The escalating prevalence of false legal demands: Consequences for your privacy
Discover strategies to outsmart phishing scams.
Scammers are becoming more sophisticated in their tactics, using phishing emails to trick people into giving away personal information. While these emails often contain awkward grammar, random details, and unofficial email addresses, they can still be difficult to spot. For instance, you may receive an email stating that your Apple ID has been disabled, but the sender's email address will not be from Apple. However, scammers are now finding ways to bypass these telltale signs.
The FBI reports a recent increase in cybercriminals utilizing hacked police and government email accounts to send fraudulent subpoenas and data demands to U.S. tech companies.
Sign up for my free newsletter to receive a $500 gift card for the holidays!
What you need to know
There has been a rise in criminal forum discussions regarding emergency data requests and stolen email credentials from police departments and government agencies. Cybercriminals are gaining access to compromised U.S. and foreign government email accounts and using them to send fake emergency data requests to U.S.-based companies, resulting in the exposure of customer data for malicious purposes.
In August 2024, a notorious cybercriminal on a popular online forum advertised "high-quality .gov emails" for sale, intended for espionage, social engineering, data extortion, emergency data requests, and more. The listing also included U.S. credentials, and the seller boasted about being able to guide buyers on making emergency data requests and even sell real stolen subpoena documents to help them pose as law enforcement.
Another cybercriminal bragged about possessing government emails from more than 25 countries. They asserted that anyone could utilize these emails to issue a subpoena to a tech company and obtain access to usernames, emails, phone numbers, and other personal client information. Some fraudsters are even offering a "masterclass" on how to create and submit their own emergency data requests to obtain data on any social media account, charging $100 for the complete tutorial.
How this phishing scam works
If a scammer gains access to a government email, they can use it to impersonate an official and obtain information on individuals through subpoenas or other legal requests.
Scammers often use emergency data requests to bypass verification, claiming that someone's life is at risk and that the data is needed urgently. This makes it difficult for companies to verify the request, as they may feel pressured to act quickly in case of an actual emergency.
Earlier this year, a cybercriminal posted pictures on an online forum of a fake emergency data request they’d sent to PayPal. The scammer tried to make it look legitimate by using a fraudulent mutual legal assistance treaty, claiming it was part of a local investigation into child trafficking, complete with a case number and legal code for verification. However, PayPal recognized that it wasn’t a real law enforcement request and denied it.
What can companies do to avoid falling for these phishing scams?
Before sharing sensitive information, companies should verify all data requests, including those that appear legitimate, by confirming them directly with the agency or organization that supposedly sent them.
Secure your email: Implement DMARC, SPF, and DKIM authentication protocols to prevent unauthorized emails. Add anti-phishing filters to detect suspicious content in messages.
Regular phishing awareness training can help employees identify warning signs, such as urgent language, unusual demands, or emails from unfamiliar sources. It is important to encourage employees to report any suspicious emails.
Restrict access to sensitive customer data to limit the number of individuals who can view or share it. This reduces the likelihood of accidental or intentional data leaks.
Have a well-defined verification process for emergency data requests, which should involve verifying with higher management or legal teams before responding to any urgent customer information request.
Is there something you need to do?
While this phishing scam primarily targets large tech corporations, there isn't much you can do directly. Nevertheless, it serves as a reminder to be cautious when receiving emails from .gov addresses. To safeguard yourself, consider taking these precautions.
Verify email addresses and links: Before clicking on any links or responding to an email, ensure that the sender's email address is legitimate and that the links lead to trustworthy websites. Be cautious of any suspicious activity. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my top picks for the best 2024 antivirus protection winners for your Windows, Mac, Android, and iOS devices.
Implement two-factor authentication (2FA) for all sensitive accounts to enhance security, even if login credentials are compromised.
Keep track of the latest phishing techniques to avoid falling victim to them. Staying informed about new scam tactics can help you stay safe.
Confirm suspicious requests: If you receive an unexpected email requesting sensitive information, contact the sender through an official channel to verify the request.
Kurt’s key takeaway
Scammers are now taking phishing emails to a new level, with access to government emails, and it's crucial to be cautious. Big tech companies are the primary targets of this phishing scam, and they must strengthen their security measures and verify every request before sharing any user information. Additionally, governments worldwide must take responsibility for protecting their digital assets from being compromised.
How do you feel about governments' approach to cybersecurity? Are they doing enough to safeguard sensitive information? Share your thoughts by emailing us at Cyberguy.com/Contact.
To receive my tech tips and security alerts, sign up for my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.
Let us know what stories you'd like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.