An inside look at how social media phishing scams work

… And how to avoid them

Fun fact about social media phishing scams — they tend to come in waves. Once companies like Meta see a pattern, they shut it down across the board. And that works, until the scammers figure out a new take on that game and it starts all over again.

We are seeing that wave again now — this page has been hit with five phishing attempts so far today. Obviously, these are mostly AI and bots now — anyone who takes the time to read the page would probably not waste the time. For one thing, it’s not going to work, for another, we always report them to Facebook.

Most social media phishing scams work on the same basic format — you get a fake warning that your account is suspended or going to be suspended.

We have illustrated exactly how this works below with an actual phishing attempt against one of our Facebook accounts.

And remember Rule No. 1: It’s always a scam (especially with these Facebook warnings … always).

And a quick reminder, never do what we did here, just ignore the phishing attempt. Interacting in any way, even reporting it to Meta, can put you on the scammer’s radar. We are professional scammer botherers.

Nobody Needs Another Login

Email and Text as a New (Old) UI

Why did we decide to build Safe Horizon with an experience that doesn’t require you to log in to a website or install another app? It’s simple: We wanted Safe Horizon to be as seamless and natural to use as possible. 

Today, people are bombarded with messages — texts, emails, notifications — many of which demand immediate action. Scammers know this all too well. They create a sense of urgency, pressuring you to act fast with messages that suggest some dire consequence if you don’t respond immediately. Unfortunately, when it comes to these scam messages, “doing something” is often the wrong move.

This is why we designed Safe Horizon to fit right into the tools you’re already using — email and text. If you receive a message that seems suspicious, you can instantly forward it to Safe Horizon without needing to switch devices, open a new app, or remember another login. By making it this easy, we give you a clear action to take right where you are, letting you feel proactive and protected without unnecessary steps.

The second reason we chose this approach? You already have enough logins to remember. Even people who use password managers still have to interact with those tools, filling out login details and navigating extra steps to access new sites or apps. Adding another login would only complicate things, creating one more barrier when the goal is to keep you safe in real time.

Lastly, thanks to the power of AI, Safe Horizon’s email and text-based UI doesn’t compromise functionality. The AI we’ve built can handle natural, straightforward interactions, so there’s no need to learn a new site or interface. Everything is designed to be as simple and accessible as possible, so you can get the guidance you need and get on with your day, fully protected.

SafeScan is Built Different: Why We Combine AI with Human Intelligence in Our Services

SafeScan is Built Different: Why We Combine AI with Human Intelligence in Our Services

The way we’ve developed Safe Horizon and our SafeScan technology cuts against the grain of current trends in tech. While many companies are rushing to replace tasks with AI, we’ve taken a different path: we’re focused on how AI and human intelligence can complement each other, producing results far better than either can achieve alone.

At its core, SafeScan is an AI-powered service designed to help users answer a critical question: “Is this email or text message legitimate or not?” Our users don’t care whether the response comes from AI or a human—they just want the answer to be right. And when it comes to scams, phishing, and fraud, 90% or even 95% accuracy simply isn’t good enough. That’s why we blend AI’s data-processing power with human intuition and decision-making.

AI is very effective at recognizing patterns and leveraging its vast training data. But it’s not perfect, especially when it encounters something outside of its prior knowledge or training. Humans may not have the same volume of data at their disposal, but they can ask questions, dig deeper, and catch subtle clues that AI might miss. When you combine these strengths, you get a system that’s truly greater than the sum of its parts.

Many companies rely on AI as a first line of defense in customer service, leaving complex cases to human agents only after the AI reaches its limits. We take a different approach: humans are involved from the start, guided by AI-generated insights, creating a seamless process where human and machine intelligence work together. The result? Better accuracy, more confidence, and ultimately, greater peace of mind for our users.

At SafeScan, we believe this approach isn’t just different — it’s better.

New Gmail Security Alert For 2.5 Billion Users As AI Hack Confirmed

October 13, 2024

Davey Winder – Senior Forbes Contributor

Davey Winder is a veteran cybersecurity writer, hacker and analyst.

