Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • WhatsApp Scams in 2022: What to Look out for
  • Cyber Attacks
  • Data Breach
  • Malware

WhatsApp Scams in 2022: What to Look out for

3 years ago Tripwire Guest Authors
WhatsApp Scams in 2022: What to Look out for

WhatsApp is ranked as the most popular mobile messenger app in the world.  In fact, there are two billion active users on the app. This is an incredibly large audience. Unfortunately, it is also a huge number of potential victims for criminals to target. Cybercriminals are increasingly using WhatsApp as the medium for their attacks, and while people have become generally more wary of email phishing over the years, cybercriminals have adapted their tactics, implementing more sophisticated methods of phishing.  These tactics include an expansion into text messages, social media, and communication apps like WhatsApp.

Victims of certain WhatsApp scams are losing thousands of dollars to cybercriminals who deceive them into transferring money for a variety of reasons. The British Lloyds Bank reports a 2000% increase in WhatsApp scams in the past year. Other types of scams attempt to target users with malware or gain access to their accounts.

Dr. Jessica Barker, CEO of Cygenta, recently posted a video discussing prominent examples of WhatsApp scams in 2022, explaining how to avoid falling victim to them. Below is a summary of notable scams and how to avoid them.

Cybercriminals Impersonating Loved Ones

The first kind of scam that has been gaining in popularity this year is known as the “Mum and Dad scam,”
a form of impersonation fraud where a cybercriminal pretends to be a loved one in order to trick a relative into sending them money. Cybercriminals will contact WhatsApp users as a loved one, usually a child or sibling, saying that they have lost their phone and they are messaging from their new number. They will then convince their target that they are in financial trouble and ask for a cash transfer in order to help them pay a bill.

WhatsApp users fall victim to this scam due to the belief that their loved one is contacting them, and their desire to help. Some banks will block a transfer that the system recognizes as suspicious, stopping the target of the scam from sending the money. On the other hand, many targets of this scam have sent the money and been unable to get it back.

Two-Factor Authentication Scam

Another type of WhatsApp scam is called a “2FA (or two-factor authentication) scam.” In this kind of scam, a person will receive a verification or authentication code that they have not requested. This is closely followed by a message from a known contact saying that their code was sent to the wrong person by mistake, and requesting the code that was sent. In reality, the contact in question is somebody who has already fallen victim to the scam and whose account is compromised.

This scam works by a cybercriminal entering information that they can view from your contacts’ accounts, such as your name and number, and then requesting that a verification code be sent to complete the login. They prey on your instinctual trust of the contacts that you already know and recognize in order to obtain the code, which lets them access your account as well. Once successful, they will do the same to your contacts, compromising as many accounts as possible.

Fake Links and the Fear of Missing Out

An extremely versatile form of attack is one that is known by a variety of names, depending upon which iteration of the scam is taking place. Some notable examples are the WhatsApp Gold scam discussed in Dr. Jessica Barker’s video, the Alton Towers scam, the Heineken Father’s Day scam, and the Cadbury Easter Egg scam. The basic concept is to send a message that in one way or another persuades the recipient to click on an external link, usually taking them to a page that masquerades as an official website for a corporation or organization. These scams are often employed on WhatsApp, and through traditional text messaging, like the NHS COVID-19 scam.

This scam varies in both method and purpose. Some messages will promise free merchandise in order to trick consumers into clicking the link, as with the Alton Towers, Heineken, and Cadbury scams. Others will prey on people’s fears, such as the NHS scam, which made recipients think they had been exposed to the Omicron variant of COVID-19 and needed to visit the website to obtain a free test (which the NHS does not offer). Others still will play on the fear of missing out and offer experiences of prestige, like the WhatsApp Gold scam, which promises access to an elite version of the app that does not exist. In all cases, the goal is for the user to click a link in the message.

Some of these links lead to malware which can infect devices and disrupt their function. Others will ask for a payment of some kind, often a low sum which is allegedly paying shipping and handling for “free” items. Some will simply ask for information, such as a user’s address, phone number, or email. In all cases, cybercriminals are counting on you clicking the link in their initial message so they can implement the next phase of their attack.

How to Protect Yourself

The most important piece of advice when it comes to avoiding these scams on WhatsApp is to be wary of messages you receive. As Dr. Jessica Barker explains, these scam messages will often stick to a formula: they are unexpected communications, they make you feel something, and they ask you to do something. Barker, and other experts stress the importance of slowing down before taking action based on that initial emotional urge. Taking that into consideration, there are a few key things you can do to avoid falling victim.

First, it is important to ensure that anybody claiming to be a loved one is actually who they say they are. There are several ways to verify this, from calling them to asking them a question only they would know. Second, never share verification codes or two-factor authentication codes with anybody. Third, never click on unfamiliar links from unknown numbers.

As WhatsApp scams continue to threaten cybersecurity and target users with malware, phishing, and attempts to extort money, it is crucial to be on the lookout for the common markers. Messages claiming to be from loved ones, corporations, or government organizations should be scrutinized to verify authenticity before any action is taken. This vigilance will help you protect your accounts, your money, and your information from cybercriminals.


About the Author: PJ Bradley is a writer on a wide variety of topics, passionate about learning and helping people above all else. Holding a bachelor’s degree from Oakland University, PJ enjoys using a lifelong desire to understand how things work to write about subjects that inspire interest. Most of PJ’s free time is spent reading and writing.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” WhatsApp Scams in 2022: What to Look out for” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: COVID-19, Encryption, Finance, Low Severity, Medium Severity, Phishing, TripWire, Whatsapp

Continue Reading

Previous TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users’ Information
Next QNAP Warns of New DeadBolt Ransomware Attacks Exploiting Photo Station Flaw

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

2 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

6 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

11 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT