Online Scam: Where do fraudsters get your name, number and other details? Know here!
As cases of online fraud continue to rise, scammers adopt various tactics to target unsuspecting individuals, ranging from sextortion to work-from-home scams. In some scams, scammers pose as law enforcement officials, make threats, and attempt to extort money based on the victim's personal data. This raises an important question: Where do scammers get such detailed information?
Possible sources of data from scammers:
1. Data Leak:
Data leak is a big concern on the dark web. Users' data, including phone numbers, Aadhaar card numbers, addresses and more, can be sold on illegal platforms. Such leaks can come from various sources, such as registering phone numbers in shopping malls, which lead to promotional messages and calls.
2. Phishing Email or Website:
Phishing is a common method where scammers send phishing links through emails or SMS. Clicking on these links redirects users to fake websites, from which scammers can steal personal details. Additionally, these links may install spyware on users' devices.
3. Phone call scams:
Scammers often impersonate bank employees or service executives and call users to extract information. By manipulating victims during calls, scammers are able to obtain vital details.
4. Social Engineering:
Scammers use social engineering extensively by analyzing photos and videos shared by users on social media. Details such as birthday, age and location are used to gather additional information about the victims.
PC:Surag Bureau Hindi News
How to protect yourself:
Change passwords regularly:
Change your passwords periodically to reduce the impact of potential data leaks.
Be careful on social media:
Be cautious about sharing personal details, including date of birth and location, on social media.
Verify website URLs:
To avoid falling victim to a phishing scam, verify the validity of any website before entering personal information.
Be alert during calls:
Be alert during phone calls, especially from unknown or unexpected sources. Avoid sharing sensitive information.
Avoid instant transactions:
Never make instant transactions or share OTP with unknown persons, especially if threatened or pressured.