Updated Oct 13, 2024, 11:33am EDT

Update, Oct. 13, 2024: This story, originally published Oct. 11, includes details of a new Google anti-scam alliance initiative, a new warning about legitimate-looking support scams and details of Google’s Advanced Protection Program to protect high-risk accounts.

Google has implemented increasingly sophisticated protections against those who would compromise your Gmail account—but hackers using AI-driven attacks are also evolving. According to Google’s own figures, there are currently more than 2.5 billion users of the Gmail service. No wonder, then, that it is such a target for hackers and scammers. Here’s what you need to know.

The Latest AI-Driven Gmail Attack Is Scary Good

Sam Mitrovic, a Microsoft solutions consultant, has issued a warning after almost falling victim to what is described as a “super realistic AI scam call” capable of tricking even the most experienced of users.

It all started a week before Mitrovic realized the sophistication of the attack that was targeting him. “I received a notification to approve a Gmail account recovery attempt,” Mitrovic recounts in a blog post warning other Gmail users of the threat in question. The need to confirm an account recovery, or a password reset, is a notorious phishing attack methodology intended to drive the user to a fake login portal where they need to enter their credentials to report the request as not initiated by them.

Unsurprisingly, then, Mitrovic wasn’t falling for this and ignored the notification that appeared to originate from the U.S. and a missed phone call, pertaining to be from Google in Sydney, Australia, some 40 minutes later. So far, so relatively straightforward and easy to avoid. Then, almost exactly a week later, the fun started in earnest—another notification request for account recovery approval followed by a telephone call 40 minutes later. This time, Mitrovic didn’t miss the call and instead picked up: an American voice, claiming to be from Google support, confirmed that there was suspicious activity on the Gmail account.

Forbes Daily: Join over 1 million Forbes Daily subscribers and get our best stories, exclusive reporting and essential analysis of the day’s news in your inbox every weekday.Sign Up

By signing up, you agree to receive this newsletter, other updates about Forbes and its affiliates’ offerings, our Terms of Service (including resolving disputes on an individual basis via arbitration), and you acknowledge our Privacy Statement. Forbes is protected by reCAPTCHA, and the Google Privacy Policy and Terms of Service apply.

“He asks if I’m traveling,” Mitrovic said, “when I said no, he asks if I logged in from Germany, to which I reply no.” All of this to engender trust in the caller and fear in the recipient. This is when things turned dark fast and really rather clever in the overall scheme of phishing things. The so-called Google support person informed Mitrovic that an attacker had accessed his Gmail account for the past 7 days, and had already downloaded account data. This rang alarm bells as Mitrovic recalled the recovery notification and missed call from a week earlier.

For full story, check it out on Forbes website.

FEMA warning about Hurricane Helene false information and scams

October 4, 2024

ATLANTA – North Carolinians should be aware that con artists and criminals may try to obtain money or steal personal information through fraud or identity theft after Tropical Storm Helene. In some cases, thieves try to apply for FEMA assistance using names, addresses and Social Security numbers they have stolen from people affected by the disaster.

If a FEMA inspector comes to your home and you did not submit a FEMA application, your information may have been used without your knowledge to create a FEMA application. If this happens, please inform the inspector that you did not apply for FEMA assistance so they can submit a request to stop further processing of the application.

If you did not apply for assistance but receive a letter from FEMA, please call the FEMA Helpline at 800-621-3362. The helpline will submit a request to stop further processing of that application.

If you do want to apply for FEMA assistance after stopping an application made in your name without your knowledge, the helpline will assist you in creating a new application.

Scams

FEMA Disaster Survivor Assistance (DSA) crews, housing inspectors and other officials will be working in areas impacted by Tropical Storm Helene. They carry official photo identification badges. FEMA representatives never charge applicants for disaster assistance, inspections or help in filling out applications. Their services are free.
Don’t believe anyone who promises a disaster grant in return for payment.

