The types of fraud

Internet attracts many swindlers who see the global Network as an expedient tool to make money. At that, their earnings are built upon an excess trust on the part of the Internet-user. The types of such fraud are extremely diversified: starting form commonplace ones, tailored for inexperienced users, up to quite devious ones, the victims of which may happened to be people rather adroit in Internet-practice.

On this page, we have gathered the most widespread types of Internet-fraud. Hopefully, this information will allow our clients to recognise the fraud in the Network in a timely manner and not lose their money.

If you are a victim
Scam:

Write to us
911@mts.com.ua

or contact by
contact number
111

What is the protection against swindlers on Internet

You know that it is not possible to be absolutely safe on the Network, and there is no absolute protection from network threats. However, there are reliable ways to considerably decrease the level of threats.
How to discern a true advertisement from a fraudulent one?

Be careful and on alert

Protected Internet-connection. Never communicate your confidential information to anybody without getting sure beforehand that you are on a safe and verified site. Remember: such sites make requests exclusively according to a security protocol Secure Sockets Layer (SSL). This large cryptographic protocol is easy to detect by an outer characteristics: when there is “http://” instead of the usual “https://”in the browser’s location bar on the personal page, the site functions according SSL protocol. In order to verify the authenticity of the safety certificate, click the sign of a lock next to https:// symbols.

Use special purpose programmes

Anti-virus, anti-spam, firewall. Install anti-virus and firewall on your computer (a network-level firewall). Besides, use an anti-fishing option supported with all contemporary browsers and an anti-spam function built-in the modern mail clients.

Do not trust unknown contacts

Attachments and links in letters and documents. Do not open attachments in e-mail letters and messages from unknown addresses (it is entirely possible that an innocent at the first glance document may appear to be a virus or Trojan in “disguise”), and do not follow hyper-links calling for a review of a video tape or just look at a photo.

Observe the financial discipline

Bank cards for settlements via Internet. While making settlements on network resources with a bank card, keep the exact amount you may need for a concrete purchase on the card, and transfer it as soon as possible. Get a separate electronic address for registration in social network, and another one you are to use for on-line shopping.

Making money on the Network

Announcements on lavish salaries and advantageous vacancies threaten to turn for you to be considerable expenses, while an advertisement of an immediate income leads to a loss of money.
How to detect that you are offered to share your own finances with swindlers instead of a real job?

What way you can get extra problems

A remote work. You receive an e-mail letter offering a remote work (for instance, typing, sealing of envelops, processing of correspondence etc.) generously paid for. At that, the letter may even contain contacts and telephone numbers. If you call to the given number or reply a letter, you will finds out that you have to contribute some amount as a proof of your serious intentions/collateral for the materials/a registration fee and other. Having received your money, the “employer” disappears, or sends you an instruction on the further work: to give out the like announcements and sent those who replied the chargeable “materials.”

How to spend money on fraud

Electronic currency exchange. It is asserted that one can make money on exchange adjustments on network exchange offices (a link in the letter will surely be indicated). In order to make an exchange, the currency must be purchased on the given site and then exchanged into the other currency at a beneficial rate. Naturally, the money you spent on currency purchase will be clean gone.

How to get psychic income

Software is an income generator. For a certain reasonable payment, you are offered to purchase software which would earn money for you on its own. As a rule, the mechanism of such software functioning is a follow up the links on sites (often of a doubtful nature and infected with various viruses). Availability of such a window-informer in the interface of a software with an amount exceeding your income and continuing to shoot up, is called for assure that the software is actually earning money for you. When the income reaches the threshold (for instance, 200 dollars), the software just stops functioning through some kind of a “system error”, and it is impossible to re-start it up.
Another version of the like software is a free version. It also imitates functioning. Besides, it infects your computer with a virus or Trojan, or plunders you of your log-ins and passwords to various Internet-services, including the banking ones (most frequently, such software promise automatic earnings for review of advertisement; all possible “WebMoney generators” and “bonuses auto-collectors” belong here, too).

How to respect the Criminal Code

“Hackers” of payments systems. You are offered to install on your computer a “WebMoney hacker” or a “Jandex.Money hacker.” Supposedly, with the help of such software, you may get an access to other people’s accounts and transfer money from their account into your account. First, the use of the like software is a crime, second, you are going either to lose the money you spent on purchase of the software, or infect your computer with viruses.

