Market Navigator
Staying on top of the issues you care about most
Back to Market Navigator
YOU'VE ALREADY BEEN TARGETED BY CYBERCRIME

You can lose your life savings in a matter of moments without leaving your home. It’s just a fact of modern life in this internet-dependent world.
If you use email, browse the web, or visit a social media platform like Facebook, Instagram, or TikTok, to name a few, then you’ve probably been exposed to a cybercrime attack already. In fact, there’s probably a scam sitting in your inbox (or Junk folder) right now.
Because scammers tend to employ the same highly-effective strategies over and over, you can protect yourself by knowing what to look out for. So, here are some of the greatest “hits” in cybercriminals’ repertoire:
**HOW THE SCAM BEGINS**
The *“Tech Scam”* is one of the most common ways scammers exploit their victims. Here’s how they get to you:
* You’re browsing the web and click a link to a new webpage. But instantly your entire screen fills with an ominous message – sometimes accompanied by flashing graphics, sirens and a screen lock that won’t let you leave the page.
* The warning tells you that “Windows Defender” or “Microsoft Security” has detected a virus or illegal usage on your computer. You’re directed to immediately call a phone number for support that turns out to be the cybercriminals’ “call center.”
What follows is a carefully scripted con intended to part you with your money and steal your information.
The *Fake Subscription – or Purchase – Scam*
This scam occurs when you get an email thanking you for your expensive “subscription” to a real product – such as Apple Care, MacAfee, Dropbox, etc. Trouble is, you made no such purchase. Or, just like the fake subscription, you get an email showing a fake “invoice” for a transaction you didn’t make. Understandably, you want to cancel this transaction and get a refund, so you call the support line listed in the email. Often helpful at first, the “representative” starts the refund process. Except their actual purpose is to steal your money.
The *Phony Law Enforcement Scam*
This scam involves a the scammer who impersonates some real or fictional law enforcement agency, and convinces their victims that they have received a large sum of money illegally and they must reimburse the agency immediately to avoid criminal prosecution. (Or, in a similar scheme, a fake fine or other financial obligation has been imposed that must be immediately paid.)
It sounds outrageous, but it is surprisingly effective. The scammers know how to combine threat, a sense of urgency, and even abusive language to coerce their victims into compliance.

The *Spoofed Email and Website Link*
Probably the most common scam, this one is so effective because we conduct so much of our lives online these days, and scammers know it. They are incredibly effective at “spoofing” legitimate email accounts and websites to create counterfeit sites that look just like the genuine article. Unfortunately, if you respond to the fake email or click on the fake link, you open yourself up to cybercrime attacks.
**How They Get Your Money**
Once they’ve got you on the hook – using scare tactics, abusive language, emotional blackmail, urgency, misinformation and more – scammers move in for the kill:
* After telling you to download and install legitimate remote-access software, such as “AnyDesk” or “TeamViewer,” they gain access to your computer.
* Then, they will get you to log into your bank, credit card, or investment accounts while they watch.
* Next, without you realizing it, they take control of your computer and “fake” how your financial institution’s web site displays your account information. Note that they’re not actually altering the balance of your account, only how that web page temporarily displays on your computer.
* Typically, they’ll alter the web page for your account to show a deposit of thousands of dollars that has “accidentally” – or “illegally” -- been deposited to your account. They will tell you that they can’t reverse the deposit so you must take immediate action to rectify the situation.
* After threatening dire consequences for failure to comply, the scammer will instruct you to call or visit your financial institution to withdraw this large sum.
* Often, the scammers will insist on staying on the phone with you as you go into your bank or broker’s office so that they can coach you on what to say to your banker or advisor. They are well aware of the laws in place to protect consumers, so they will instruct you to lie about the purpose of the withdrawal.
Because scammers want a transaction that is untraceable and irreversible, they will often employ one of these tactics to get your cash into their hands:
* They may direct you to convert your money to cryptocurrency by feeding cash into a Bit Coin ATM and, after scanning the QR code they’ve sent you, transferring it to their digital wallet.
* If you already use Crypto, the scammer will send you a QR code or an alphanumeric string of text for a digital wallet where you’ll send your Crypto.
* Alternatively, they will instruct you to hand your cash over to a one of their collaborators – a so-called “mule” – who will then send the money to them.
* In another scheme, you will be directed to your local Target, WalMart, or grocery store where you’ll purchase gift cards that you will be instructed to mail to a post office box.
* Alternatively, you might be instructed to wire them the money via Western Union.
Whatever the scheme the scammers have employed, it is almost always money you’ve lost for good.
**Lasting Damage**
In addition to draining away your money, the scammers may exploit their access to your computer by installing malware or “trojans” to steal your financial and personal information, bank passwords, etc., for weeks, months, even years into the future.
* They may also harvest your contacts so that they may “spoof” an email purportedly from you, turning your contacts into their next victims.
* They might use the financial information they’ve gleaned from your computer to raid your accounts.
* With your stolen identity, they may be able to open new loans or lines of credit in your name.
Bottom line: They can destroy your financial security for years to come.