Your inbox and spam folder can provide a glimpse of scams and threats that put your Cyber Safety at risk.
Chances are, you’ll experience your share of phishing messages — the No. 1 threat to your Cyber Safety. Phishing messages are designed to trick you into providing personal information or engaging in dangerous behavior.
Norton Labs monitors online threats to help keep you Cyber Safe. That includes phishing emails and text messages. The team keeps a running report ranking the top phishing scams.
What happened: We crunched the numbers based on the past three months. These types of phishing attempts rose to the top.
Here are the top 3.
- Survey scams. Below is an example of an Amazon shopper survey phishing lure designed to collect personal information in exchange for unrealistic reward.
- Technical support scams. The Microsoft-themed tech support scam phishing lure example below capitalizes on the fear of not being protected against cybersecurity threats.
- Supplement scams. The example below is a too-good-to-be-true weight-loss-themed phishing lure, designed to capture credit card details
It’s worth noting that phishing attempts sometimes succeed because they prey on desires and fears.
Quote: “Scammers are masters in exploiting human emotions to put you into a state of panic,” says Marcel Feller, Principal Security Researcher at Norton Labs. “When you’re in that state, you’re more likely to comply with anything the scammer wants.”
What’s ahead: In the next three months, Norton Labs anticipates notable threats to security and privacy, including those tied to increased travel and leveraging pandemic themes.
- Phishing scams
- Ransomware attacks
- Supply chain attacks
The look back: Consumer Cyber Safety threats by the numbers
NortonLifeLock technology blocks more than 9 million threats on average every day. Here’s a closer look at the numbers over the past 100 days, according to the Norton Labs team.
Unseen threats: The other way we help you stay Cyber Safe
The Norton Labs team gathers more than just data. The team also investigates threats that exist outside the view of most consumers.
Like what? Here are three example of unseen threats, based on Norton Labs research. Learn how they work, and how you can avoid them.
- Encrypted chat marketplaces. Your mainstream app could take a dark-web turn.
- Online tracking and cookies. You know you’re being followed, but not like this.
- Gaming threats – vulnerable drivers. How gamers can lose their “edge” fast.
1. Encrypted chat marketplaces
More than 3 billion people worldwide use chat apps. Most of them make quick communication easy. Some of them can enable criminal activity. Here’s what we found.
Background: Telegram is a full-featured encrypted chat app popular around the world. It’s also possible to build bots on Telegram, which opens a world of possibilities, like accepting payments from other Telegram users or connecting people based on common interests or proximity.
How it works: Cybercriminals list a variety of illicit goods on Telegram. Here’s a partial list:
- COVID vaccines.
- Counterfeit luxury goods like purses and watches.
- DDoS (distributed denial of service) for hire.
- Stolen credit cards.
Buyers and sellers transact anonymously through Bitcoin.
Trust in the marketplace is created by having a reviewing mechanism — “rate our drugs 5 stars” — and escrow and dispute resolution services are included.
This is a leap forward for illegal marketplaces, which were previously relegated to the dark web. Now they’ve come onto the relatively open web to try to cultivate a new, and possibly younger, audience.
Advice for consumers: Avoid buying illegal goods anywhere on the internet, including on Telegram.
Learn more: Check out the paper “Encrypted chat apps doubling as illegal marketplaces.”
2. Online tracking and cookies
Cookies are small bits of code that track your activity online. Sounds simple, but there’s a lot more to it. Our research illuminated the “tracking ecosystem,” and it’s a lot bigger than you might think.
Background: Web-user tracking has fueled privacy concerns and legislative action. We looked under the hood of web pages and captured the entire life cycle of cookies, from their creation to all the operations they were later involved in.
Our analysis painted a detailed picture of the tracking ecosystem. We discovered an intricate network of connections between players that reciprocally exchange information and include each other’s content in web pages — sometimes without even the web page owners’ knowledge.
How it works: Our study collected fine-grained details of 138 million cookies. To investigate cookie lifecycles in-depth, we introduced the concepts of cookie trees, creation and sharing chains. This enabled us to capture the dependencies and relationships between entities.
We uncovered an astonishing number of organizations and relationships. Here are two examples:
- The analysis of cookie trees identified as many as 171,140 organizations that are involved in the creation and sharing of cookies. That’s 2-½ times more than generally understood.
- The analysis also identified 809,179 relationships, nearly 4-½ times more than generally understood.
Bottom line: The research underscores the ongoing concern about cookies and privacy issues.
Advice for consumers: It’s smart to consider the cookie ecosystem tracking data might be shared. The good news: Cookie trees and information flows offer a systematic way to better understand the tracking ecosystem. And that can lead to greater understanding of your online privacy.
Learn more: Read the full report “Journey to the center of the cookie ecosystem” or check out the blog post.
3. Threats in gaming – vulnerable drivers
Gaming is booming. So is cybercrime. It’s not surprising that cybercriminals are finding new ways to target gamers. That includes appealing to the competitive spirit of gamers who are willing to stretch the rules to beat opponents. Here’s what we found.
Background: Some gamers seek ways of getting an edge over other players, such as automatic aiming in first-person player-vs-player games. These advantages are known as cheats.
Some gamers also seek out software that lets them play games they haven’t paid for. These are known as cracks.
Installing cheats and cracks exposes users to enhanced threats that take advantage of their trusting nature and impulse to accept more risk for a presumed reward. That can lead to problems, and here’s why.
Games are complex software that include software that connects hardware to software, known as drivers. Vulnerabilities in drivers can lead to privileged access to a computer system. Some game drivers contained vulnerabilities and were patched by game creators. But older versions of these drivers persist on the internet.
How it works: Sites offer cheats and cracks that included vulnerable drivers. The sites offer detailed installation instructions, which include how to disable security software. That’s how they thwart mechanisms that prevent installation of these drivers.
Through trickery and psychology, cybercriminals “socially engineer” gamers into installing vulnerable drivers that are compromised by other software within cheats and cracks. In turn, that leads to compromise and infection of computer systems. And that could lead to stolen personal information as well as account take overs and loss of virtual goods.
Advice for consumers: Don’t disable your security software. It exists to protect against these types of threats. Also, take care to only install software from trusted sources.
Norton Labs continues to track scams and threats targeting consumers. Expect the pandemic theme to continue, but other world events will likely have an impact too.
Find out more when we publish our next Consumer Cyber Safety Pulse Report in October.
Innovations from Norton Labs are for research, evaluation, and consumer feedback purposes. NortonLifeLock does not give any warranties as to the suitability or usability of these prototypes and recommends safeguarding data and reviewing all terms and conditions before use.
Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries.
We encourage you to share your thoughts on your favorite social platform.