Don’t give your banking information to a person claiming to be a FEMA housing inspector. FEMA inspectors are never authorized to collect your personal financial information.

If you believe you are the victim of a scam, report it immediately to your local police or sheriff’s department or contact North Carolina Attorney General’s Office at 877-566-7226 or visit ncdoj.gov/protecting-consumers/.

If you have knowledge of fraud, waste or abuse, you can report these tips – 24 hours a day, seven days a week – to the FEMA Disaster Fraud Hotline at 866-720-5721. You can also email StopFEMAFraud@fema.dhs.gov to report a tip.

For the latest information about North Carolina Tropical Storm Helene recovery, visit fema.gov/disaster/4827. Follow FEMA on X at x.com/femaregion4 or on Facebook at facebook.com/fema.

New Google Chrome Warning—You Must Never Copy And Paste This Text

From Forbes

A technically complicated warning for Google Chrome users has just been issued, but thankfully it’s one with a stupidly simple instruction that you must follow to avoid being attacked.

The warning comes courtesy of Proofpoint, which says it has “observed an increase in a technique leveraging unique social engineering that directs users to copy and paste malicious PowerShell scripts to infect their computers with malware.”

The research team suggests multiple treat actors have been using the technique, delivering various forms of malware in the process. It’s easy to spot, though, and so once aware users should find it very easy to prevent an infection. These are actually instructions you should be following anyway.

For the complete story, check it out on Forbes.com

New Google Chrome Warning—You Must Never Copy And Paste This Text

From Forbes

A technically complicated warning for Google Chrome users has just been issued, but thankfully it’s one with a stupidly simple instruction that you must follow to avoid being attacked.

The warning comes courtesy of Proofpoint, which says it has “observed an increase in a technique leveraging unique social engineering that directs users to copy and paste malicious PowerShell scripts to infect their computers with malware.”

The research team suggests multiple treat actors have been using the technique, delivering various forms of malware in the process. It’s easy to spot, though, and so once aware users should find it very easy to prevent an infection. These are actually instructions you should be following anyway.

For the complete story, check it out on Forbes.com

How to Spot and Report Mail Scams

From the Texas Attorney General

Learn how to recognize mail scams, file a complaint when appropriate and protect your personal and financial information.

Consumers’ mailboxes are regularly stuffed with unsolicited mail. Most of it is harmless but pesky junk mail offers – but there is a risk it could be a mail scam. 

How to Spot a Mail Scam

Mail scammers will try to get your attention in various ways – ranging from exciting offers to intimidating threats. Regardless of their message, the goal of a mail scam is to get you to either send money or provide your personal information. 

Below are common warning signs of a mail scam: 

  • A claim that you have been specially selected
  • A request that you “confirm your personal information”
  • A request for payment by means other than credit card – including cash, gift card, wire transfer or private courier 
  • Use of suspicious official-looking documents or fake government seals
  • A request for your credit card or other payment mechanism for “shipping and handling”
  • Use of threats if you don’t comply – even the threat of arrest 

If you recognize any of these warning signs, stop reading and do your homework. If you suspect it is a scam, file a complaint with the Office of the Attorney General. 

Learn more about tactics used by all scammers on our How to Spot and Avoid Common Scams page.

Although not all junk mail is a scam, you can be proactive about decreasing junk mail in order to reduce your risk of being scammed. 

Remove Your Name from Mailing Lists

To help reduce the amount of junk mail you receive, you can remove yourself from some mailing lists. To do so, register with the Direct Marketing Association’s Mail Preference Service. There is a processing fee of $5 to remove yourself for a period of five years.

Opt-Out of Credit Offers

You can also limit the number of pre-approved credit offers you receive by removing your name from the marketing lists of consumer credit reporting companies. Visit OptOutPreScreen.com to learn more on  how to request to opt-out of offers of credit or insurance. You have the choice of opting out of receiving offers for five years or opting out of receiving them permanently. 

Contact Your Credit Card Company and Bank

If any of your credit card companies send random-issue convenience checks, request in writing to be removed from that mailing list. 

