McAfee warns consumers of the 'Twelve Scams of Christmas'

November 2011 Information Security, News & Events

‘Tis the season for consumers to spend more time online - shopping for gifts, looking for great holiday deals on new digital gadgets, e-planning family get-togethers and of course, using online or mobile banking to make sure they can afford it all. But before logging on from a PC, Mac, or mobile device, consumers should look out for the ‘12 Scams of Christmas’, the dozen most dangerous online scams this holiday season, revealed by McAfee.

“Cyber criminals rub their hands with glee when they think of the holidays,” said Gary Davis, director of consumer product marketing at McAfee. “Consumers are making travel plans, shopping for gifts and bargains, updating Facebook and connecting with friends. However, the vast majority have no security protection for their smartphones or tablets, despite using them heavily during the holiday season. Consumers need to stay one step ahead of this season’s cyber-scrooges, and make sure they have protection for all of their Internet-enabled devices. Otherwise, they could risk giving the bad guys the biggest gift of all – their own personal and financial information.”

12 Scams of Christmas

Mobile malware: A recent National Retail Federation (NRF) survey, dated 19 October, found that 52,6% of US consumers who own a smartphone said they will be using their device for holiday-shopping related activities — whether it is to research products, redeem coupons, or purchase holiday gifts. Malware targeted at mobile devices is on the rise, and Android smartphones are most at risk. McAfee cites a 76% increase in malware targeted at Android devices in the second quarter of 2011 over the first, making it the most targeted smartphone platform.

New malware has recently been found that targets QR codes, a digital barcode that consumers might scan with their smartphone to find good deals or just to learn about products they want to buy.

Malicious mobile applications: These are mobile apps designed to steal information from smartphones, or send out expensive text messages without a user’s consent. Dangerous apps are usually offered for free and masquerade as fun applications, such as games. For example, last year, 4,6 million Android smartphone users downloaded a suspicious wallpaper app that collected and transmitted user data to a site in China.

Phony Facebook promotions and contests: Who does not want to win some free prizes or get a great deal around the holidays? Unfortunately, cyber scammers know that these are attractive lures and they have sprinkled Facebook with phony promotions and contests aimed at gathering personal information.

A recent scam advertised two free airline tickets, but required participants to fill out multiple surveys requesting personal information.

Scareware, or fake antivirus software: Scareware is the fake antivirus software that tricks someone into believing that their computer is at risk—or already infected—so they agree to download and pay for phony software. This is one of the most common and dangerous Internet threats today, with an estimated one million victims falling for this scam each day. In October 2010, McAfee reported that scareware represented 23% of all dangerous Internet links, and it has been resurgent in recent months.

Holiday screensavers: Bringing holiday cheer to your home or work PC sounds like a fun idea to get into the holiday spirit, but be careful. A recent search for a Santa screensaver that promises to let you ‘fly with Santa in 3D’ is malicious. Holiday-themed ringtones and e-cards have been known to be malicious too.

Mac malware: Until recently, Mac users felt insulated from online security threats, since most were targeted at PCs. But with the growing popularity of Apple products, for both business and personal use, cyber criminals have designed a new wave of malware directed squarely at Mac users. According to McAfee Labs, as of late 2010, there were 5000 pieces of malware targeting Macs, and this number is increasing by 10% month on month.

Holiday phishing scams: Phishing is the act of tricking consumers into revealing information or performing actions they would not normally do online using phony e-mail or social media posts. Cyber scammers know that most people are busy around the holidays so they tailor their e-mails and social messages with holiday themes in the hopes of tricking recipients into revealing personal information.

A common holiday phishing scam is a phony notice from UPS, saying you have a package and need to fill out an attached form to get it delivered. The form may ask for personal or financial details that will go straight into the hands of the cyber scammer.

Banking phishing scams continue to be popular and the holiday season means consumers will be spending more money — and checking bank balances more often. From July to September of this year, McAfee Labs identified approximately 2700 phishing URLs per day.

Smishing: SMS phishing remains a concern. Scammers send their fake messages via a text alert to a phone, notifying an unsuspecting consumer that his bank account has been compromised. The cyber criminals then direct the consumer to call a phone number to get it re-activated — and collects the user’s personal information.

Online coupon scams: An estimated 63% of shoppers search for online coupons or deals when they purchase something on the Internet, and recent NRF data (19 October, 2011) shows that consumers are also using their smartphones (17,3%) and tablets (21,5%) to redeem those coupons. But watch out, because the scammers know that by offering an irresistible online coupon, they can get people to hand over some of their personal information.

One popular scam is to lure consumers with the hope of winning a ‘free’ iPad. Consumers click on a phishing site, which can result in e-mail spam and possibly dealing with identify theft.

Consumers are offered an online coupon code and once they agree, are asked to provide personal information, including credit-card details, passwords and other financial data.

Mystery shopper scams: Mystery shoppers are people who are hired to shop in a store and report back on the customer service. Sadly, scammers are now using this fun job to try to lure people into revealing personal and financial information. There have been reports of scammers sending text messages to victims, offering to pay them $50 an hour to be a mystery shopper and instructing them to call a number if they are interested.

Once the victim calls, they are asked for their personal information, including credit card and bank account numbers.

Hotel ‘wrong transaction’ malware e-mails: Many people travel over the holidays, so it is no surprise that scammers have designed travel-related scams in the hopes of getting us to click on dangerous e-mails. In one recent example, a scammer sent out e-mails that appeared to be from a hotel, claiming that a ‘wrong transaction’ had been discovered on the recipient’s credit card. It then asked them to fill out an attached refund form. Once opened, the attachment downloads malware onto their machine.

’It’ gift scams: Every year there are hot holiday gifts, such as toys and gadgets, that sell out early in the season. When a gift is hot, not only do sellers mark up the price, but scammers will also start advertising these gifts on rogue websites and social networks, even if they do not have them.

So, consumers could wind up paying for an item and giving away credit card details only to receive nothing in return. Once the scammers have the personal financial details, there is little recourse.

’I am away from home’ scammers: Posting information about a vacation on social networking sites could actually be dangerous. If someone is connected with people they do not know on Facebook or other social networking sites, they could see their post and decide that it may be a good time to rob them. Furthermore, a quick online search can easily turn up their home address.

How to protect yourself

Internet users can protect themselves from cyber crime with the following quick tips:

* Only download mobile apps from official app stores, such as iTunes and the Android Market, and read user reviews before downloading them.

* Be extra vigilant when reviewing and responding to e-mails.

* Watch out for too-good-to-be-true offers on social networks (like free airline tickets). Never agree to reveal your personal information just to participate in a promotion.

* Do not accept requests on social networks from people you do not know in real life. Wait to post pictures and comments about your vacation until you have already returned home.

* Be sure you have active, comprehensive protection for all of your devices.

For more information contact Craig Hockley, McAfee, +27 (0)11 707 5500, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Value and industry insight
Securex South Africa Training & Education News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.