{"id":4735,"date":"2014-05-06T10:00:32","date_gmt":"2014-05-06T14:00:32","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=4735"},"modified":"2019-11-15T23:14:28","modified_gmt":"2019-11-15T12:14:28","slug":"reporting-online-fraud","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/reporting-online-fraud\/4735\/","title":{"rendered":"How to React to and Report Online Fraud"},"content":{"rendered":"<p>We spend a lot of time discussing the types of threats that exist online and offering advice on how to avoid becoming the victim of online fraud. Today, I want to briefly discuss the best ways to react to online threats after you become aware of them, because there are a number of organizations offering services out there that are seeking to make the Internet a safer place. All these organizations need, in some circumstances, is information from you.<\/p>\n<p><b>Phishing<\/b><\/p>\n<p>Phishing is a type of social engineering scam where an attacker attempts to dupe his victims into handing over potentially valuable information. One of the most popular types of phishing attacks comes via email. The attacker crafts an email that would appear to come from a source that is trusted by the recipient. The email may purport to come from a prominent bank, warning about a potential security incident, and presenting a link where the user can perform a password reset.<\/p>\n<div class=\"pullquote\">Whether you\u2019re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.<\/div>\n<p>That link would then lead to a page made to look like a Web property of the bank in question. The user, having followed that link, would then be compelled to enter his of her username and password in order to access his or her account and create a new password. Of course, what is really happening is that the attacker is tricking that user into disclosing his or her online banking credentials (this is why banks warn against following such links in unsolicited emails and encourage that customers navigate directly to banking websites before logging in).<\/p>\n<p>So, if you ever become aware of a Phishing attack \u2013 whether it\u2019s targeting payment info, social networking credentials or anything else \u2013 what should you do? You actually have a lot of options, but, broadly speaking, you should follow these five steps:<\/p>\n<ol>\n<li>DO NOT CLICK ON QUESTIONABLE LINKS;<\/li>\n<li>Definitely forward the phishing email and link along to the company being imitated;<\/li>\n<li>In some cases, you may want to contact law enforcement<\/li>\n<li>It\u2019s also a decent idea to inform a government consumer protection agency or relevant tech firm;<\/li>\n<li>And definitely delete offending message once you\u2019ve done all this.<\/li>\n<\/ol>\n<p>Let\u2019s say you encounter a PayPal-themed phishing campaign. You\u2019ll want to contact PayPal\u2019s dedicated fraud team. You can find their info simply by searching \u201cPayPal Report Phishing\u201d or \u201cPayPal fraud\u201d into your favorite search engine.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/05\/06043555\/Reporting-Fraud-to-PayPal.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4737\" alt=\"Reporting Fraud to PayPal\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/05\/06043555\/Reporting-Fraud-to-PayPal.png\" width=\"680\" height=\"391\"><\/a><\/p>\n<p>Once you\u2019ve done that, you should follow whatever instructions they offer up. If it was a phishing email, you\u2019ll want to forward the email along to PayPal, then delete it. After that, the service recommends running through your transaction history to make sure everything is accurate. Similar actions can be taken under any number of similar circumstances. Gmail has a phishing reporting feature built directly into its graphical user interface. Most banks and merchants will have a feature for reporting phishing attacks as well.<\/p>\n<p>Depending on the severity of the situation, you may want to contact law enforcement, but we\u2019ll explore that more in the next section.<\/p>\n<p>The United States Computer Emergency Readiness Team (US-CERT) \u2013 the cyber-incident response division of the U.S. Department of Homeland Security \u2013 has a dedicated email address (<a href=\"mailto:phishing-report@us-cert.gov\" target=\"_blank\" rel=\"noopener\">phishing-report@us-cert.gov<\/a>) to which you are encouraged to send information about phishing attacks. Similarly, the Internal Revenue Service has its own thorough <a href=\"http:\/\/www.irs.gov\/uac\/Report-Phishing\" target=\"_blank\" rel=\"noopener nofollow\">phishing and fraud page<\/a> \u2013 filled with information about how citizens should react to tax-related scams. These are U.S.-specific agencies, but if you were to search a bit, then you could easily find similar organizations in other countries. Beyond government agencies, tech firms like <a href=\"http:\/\/www.google.com\/safebrowsing\/report_phish\/?rd=1\" target=\"_blank\" rel=\"noopener nofollow\">Google<\/a> and <a href=\"http:\/\/www.microsoft.com\/security\/online-privacy\/phishing-scams.aspx\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft<\/a> have easy-to-use pages offering information about phishing and fraud and letting users submit links to phishing websites.<\/p>\n<p><b>Billing Discrepancies<\/b><\/p>\n<p>Every single time I make an online purchase, I think about what happens if I just never get what I ordered. Or what recourse is available to me if I am overcharged. Of course, the proper course of action to follow in reaction to such an incident is going to vary, depending on who you are buying from and what kind of payment method you are using. That said, in general, the following three, broad steps are a good starting point for dealing with disputed or fraudulent transactions.<\/p>\n<ol>\n<li>Contact the organization where the charges are coming from;<\/li>\n<li>If that doesn\u2019t solve the problem, contact your bank;<\/li>\n<li>In certain cases, you may need to contact law enforcement.<\/li>\n<\/ol>\n<p>If you\u2019re ever overcharged for something you bought, charged for goods or services you did not purchase, or charged for something you bought but which you never received, then you will want to begin by reaching out to the offending merchant. In the case of what appears to be a fraudulent charge where there is no legitimate merchant involved, you may want to reach out immediately to your bank or credit card provider to explain the disputed transaction.