Stay tuned! New Blow Tactic uses Google ads for fraud

Stay tuned! New Blow Tactic uses Google ads for fraud


In a new tactic, criminals pay to send and -mail false to the victims; Look how to recognize these shots

Experts have shown concern about a New tactic of IT crime used by scammers. In it, the criminals use the Google Ads To spread and -mail from phishing.




For those who don’t know, the phishing It is a computer crime in which the scammers cross reliable entities to deceive the victims. For this reason, in this case, they pay for the transmission and -mail, as if they were sponsored content, which increases their impression of legitimacy. Most of the time, the intention is to steal personal and bank data.

For the lawyer Francisco Gomes Junior, specialist in computer crimes and president of the Association for the defense of personal data and consumers (Addp), the severity of the situation is precisely in the use of reliable tools for illegal purposes.

“The use of legitimate platforms to spread fraud is extremely worrying. This gives the blows a credibility that confuses the user, making it difficult to identify the threat,” says the expert.

Understand more on the following topic:

How are the shots

To deceive the victims, the scammers usually, in e-mails, imitate communication from well-known companies, such as banks, shops or official bodies and use problems of fear or urgency. This urgency is what makes people more recited without thinking and finishing clicking on harmful connections.

“The messages that inform that the account will be canceled, that there are late slips or asking for registration updates are classic. The goal is to emotionally press the victim so that you don’t think twice before clicking,” he says.

Other topics are also common to attract users’ attention, such as false promotions, orders without reservations, judicial calls and even scandalous or sensational content with promises of shocking videos or gossip about betrayal. According to the lawyer, scammers know the most functioning emotional triggers and use them.

“They know how to manipulate. If it is not for the threat, it is out of curiosity or promise of advantage. So the blows continue to reinvent themselves,” says the lawyer.

How to recognize the blows

The scammers will always try to make it seem that the and -mail are true, using things like professional logos and look. So how to recognize the blows?

There are some signs that can help you in this. Francisco underlines that strange connections, Portuguese errors, low quality images or unusual attachments such as .exe files are still frequent and should illuminate the notice.

Another point of attention are false safety notices. In some cases, the user is induced to install extensions or download under the justification of “correcting errors” or “check threats”. “Legitimate browsers don’t ask you to download anything. Any warning that asks for this type of action that you should ignore immediately”, Francis Guide.

Finally, given the progress of these fraud, the expert strengthens that it is essential that users keep digital security practices. For example, it recommends activating authentication in two factors, avoid clicking on suspicious connections and -mail and keeping operating and antivirus systems updated.

Source: Terra

You may also like