Navigating Deceptive Impersonation Scams

wolf in sheep's clothing

Equipped with tactics that play on trust and urgency, scammers around the world have one goal in mind: to deceive you out of your hard-earned money. A particularly insidious method in their toolkit is the impersonation scam, where these criminals camouflage their intentions with a cloak of legitimacy.

There are many ways impersonation can be utilized in a scam, but most fall into some well-known categories. How many have you witnessed in your business or personal life?

Government Impersonation Scams

Government impersonation scams have emerged as a formidable tool in the scammer’s arsenal. Fraudsters meticulously craft communications, complete with official-looking logos and language, purporting to be from entities such as the IRS, SSA, or even agencies offering COVID-19 relief funds. Victims are often contacted via phone, email, or text messages with claims of tax discrepancies, Social Security Number compromises, or eligibility for government grants needing immediate action.

These scammers instill urgency and fear, pressuring individuals to divulge personal information or to make payments to rectify supposed issues. Unfortunately, this leads not to the resolution of a non-existent problem but to further financial and emotional distress for victims who believed they were navigating the complexities of governmental procedures.

AI-Enhanced Voice Impersonation

Advancements in AI have opened new doors for scammers, allowing them to create convincing voice models from minimal samples. This technology has been used to target individuals with calls from “family members” in distress, urging them to send money in unconventional forms like gift cards, transferred via apps like WhatsApp.

This is an enhanced form of familial scams, elevating old methods like sending these requests for emergency funds via text or email. The emotional urgency, combined with the realistic impersonation, seems to be a scamming sweet spot, especially for older adults, and often leads to quick action from worried relatives who are eager to help their “loved ones.”

The Growing Concern of Charity Scams

With the rise in charitable giving, especially in times of global crises or natural disasters, charity scams have become a lucrative avenue for fraudsters. These scammers exploit the kindness and generosity of people wanting to help those in need. They craft fake charities or impersonate well-known charitable organizations, using emotionally charged appeals to solicit funds.

Often, they rush individuals to donate, emphasizing urgency over authenticity, and preferring cash donations or wire transfers that cannot be easily traced or refunded. Legitimate banking applications, like Zelle or PayPal Friends and Family are preferred tools for this scam, as these options do not provide protection or money recovery for users.

Awareness and vigilance are crucial when donating to ensure that one’s goodwill effectively reaches the genuine beneficiaries and does not end up in the pockets of opportunists exploiting human compassion.

A Case Study in Deceit: “Anderson Technologies”

Imagine you’ve fallen victim to a cryptocurrency scam, following apparent investment advice that results in your crypto wallet drained of funds. With losses in the thousands or even millions, you start a desperate search for help. Or maybe you post about your unfortunate circumstance and are introduced to a glimmer of hope: a promising cryptocurrency recovery company with a legitimate-looking profile on Instagram. They are called Anderson Technologies and claim to be crypto recovery experts. They link to a legitimate website and seem to have a stellar reputation on Google. You think you’ve found your answer.

However, instead of delivering on their promise to recover your lost assets, they aim to dig deeper into your pockets. Recovery comes at a cost! But their promises and reputation sway you to make the payment. Then “Anderson Technologies” disappears, leaving you questioning, “Where is my money? Why did you stop replying?”

This scenario isn’t hypothetical. Victims of this fake “Anderson Technologies” reached out to us in confusion and distress after being duped by the imposters, and we are far from the only company being used as a smoke screen. The promise of recovered cryptocurrency was a mirage all along. Instead of regaining lost assets, victims find themselves further in the hole.

Understanding Business Email Compromise (BEC)

The number one threat that businesses face is Business Email Compromise (BEC). This sophisticated impersonation scam targets companies by compromising official business email accounts to request and coordinate unauthorized fund transfers.

Victims often believe they are responding to legitimate requests from their superiors or trusted partners, only to find out they have been swindled out of substantial amounts of money.

The methodology behind BEC attacks is alarmingly effective, relying on social engineering tactics and sometimes, inside information. This form of cyber deception not only causes financial loss but also significant damage to the company’s reputation.

To better understand Business Email Compromise and learn protective measures against it, visit Busting Business Email Compromise.

What Can You Do to Shield Yourself from the Snares of Scammers?

Protecting yourself from the reaches of these scammers requires vigilance and a proactive approach. Here are some strategies to fortify your defenses against impersonation scams:

1. Conduct Thorough Research

Before engaging with any entity or individual offering services, especially ones involving financial transactions, undertake a rigorous review. Look for inconsistencies between their claims on social media and the services listed on their official website.

2. Beware Artificial Urgency

Scammers frequently create a sense of urgency to cloud judgment and pressure immediate action. Remember, genuine emergencies rarely, if ever, require instant financial transactions, especially under unconventional and untraceable methods.

3. Establish Verification Procedures

Whether it’s for your family or your workplace, establish clear protocols for verifying identities and requests involving money or sensitive information. For personal situations, consider a family code word or phrase that can be used to quickly confirm a family member’s identity. Businesses should institute policies requiring multiple approvals for financial transactions, especially those exceeding a predetermined threshold. For instance, no single employee should have the autonomy to authorize transactions above a certain threshold without additional approvals.

4. The Power of Pausing

In the heat of the moment, when urgency is artificially imposed, the power of pausing cannot be overstated. Taking a moment to breathe, think, and verify can be the difference between safeguarding your assets and falling victim to an impersonation scam.

5. Educate and Communicate

Awareness is your strongest weapon against scams. Discuss potential scams with family members, friends, and colleagues, highlighting the importance of skepticism and the need for verification. The more informed people are, the less likely they are to fall prey to these nefarious tactics.

The rise of impersonation scams, particularly those exploiting the advancements in AI, underscores the evolving nature of cyber threats. It’s a stark reminder that in the digital age, vigilance and education are paramount in safeguarding not just our finances but also our trust and well-being.

Need to report an impersonation scam? Report them online to the Federal Trade Commission. 

Interested in a cybersecurity education seminar for your organization? Send us an email and let’s explore what we can do for you!

In 2022, Hadley and her husband Corbitt decided to return to St. Louis to join the family business. As part of the second generation, Hadley brought fresh perspectives from her time at AT&T and was drawn to helping the company grow the right way by implementing scalable systems and processes, while maintaining the core value-centric culture.
 
As a Project Manager, Hadley facilitated technical projects and the development of interdepartmental playbooks while gaining a deep understanding of the inner workings of the business operations. Now, as the Project Management Lead, Hadley is known for her driven, process-oriented leadership and her dedication to finding solutions for every challenge no matter how daunting it may first seem.

Born in Yokohama, Japan, and raised in Malaysia and St. Louis, Corbitt developed a unique global perspective. He graduated from Randolph-Macon College with a degree in Political Science and Spanish where he was a member of the men’s basketball team.

Before joining Anderson Technologies, Corbitt built a successful career at AT&T which initially started in the B2B Sales Development Program – a highly-competitive sales training where he was stack-ranked against his 100+ peers based on quota attainment to determine where in the company one was placed. In Chicago, as part of the National Fiber Organization, he became a top-performing sales professional, selling AT&T’s fiber, networking, and cybersecurity services and learning the value of relationship building, perseverance, and grit. Later, as a Senior Sales Solutions Engineer at AT&T headquarters in Dallas, he refined his technical expertise, leadership skills, and consulting abilities.

Currently pursuing his MBA at Washington University in St. Louis, Corbitt blends strategic thinking, technical knowledge, and a client-first approach to help Anderson Technologies continue serving companies and organizations across the country.

Corbitt Grow Headshot