#TRUTH FOR ANGELO VASSALLO
#TRUTH FOR ANGELO VASSALLO
LAST UPDATED: March 17, 2025 - 21:20
12 C
Napoli

Elderly Scam: Fake Policemen and Postmen Arrested in Naples

facebook

ON THE SAME TOPIC

Naples.

At least 40 people were scammed by three men who, posing as postal agents and workers, stole their savings.

ADVERTISING

The scam started with an SMS with a fake account access alert. By clicking on the link, victims were redirected to a fake site where they entered their data.

Subsequently, the scammers, with sophisticated techniques of ““, they contacted the victims pretending to be operators of Poste Italiane or the Postal Police, inducing them to transfer money to new current accounts.

The investigations of the Postal Police of Genoa and led to the arrest of two of the three perpetrators and the seizure of large sums of money.

Phishing and Spoofing: Social Engineering at the Service of Cybercrime

The scam carried out by the criminal gang is a classic example of how cybercrime uses social engineering to deceive victims.

The phase of It all starts with sending Deceptive SMS, apparently from Poste Italiane, warning of an anomalous access to the current account. The link in the message leads to a fake website, artfully created to resemble the online portal of Poste Italiane.

Once connected, victims are invited to enter their login credentials, believing that they are acting in complete safety. In reality, the data entered is intercepted by criminals and stored for later use.

Spoofing: the illusion of legitimacy: At this point the spoofing technique comes into play. The scammers, in possession of the victims' data, make phone calls using software that allows them to modify the number displayed on the receiving phone's display. In this way, the number that appears on the victim's phone is the official number of the Postal Police or another trusted entity.

Social engineering: psychological manipulation: Using skillful persuasion techniques, criminals reassure victims of the legitimacy of the request, instilling in them a sense of urgency and fear.

Scammers often pose as trained operators who can provide technical assistance and resolve the issue of unauthorized access. To increase credibility, they may request additional information, such as your social security number or credit card number.

The consequences of the scam

Once they have access credentials and personal information from victims, criminals can:

Emptying the bank accounts: Make money transfers or withdrawals.
Subtract the identity: Use the stolen data to open new bank accounts, apply for loans, or perform other fraudulent activities.
Spreading malware: Infecting victims' devices with malicious software, in order to collect further sensitive data or remotely control computer systems.

How to defend yourself

To protect yourself from this type of scam, it is essential to follow some simple precautions:

Don't click on suspicious links: Avoid opening links contained in SMS or emails from unknown senders.
Verify the caller's identity: Never give out personal or financial information to anyone who calls you without first contacting them.
Contact the credit institution directly: If you have any concerns about the security of your account, please contact your bank or post office directly using official channels.
Install antivirus and antimalware software: Keep operating systems and installed programs up to date.
To be wary: Don't blindly trust communications that arouse anxiety or urgency.

 


Article published on 2 August 2024 - 08:59


LEAVE A COMMENT

Please enter your comment!
Please enter your name here

BREAKING NEWS

FROM HOME

FEATURED

THE VIDEO STORIES


Chronicles It's loading