Email fraud

Source: Wikipedia, the free encyclopedia.

Email fraud (or email scam) is intentional deception for either personal gain or to damage another individual using email as the vehicle. Almost as soon as email became widely used, it began to be used as a means to defraud people, just as telephony and paper mail were used by previous generations.

Email fraud can take the form of a

confidence trick ("con game", "scam", etc.). Some confidence tricks tend to exploit the inherent greed and dishonesty of its victims. The prospect of a 'bargain' or 'something for nothing' can be very tempting. Email fraud, as with other "bunco schemes
", usually targets naive individuals who put their confidence in schemes to get rich quickly. These include 'too good to be true' investments or offers to sell popular items at 'impossibly low' prices.

Another form of email fraud is an

spear phishing
: 'phishing' involves sending thousands of emails claiming, for example, that an account has been compromised; 'spear phishing' typically involves a precisely crafted message to a single individual who is expecting a request to make a large payment to a legitimate payee.

Forms

Spoofing

Email sent from someone pretending to be someone else is known as spoofing. Spoofing may take place in a number of ways. Common to all of them is that the actual sender's name and the origin of the message are concealed or masked from the recipient. Many instances of email fraud use at least spoofing, and as most frauds are clearly criminal acts, criminals typically try to avoid easy traceability.

Phishing

Phishing is a type of

sensitive information to the attacker[1][2] or to deploy malicious software on the victim's infrastructure such as ransomware
. Some spoof messages purport to be from an existing company, perhaps one with which the intended victim already has a business relationship. The 'bait' in this instance may appear to be a message from "the fraud department" of, for example, the victim's bank, which asks the customer to: "confirm their information"; "log in to their account"; "create a new password", or similar requests. Instead of being directed to the website they trust, they are referred to an identical looking page with a different URL. After entering their log-in details, their username and password is visible to the perpetrators. In many cases, phishing emails can appear to be benign - for example, a message prompting the receiver that they have a new friend request on a social media platform. Regardless of how innocent the message is in itself, it will always lead the victim to an imitation web page and false log-in prompt.

In a study, researchers concluded that cognitive reflection and sensation-seeking tendencies are modest but significant predictors of susceptibility to phishing.[3] Additionally, participants who were pressured to make quick email legitimacy judgments made more errors.[3]

Bogus offers

Email solicitations to purchase goods or services may be instances of attempted fraud. The fraudulent offer typically features a popular item or service, at a drastically reduced price.

Items may be offered in advance of their actual availability. For instance, the latest video game may be offered prior to its release, but at a similar price to a normal sale. In this case, the "greed factor" is the desire to get something that nobody else has, and before everyone else can get it, rather than a reduction in price. Of course, the item is never delivered, as it was not a legitimate offer in the first place.

Such an offer may even be no more than a phishing attempt to obtain the victim's credit card information, with the intent of using the information to fraudulently obtain goods or services, paid for by the hapless victim, who may not know they were scammed until their credit card has been "used up."

Requests for help

The "request for help" type of email fraud takes this form: an email is sent requesting help in some way. However, a reward is included for this help, which acts as a "hook". The reward may be a large amount of money, a treasure, or some artifact of supposedly great value.

This type of scam has existed at least since the

mark
" (victim) that he is "allowed" to supply money, for which he should expect a generous reward when the prisoner returns. The confidence artist claims to have chosen the victim for their reputation for honesty.

Other

Avoiding email fraud

Due to the widespread use of

web bugs in email, simply opening an email can potentially alert the sender that the address to which the email is sent is a valid address. This can also happen when the mail is 'reported' as spam
, in some cases: if the email is forwarded for inspection, and opened, the sender will be notified in the same way as if the addressee opened it.

Email fraud may be avoided by:

  • Not responding to suspicious emails.
  • Keeping one's email address as secret as possible.
  • Using a
    spam filter
    .
  • Noticing the several spelling errors in the body of the "official looking" email.
  • Ignoring unsolicited emails of all types and deleting them.
  • Not clicking on links.
  • Not opening unexpected attachments, even if they appear to be from someone the user trusts. Many email fraudsters attach viruses or malware to emails.
  • Ignoring offers from unknown sources. The contents of an email are not a formal or binding agreement.

Many frauds go unreported to authorities, due to feelings of shame, guilt, or embarrassment.

See also

  • Mail and wire fraud – Federal crimes in the United States
  • Confidence trick
     – Attempt to defraud a person or group
  • Get-rich-quick schemes
     – Scam that promises high rates of return for a small investment
  • Internet fraud – Fraud or deception using the Internet
  • Email tracking – To check if an email has been read
  • Spy pixel – Hidden images to track viewing of emails

References

  1. S2CID 5472217
    .
  2. .
  3. ^ .
  4. ^ "New E-Scams & Warnings. FBI". Fbi.gov. Retrieved 2012-02-18.
  5. ^ "Hitman Bribe Scam". snopes.com. Retrieved 2012-02-18.
  6. ^ "Top 10 Phish Scams". McAfee. 2006-09-01. Retrieved 2006-09-01.
  7. ^ "Internet Crime Complaint Center's Scam Alerts". IC3.gov. 2012-10-23. Retrieved 2013-12-22.
  8. ^ "Internet Crime Complaint Center's (IC3) – Scam Alerts". ic3.gov. October 17, 2011. Retrieved October 26, 2011.