<\/p>\n<p>If the company that issued the charge is a is seemingly well-established merchant \u2013 like eBay or Amazon \u2013 then there is likely some sort of disputed transactions page or resolution center. Any reputable, online seller of goods and services should offer some way for customers and other users to dispute transactions, though I\u2019m sure in some cases you will have to do a bit of digging and maybe even call the company directly. If you are honest and patient, you should be able to resolve these disputes with most responsible merchants. In these cases, you may not even need to contact your bank or credit card provider.<\/p>\n<p>However, if it becomes clear that you are never going to receive whatever it is you ordered, you feel as if you have waited longer than appropriate, or something downright fraudulent is going on, then you should go ahead and reach out to your bank. Whatever bank holds your money, or whatever brand of credit card you use, that bank or credit card company is going to have a system for reporting fraudulent charges. Do an Internet search, navigate around your bank or credit card company\u2019s website, or even pick up the phone and call the customer service department there.<\/p>\n<p>In addition to that, on sites like eBay and Amazon, where individuals can sell goods directly to customers, you may find yourself victimized by a fraudulent seller that is not directly employed by the broader marketplace. In that case, you\u2019ll need to follow their specific instructions for handling fraudulent sellers, which Amazon and eBay definitely have in place.<\/p>\n<p>If it appears that outright fraudulent charges are being charged to your accounts (as in someone has ascertained your credit card number or eBay login credentials and is racking up charges), then you may need to contact law enforcement. You can find links to the proper, regional authorities (in the U.S. at least) <a href=\"http:\/\/www.usa.gov\/directory\/stateconsumer\/index.shtml\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>. Again, if you\u2019re outside the U.S., run a search for \u201cconsumer fraud reporting,\u201d and I\u2019m sure you will find what you are looking for.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/05\/06043551\/Report-Consumer-Fraud.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4738\" alt=\"Report Consumer Fraud\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/05\/06043551\/Report-Consumer-Fraud.png\" width=\"680\" height=\"417\"><\/a><\/p>\n<p><a href=\"http:\/\/www.consumerfraudreporting.org\/\" target=\"_blank\" rel=\"noopener nofollow\">ConsumerFraudReporting.org<\/a> is a great resource to visit if you find yourself in this type of situation. The website will walk you through everything from how to deal with Social Security Number theft, to reacting to malware infections, to reporting a sketchy merchant to the major credit bureaus.<\/p>\n<p><b>Malware Infection <\/b><\/p>\n<p>First and foremost, you should always run security software. A strong anti-virus product is going to make it considerably harder for your machine to become infected with malware.<\/p>\n<p>However, let\u2019s say your machine has become infected with information-stealing malware. Again, broadly:<\/p>\n<ol>\n<li>Remedy the infection;<\/li>\n<li>Assess the degree of exposure;<\/li>\n<li>Change passwords; get new cards.<\/li>\n<\/ol>\n<p>If you didn\u2019t have AV software, then you should buy a good solution, install it, update it, and run a scan. A good anti-malware product will detect and remove the malicious software \u2013 even if it was on your machine before you installed the AV.<\/p>\n<p>Now you need to do the best job you possibly can of determining exactly when you became infected. It may also help to determine the source of the infection, which, if it is a website, you can report it to Google or US-CERT or Microsoft or the FBI or any number of other sources you can find by running a simple Internet search.<\/p>\n<p>After that, you need to figure out what information was likely exposed. Were you logging into email or banking or other online accounts while your machine was infected with malware? If so, you should consider any account you logged into compromised, and change your passwords accordingly. In addition to that, you should keep a close eye on account activity. Depending on what information is accessible through your online banking site, you may need to contact your bank and take further steps. In the case of email or other accounts, you may need to access your settings to make sure no critical settings, like recovery email addresses or features like forwarding rules, have been added or manipulated.<\/p>\n<p>\u2013<\/p>\n<p>Online threats are in no way limited to the simple three discussed here, but the steps laid out in these three scenarios offer guidelines that I think can be applied to other types of threats as well. Please let us know in the comments if there are any other scenarios that you\u2019d like us to consider.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether you&#8217;re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.<\/p>\n","protected":false},"author":42,"featured_media":4736,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1852,80,627,36,76,644],"class_list":{"0":"post-4735","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-advice","9":"tag-fraud","10":"tag-how-to","11":"tag-malware-2","12":"tag-phishing","13":"tag-reporting"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/reporting-online-fraud\/4735\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/reporting-online-fraud\/3430\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/reporting-online-fraud\/3316\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/reporting-online-fraud\/3739\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/reporting-online-fraud\/3841\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/reporting-online-fraud\/3977\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/reporting-online-fraud\/4735\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/reporting-online-fraud\/3595\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/reporting-online-fraud\/3977\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/reporting-online-fraud\/4735\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/advice\/","name":"#advice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=4735"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4735\/revisions"}],"predecessor-version":[{"id":25213,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4735\/revisions\/25213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/4736"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=4735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=4735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=4735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}