How to feel a simpleton

Instructions on businesses (business-package). You are offered to purchase (sometimes even “at discount”) a wonder-instructions on creating a profitable business and “enter into the on-line commercial world.” The offer would be surely accompanied with positive feedback and pictures of those having attained success thanks to usage of these instructions (actually, these would be just photos from the Network). Besides, in order to multiply the effect, extra free bonuses may be offered as well: books, software and other.
In real situation, the wonder-instructions are usually the Instructions on creating a personal site for sale of business-packages.

How to allow others to make money

On-line casinos. You receive a letter maintaining that there has been an error found out in the software of such and such on-line casino. This error allegedly allows a guaranteed roulette gain and other gambling games. This is but an advertising trick: either the owner of a casino is attracting clients to his site in such a way, or some of his partners having placed in the message text his partner’s link plans to get interests on betting, winning and even losing after registration of clients in the casino.

How not to allow interests to dish you

Highly profitable investment software. You are offered to make an investment at grandiose interest of 50%, 100% and even higher. At that, the investment company site reeks with various schemes, world brands’ and banks’ logos, abounds with terminology etc.
Should you succumb to the advertisement and invest your money:

  • all contacts are sharply disrupted;
  • You receive the invested sum along with interest, invest once again a larger amount this time, and lose everything;
  • you regularly return your investments, make new ones, obtain the statistics on the accruals until you decide to withdraw money from your account. In such a case, they would either give you a silent treatment, or inform you on that the company went bankrupt as a result of a bad deal, for instance.

How not allow discounts to ruin you

Offer to buy seized property. You may come across a site offering you to purchase modern models of mobiles phones, electronics, or home appliances at prices times lower than the selling prices. Allegedly, all the goods come from the customs where it has been seized for failure to pay the duty, or confiscated and so on. At that, any purchase on such site would be possible only on a pre-paid basis (through a cash transfer or banking card). As a rule, after the money has come from a couple of “customers,” the site disappears.

Fishing and other methods of social engineering

Unfortunately, the contemporary human technologies serve not only the benevolent intentions. Swindlers willingly resort to such technologies in order to allure ever new victims.
How to recognise that you are being “programmed”?

How to keep a bank secret

Fishing. You receive an e-mail letter allegedly from your bank or administration (security service) of a payment system with a request to provide you’re your accounts, passwords and so on. At that, the link in the message connects you with a counterfeit site which gathers users’ personal data. Remember: banks and payment systems do not request the like data from their clients!
One can also rather frequently come across electronic “copies” of well-known Internet-stores and banks on the Network (these will have the like addresses, for instance, amason.com instead of amazon.com). Pay attention to the correctly entered address into the browser’s location bar.

How to recognise a counterfeit SMS

SMiShing. An SMS to your mobile phone has a link to a fishing site. At that, as a rule, the SMS is claimed to a message from a bank that, “for security purposes,” asks you to confirm payment requisites. DO not get ensnared with the trick: none of the banks would address a client with the like request.

How to discern a false site

Farming. At attempt to enter a site of a bank or Internet-store, you are automatically re-forwarded to a counterfeit site. This usually happens when the computer is infected with a virus. Pay close attention to the correctness of the bank’s address or Internet-store in the location bar of the browser.

How not to part with money

Fraud in social network. In social network, swindlers extensively use the whole arsenal of tricks: starting with the direct hacking of accounts up to mailing out letters on “blocking” of personal profiles in the case if the use does not confirm the identity and send an SMS to the indicated number. “Subscriptions” enjoy a special popularity with swindlers: a person claims to be a classmate of a whole group of users of one or another social network, announces on the intention of a meeting, gathers finances for its organization, and disappears along with the money.

How to play a “pyramid”

Payment systems “magical wallets.” On discussion boards, one can often see messages from “sacked software programmers” sharing with other Internet-users the secrets to “test” wallets for developers/employees cellular network and “respond” to an incoming payment with money transfer in the twice large amount. Naturally, there is no “doubling” of the amounts on your account: you would just lose the transferred money.
Another version of the like fraud is a “pyramid” known as “6 wallets”: you are just asked to contribute, for instance, 1 dollar to 6 electronic wallets, register your wallet in the system and mail out offers to make the same operation to your friends and acquaintances. There is even special software for “automation” of this and the like network “pyramids.”

