable Population – The Grandparent Scam

5 years ago Bob Covello
Protecting the New Most Vulnerable Population – The Grandparent Scam

In Part 1 of this series, we introduced the concept that the most vulnerable people on the internet are our senior population. According to the FBI, elder fraud impacts millions of American seniors every year. Figures from the United Kingdom show similar levels of criminal activity targeting seniors.

Most of the elder fraud schemes are financially driven, targeting those who most likely have a secure and readily available source of income such as retirement accounts, pensions, and other forms of assets. While the seniors of today are much more computer savvy than those of yesteryear, that does not mean they are immune to fraud. One reason for this is that the scammers are becoming better versed in social engineering techniques, taking advantage of people by offering false goods or services.

Sometimes, the fraud is perpetrated through one of the strongest motivators—emotions, particularly, fear. This is the mode used in a very popular scam known as “The Grandparent Scam.” Is there a way to combat this? Yes, there is. But first, in case you are unfamiliar with this particular fraud, let’s review how it works.

The Mechanics of the Fraud

The grandparent scam begins when a parent or grandparent is contacted by someone impersonating the child, or grandchild, stating there is an emergency that requires money to fix. The fraudsters use convincing techniques such as a noisy phone line to obfuscate voice recognition by the victim as well as common social engineering techniques such as urgency or false premises like, “my parents will be so mad if they knew I was asking you for money.”

The victim of the crime is then asked to send money to an account to help the beleaguered child. (One has to wonder if the criminals have updated their tactics to use cryptocurrency. There are plenty of seniors who have begun to dabble in this area, so it is not unreasonable to assume that grandma has a digital currency account.) It should be noted that while this scam is not primarily carried out using a computer, it may easily be perpetrated via email or any number of common messaging apps through fraudulent means such as SIM swaps. 

Ways to Combat Grandparent Scams

The Federal Trade Commission (FTC) offers some good advice about ways to prevent this scam including resisting the urge to act immediately, sending gift card codes, or using obscure questions to verify that the caller is who they purport to be. These are good tips, but there may actually be an easier way to protect against this scam.

An Easier Technique

One of the tips offered by the FTC is to ask questions that a scammer would not be able to answer. However, in the heat of the moment, with a panicked “relative” in trouble, these types of questions would probably not come easily. That is the “engineering” part of social engineering at work, motivating the target to behave in a way that is not in their best interest.

Do you have a favorite photo that you would like to share with your relatives? Send them that photo, and be sure to point out a unique piece of jewelry or a particular color that you are wearing. Make it a caption or a meme or whatever will catch their attention. 

Advise your relatives to keep that photo on the refrigerator, mantle, or anywhere that they can easily look at it. Then, educate them about the grandparent scam and let them know that if you ever call and request money, they should simply ask, “what are you wearing?” If you cannot tell them whatever you have emphasized in that photo, advise them to hang up the phone or delete the email.

Not only is this method much more convenient than grandma needing to conjure up strange questions, recalling who your third-grade teacher was or who taught you how to swim; it lets you know that your smiling face is always present!

In part three of this series, we will look at an often overlooked method used by crooks to empty unsuspecting victims’ bank accounts in a slow and methodical scam.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Protecting the New Most Vulnerable Population – The Grandparent Scam” appeared first on TripWire

Source:TripWire – Bob Covello

Tags: Coronavirus, Finance, Goverment, Sim, TripWire, Vulnerability

Continue Reading

Previous A Look at a Zero Trust Strategy for the Remote Workforce
Next Why a CISO Needs To Speak The Language Of Business

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Vulnerabilities

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

43 mins ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

14 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

15 hours ago [email protected] (The Hacker News)
  • Vulnerabilities

Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks

18 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Malware

Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

22 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

24 hours ago [email protected] (The Hacker News)

Recent Posts

  • CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
  • Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits
  • TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
  • Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
  • AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT