Since last year, scammers have been taking advantage of disruption in deliveries to convince users to open phishing links. This past quarter, not only has this trend continued, but the cybercriminals have become more adept at localising their spam mailings. Users experienced a surge in invoices in different languages asking money related to anything from customs duties to shipment costs. With these mailings, victims are often taken to a fake website, where they risk not only losing money but also sharing bank card details.
Examples of fraudulent delivery emails
Cybercriminals also launched websites that appeared to offer people the chance to buy parcels that could not reach the intended recipients. Such websites were set up like a lottery. Users were not aware of the contents of the package. They bid based on the weight of the package that—if they “won”—never arrived, even after paying the winning bid.
Another new trick from fraudsters this past quarter involved spam sent to WhatsApp requesting small amounts of money. These scams involved several different schemes. One asked that users take a survey about WhatsApp and send messages to several contacts to receive a prize. Another stated that the users already won a large prize—all they needed to do to collect it is pay a small fee.
WhatsApp chat scam
“As in the past, we’re seeing attackers take advantage of new trends and disruptions to steal money and credentials, whether that’s a growing user of messengers or continued problem with mail delivery amidst a pandemic. Spam and phishing schemes are still some of the most effective ways to launch successful attacks because they play on human emotion. The best thing users can do is be wary of any unexpected emails and be very careful about clicking on any email attachments or links—go to the website directly,” comments Tatyana Shcherbakova, Senior Web Content Analyst at Kaspersky.
To avoid falling victim to the aforementioned scams, Kaspersky experts recommend:
Learn more about spam and phishing in Q2 2021 on Securelist.