Scams & Frauds Flashcards
Impersonation
Is first attempted remotely through ip spoofing
The next vectors use
Phones emails sms and im
The next level involves
Masquerading as a legitimate entity
The goal is typically
Theft of financials IP PII or PHI
Scams and fraud can
Elicit information and strengthen the reconnaissance of an advanced persistent threat or a long term campaign against an organization
Hoaxes can
Involve people masquerading as other people over the phone through email through texting and even in person
People can commit
Identity fraud, fake resumes, fake references and fake documentation
Impersonation pretending
Getting access to financial information on the finance department or the controller to do invoice scams
Credential harvesting
Gathering up usernames passwords