A Plausible Domestic Hack To Beware Of

Local crime often used break-in or front door fake service and subsequent theft as methods to steal from your home – this still goes on but new hacking methods are now also used which can be far more effective for the criminals.

Here is a Hacking Example

The phone rings at home, you answer and the voice at the other end says that it is a particular service provider. They might say this is your water supplies, electricity or telecoms et al. The person phoning is from an overseas phone service centre and they tell you that there is a serious problem with your account as it has been hacked which is why they are phoning you to re-establish security and save you from theft or fraud. 

They give you the website address to log into the supplier’s website which sounds right and so you log on. They then take you through the process of checking your account and show you that it has been hacked and money stolen. They say they will secure this and return the money.

You are still not completely sure and ask for a name and that you will phone them back.

You then put the phone down and look through the web site and get a customer service phone number to call. The apparent service supplier answers your call and then you are put through to the named person you were speaking with earlier.

You feel secure as you have checked their website which looks fine and you begin to answer the questions about your account and then details about your bank account payments. They then ask more financial details and information about your bank account, passwords and details.

Now You have been Hacked.

This process is not unusual and has been going on for some time as many suppliers know but unfortunately most of us don’t realise the sophistication of these hackers.

Their phone calls sound and seem very professional, they are very customer engaged and civil and they get you to go to what seems like an official and legitimate website and then even after you have been uncertain and called back you are submerged into the hacking process.

Positive Outcome

If this has happened to you take charge of the call and phone back the service supplier but do not use the information that they send via your phone or web. Shut down the call and your computer and then restart and go to the supplier’s web site and get a phone number and start the process again and see if it was real or an attempted hack.

If this has happened to you contact your local police, ActionFraud and Crime Stoppers and if you would like more information. 

You Might Also Read:

Crime Has Become Cybercrime:

Police Can’t Reduce Cybecrime:

« Healthcare Organisations In The Cloud
Winter Olympics Targeted »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.