Cybercriminals are increasingly in step with technologies than with simple messages on the most used instant messaging app in the world, WhatsAppcreate trains to violate our sensitive data, privacy and above all try to empty current accounts. One of the last in order of time takes place with the opening of a simple photo, or image, on our device. To give an example of the news, a man in India lost the equivalent of two thousand euros with this type of scam.
What is “Image Scam”
The scam consists in the sending of images that apparently are innocue but that a big pitfall are born: it is called malware Any software that has been designed to damage, interrupt or enter unauthorizedly within an IT system. In the specific case of WhatsApp we are dealing with what experts call “Image Scam”, a steganography -based technique and “used to hide data within digital files such as images “.
What can happen
Once the file is opened, we can say goodbye to our sensitive data but the attackers can also steal username, password and in the most serious cases also the access credentials to home banking with all the consequences of the case taking full control of our device. “In these scams, the malware camouflages itself inside the image files and activates as soon as the file is opened. The victims may even not receive an OTP notification, making the intrusion more difficult to detect “, the experts of Business TODAY.
The image, or the photo, can be received not only by an anonymous contact not present in the address book but also by people we know simply because their device has already been hacked: By trusting the interlocutor, therefore, we are led to open that file and the omelette is made.
How to defend yourself from the scam
Compared to numerous other attempts to phishingthat is that computer attack where criminals deceive people to get sensitive information such as password, credit card numbers or bank details, with this technique just a simple click (with download) and our device is infected. The cybercriminal, at that point, are able to control the victim’s phone.
THE advice In order not to fall into trap, they are always the same: first of all the automatic download settings for photos and documents must be deactivated, it is also essential not to open links or photos from unknown numbers but also install on your own
device, special apps that discover the identification of the person who is calling us. Finally, you can install an antivirus software as reliable as possible as well as keeping your devices updated.