Contact your bank about its privacy and information policies. If they provide your account information to third parties, you maybe able to request to opt-out of this practice.

How to Recognize and Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal and financial information. But there are several ways to protect yourself.

How To Recognize Phishing

Scammers use email or text messages to try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could get access to your email, bank, or other accounts. Or they could sell your information to other scammers. Scammers launch thousands of phishing attacks like these every day — and they’re often successful.

Scammers often update their tactics to keep up with the latest news or trends, but here are some common tactics used in phishing emails or text messages:

Phishing emails and text messages often tell a story to trick you into clicking on a link or opening an attachment. You might get an unexpected email or text message that looks like it’s from a company you know or trust, like a bank or a credit card or utility company. Or maybe it’s from an online payment website or app. The message could be from a scammer, who might

  • say they’ve noticed some suspicious activity or log-in attempts — they haven’t
  • claim there’s a problem with your account or your payment information — there isn’t
  • say you need to confirm some personal or financial information — you don’t
  • include an invoice you don’t recognize — it’s fake
  • want you to click on a link to make a payment — but the link has malware
  • say you’re eligible to register for a government refund — it’s a scam
  • offer a coupon for free stuff — it’s not real

Here’s a real-world example of a phishing email:

Imagine you saw this in your inbox. At first glance, this email looks real, but it’s not. Scammers who send emails like this one are hoping you won’t notice it’s a fake.

Here are signs that this email is a scam, even though it looks like it comes from a company you know — and even uses the company’s logo in the header:

  • The email has a generic greeting.
  • The email says your account is on hold because of a billing problem.
  • The email invites you to click on a link to update your payment details.

While real companies might communicate with you by email, legitimate companies won’t email or text with a link to update your payment information. Phishing emails can often have real consequences for people who give scammers their information, including identity theft. And they might harm the reputation of the companies they’re spoofing.

For more, visit the Federal Trade Commission Consumer Advice website

Learn the Warning Signs of ‘Military Scams’

9 minute read • Jan. 23, 2024 – Military One Source

Your military friend or family member serves our country with integrity and honor. Unfortunately, there are scammers out there who try to take advantage of that service to cheat them and you. You can help protect your service member against military scams by learning the warning signs of schemes that target those in the military community.

Rental Property Scams

These scams target military personnel looking for housing near a base. Scammers pretend to be real estate agents and post fake ads for rental properties on websites, sometimes promising military discounts and other incentives. They try to get service members to send them money for fees and deposits upfront – and the victim ends up with no money and no place to live.

If someone insists on receiving money or other payments before a property has been seen, it is probably a rental scam.

DFAS/MyPay Phishing Scams

These schemes try to steal a service member’s identity by getting Social Security numbers, bank accounts and other personal information. The scammer pretends to be from the Defense Finance and Accounting Service or another military group and contacts members or their spouses by phone, email or text. They may claim that due to computer problems, your information was lost and needs to be reentered to process payments. In other cases, their emails contain links or attachments that can put malware on computers to steal passwords and account information.

Your service member should never give personal information on the phone – or click on links in emails – from someone they don’t know. Also, DFAS and other military organizations never ask for personal financial information, account numbers or passwords.

Get Connected to Military Life: Official eNewsletter

Keep in touch with the cadence of military life, understand its rich traditions and learn ways to support your service member with the Friends & Family Connection eNewsletter.

Payday Loans

Is your friend or family member having trouble making ends meet? If they are considering getting a short-term payday loan to tide them over, they may be setting themselves up for long-term financial trouble.

“Short-term,” “personal” or “payday” loans are unsecured loans for small amounts – generally $500 or less – that charge big interest rates and fees. (A typical two-week payday loan charging $15 per $100 borrowed equals an annual percentage rate of almost 400%.) Many payday loan companies operate online and advertise “fast cash” and “no credit required.”

Active-duty service members are protected from payday loans by the Military Lending Act, which keeps lenders from gouging military personnel with high interest rates and fees. 

For the rest of the story, visit www.militaryonesource.mil