McAfee warns consumers of the 'Twelve Scams of Christmas'

November 2011 Information Security, News & Events

‘Tis the season for consumers to spend more time online - shopping for gifts, looking for great holiday deals on new digital gadgets, e-planning family get-togethers and of course, using online or mobile banking to make sure they can afford it all. But before logging on from a PC, Mac, or mobile device, consumers should look out for the ‘12 Scams of Christmas’, the dozen most dangerous online scams this holiday season, revealed by McAfee.

“Cyber criminals rub their hands with glee when they think of the holidays,” said Gary Davis, director of consumer product marketing at McAfee. “Consumers are making travel plans, shopping for gifts and bargains, updating Facebook and connecting with friends. However, the vast majority have no security protection for their smartphones or tablets, despite using them heavily during the holiday season. Consumers need to stay one step ahead of this season’s cyber-scrooges, and make sure they have protection for all of their Internet-enabled devices. Otherwise, they could risk giving the bad guys the biggest gift of all – their own personal and financial information.”

12 Scams of Christmas

Mobile malware: A recent National Retail Federation (NRF) survey, dated 19 October, found that 52,6% of US consumers who own a smartphone said they will be using their device for holiday-shopping related activities — whether it is to research products, redeem coupons, or purchase holiday gifts. Malware targeted at mobile devices is on the rise, and Android smartphones are most at risk. McAfee cites a 76% increase in malware targeted at Android devices in the second quarter of 2011 over the first, making it the most targeted smartphone platform.

New malware has recently been found that targets QR codes, a digital barcode that consumers might scan with their smartphone to find good deals or just to learn about products they want to buy.

Malicious mobile applications: These are mobile apps designed to steal information from smartphones, or send out expensive text messages without a user’s consent. Dangerous apps are usually offered for free and masquerade as fun applications, such as games. For example, last year, 4,6 million Android smartphone users downloaded a suspicious wallpaper app that collected and transmitted user data to a site in China.

Phony Facebook promotions and contests: Who does not want to win some free prizes or get a great deal around the holidays? Unfortunately, cyber scammers know that these are attractive lures and they have sprinkled Facebook with phony promotions and contests aimed at gathering personal information.

A recent scam advertised two free airline tickets, but required participants to fill out multiple surveys requesting personal information.

Scareware, or fake antivirus software: Scareware is the fake antivirus software that tricks someone into believing that their computer is at risk—or already infected—so they agree to download and pay for phony software. This is one of the most common and dangerous Internet threats today, with an estimated one million victims falling for this scam each day. In October 2010, McAfee reported that scareware represented 23% of all dangerous Internet links, and it has been resurgent in recent months.

Holiday screensavers: Bringing holiday cheer to your home or work PC sounds like a fun idea to get into the holiday spirit, but be careful. A recent search for a Santa screensaver that promises to let you ‘fly with Santa in 3D’ is malicious. Holiday-themed ringtones and e-cards have been known to be malicious too.

Mac malware: Until recently, Mac users felt insulated from online security threats, since most were targeted at PCs. But with the growing popularity of Apple products, for both business and personal use, cyber criminals have designed a new wave of malware directed squarely at Mac users. According to McAfee Labs, as of late 2010, there were 5000 pieces of malware targeting Macs, and this number is increasing by 10% month on month.

Holiday phishing scams: Phishing is the act of tricking consumers into revealing information or performing actions they would not normally do online using phony e-mail or social media posts. Cyber scammers know that most people are busy around the holidays so they tailor their e-mails and social messages with holiday themes in the hopes of tricking recipients into revealing personal information.

A common holiday phishing scam is a phony notice from UPS, saying you have a package and need to fill out an attached form to get it delivered. The form may ask for personal or financial details that will go straight into the hands of the cyber scammer.

Banking phishing scams continue to be popular and the holiday season means consumers will be spending more money — and checking bank balances more often. From July to September of this year, McAfee Labs identified approximately 2700 phishing URLs per day.

Smishing: SMS phishing remains a concern. Scammers send their fake messages via a text alert to a phone, notifying an unsuspecting consumer that his bank account has been compromised. The cyber criminals then direct the consumer to call a phone number to get it re-activated — and collects the user’s personal information.

Online coupon scams: An estimated 63% of shoppers search for online coupons or deals when they purchase something on the Internet, and recent NRF data (19 October, 2011) shows that consumers are also using their smartphones (17,3%) and tablets (21,5%) to redeem those coupons. But watch out, because the scammers know that by offering an irresistible online coupon, they can get people to hand over some of their personal information.

One popular scam is to lure consumers with the hope of winning a ‘free’ iPad. Consumers click on a phishing site, which can result in e-mail spam and possibly dealing with identify theft.

Consumers are offered an online coupon code and once they agree, are asked to provide personal information, including credit-card details, passwords and other financial data.

Mystery shopper scams: Mystery shoppers are people who are hired to shop in a store and report back on the customer service. Sadly, scammers are now using this fun job to try to lure people into revealing personal and financial information. There have been reports of scammers sending text messages to victims, offering to pay them $50 an hour to be a mystery shopper and instructing them to call a number if they are interested.

Once the victim calls, they are asked for their personal information, including credit card and bank account numbers.

Hotel ‘wrong transaction’ malware e-mails: Many people travel over the holidays, so it is no surprise that scammers have designed travel-related scams in the hopes of getting us to click on dangerous e-mails. In one recent example, a scammer sent out e-mails that appeared to be from a hotel, claiming that a ‘wrong transaction’ had been discovered on the recipient’s credit card. It then asked them to fill out an attached refund form. Once opened, the attachment downloads malware onto their machine.

’It’ gift scams: Every year there are hot holiday gifts, such as toys and gadgets, that sell out early in the season. When a gift is hot, not only do sellers mark up the price, but scammers will also start advertising these gifts on rogue websites and social networks, even if they do not have them.

So, consumers could wind up paying for an item and giving away credit card details only to receive nothing in return. Once the scammers have the personal financial details, there is little recourse.

’I am away from home’ scammers: Posting information about a vacation on social networking sites could actually be dangerous. If someone is connected with people they do not know on Facebook or other social networking sites, they could see their post and decide that it may be a good time to rob them. Furthermore, a quick online search can easily turn up their home address.

How to protect yourself

Internet users can protect themselves from cyber crime with the following quick tips:

* Only download mobile apps from official app stores, such as iTunes and the Android Market, and read user reviews before downloading them.

* Be extra vigilant when reviewing and responding to e-mails.

* Watch out for too-good-to-be-true offers on social networks (like free airline tickets). Never agree to reveal your personal information just to participate in a promotion.

* Do not accept requests on social networks from people you do not know in real life. Wait to post pictures and comments about your vacation until you have already returned home.

* Be sure you have active, comprehensive protection for all of your devices.

For more information contact Craig Hockley, McAfee, +27 (0)11 707 5500, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Firexpo 2025 ignites interest in fire safety
Fire & Safety News & Events
Firexpo 2025 showcased fire detection, suppression, and safety tech, drawing professionals eager to explore innovations, gain insights, and connect with suppliers.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.