How to correctly dial an address

Carding. A version of fishing with the aim to obtain the data on your banking card and spend the money placed on it. The easiest way of carding is establishing a counterfeit Internet-store which does not actually sell anything but gathers the data by cards. Pay close attention to the correctness of the bank’s address or Internet-store in location bar of the browser.

How to make friends without losses

Dating sites. A person you met on such a site asks you to place on his/her mobile account an inconsiderable amount of money. The money having been transferred, your new friend disappears in the thin air.

How to maintain the personal data

Vishing(“voice fishing”). You receive an SMS or an e-mail letter with a request to make a call to a certain landline phone number. When calling to this number, you are read a voice message and asked to give your confidential data (card number, passwords, PIN-code, access code or other personal information). Should you do so, your personal information will get to swindlers.

E-mail

Sadly, E-mail today is the most widespread tool for Internet-fraud and spam. So, suppose you received an e-mail letter.
What dangers may there be lurking in wait?

How to win a lottery and get a virus

Prize notifications. You receive an e-mail letter, usually, in English, or in Russian with an evident computed-translation. They say in the letter that you have won a lot of money, or a car in a lottery with some loud name. In order to get the prize, you should disclose some information about yourself (your name, surname, address, and other). If you do give an answer such a letter, your mail box will at best be subjected to a massive spam-attack. In the worst case scenario, when the notification on the prize is attached some document and you have opened it, your computer will near definitely be infected with a virus or Trojan.

How not “to get rich” in viruses

Counterfeit paying documents. There is a letter to your e-mail address with the like content: “Dear……..! As it was previously negotiated, I have sent 230 000 roubles to your account. Find attached the copy of the payment document ….” The attached document is all too often contains a virus.

How to recognise “a luck chain letter”

“Nigerian scams.” You receive an e-mail letter, usually, in English, or in Russian with an evident computed-translation. Typically, this would be a letter from a person who ran away from some “flash point” (Somali, Iraq, Libya etc.). They ask you in the letter to help drive out a multi-million amount promising a heavy interest. As soon as you answer such a letter, they start to get money out of you allegedly for legal expenses, bribes, etc.

How not to allow lawyers to ruin yourself

Notification of inheritance. You receive an e-mail letter from an employee with a large bank, barrister or even state employee who has recently found out that a very rich man died. Surprisingly enough, but the deceased had the same family name as you have! The author of the letter suggests his services in getting the money from a bank account of that person. Further developments will happen according to the same scheme, that is, your communication will boil down to getting money out of you.

How to win a lottery and lose your money

Notifications on prizes. You receive an e-mail letter notifying on winning of a money prize and so on. In order to gat the prize, you are asked to send a SMS to a short number or transfer a certain amount (usually in dollars or Euros) to execute the money transfer, activate an account or transmission of the prize. Be sure you will not see any prize, as well as you will not be able to return the transferred money.

What is the right way to keep secrets?

Notifications on blocking. E-mail letters on a prompt blocking of an account on a free mail service or in social network, blocking of a bank card and so on. In order to prevent blockings, you are suggested to confirm your passport data in the follow-up letter inform on the login/password of your mailbox or account in the social network, or data of your bank card. It goes without saying that these data, should you give it out, will get at swindlers’ disposal.

Safety measures

Safety measures

Viruses and anti-viruses

If your computer is blocked with a virus, do not send an SMS to the indicated short number, nor recharge the personal account of the indicated telephone through a terminal – this is fraud. Use Antivirus software to delete the virus.

Software from trusted manufacturers

Use solely licensed software (SW) from the well-known manufacturers. Load software only from official sites of the manufacturers, do not use key generators for software registration, and do not trust "doubtful" manufacturers of software products (for instance, when there is no contact information provided on a site). Do not download software requiring in a mandatory manner file lockers/content-providers in order to get an access to their resources. Remember: the features of a standard browser should be sufficient for a review/downloading of a content and authorisation of users.