3) Social network profile details
The attacker may send a mail like a genuine person from any social network site and ask for your details.
The mail may inform you there may be some discrepancies in your login or a login attempt in another system. And ask you to confirm by giving your profile details.
4) Fake invoice
The criminal may send a fake invoice showing you have paid a certain amount for buying their services. For example, you have paid 100$ to avail iTunes service. At the end of the mail, they will specify if we didn’t buy that service; click the link and provide details for the refund.
This kind of mail is sent to ignite greed or make the user think they will get extra money for free. Then the user will give their details to get a refund without knowing they provided confidential details to the hacker who is taking all the money from your bank account with their details.
There may also be mail like Remainder: Invoice or Important: Invoice and asks you to download the attachment. Be cautious of this kind of mail and report to the cybersecurity in your organization.
5) Charity organization
The hacker will pretend like they are having an orphanage or other charity organization and request money. They may provide a believable story like a kid who needs lots of money for an operation, making the user feel pity and donate the money.
If you receive any such emails, kindly confirm the organization’s authentication or the story provided, then donate the money.
6) Account suspension
We may receive mail describing that our account has been suspended due to some illicit activities or log in from different places like that. And ask as to provide our details in a link they would have sent along with the mail. This kind of mail may come from the bank or social media accounts.
Believing this mail and without checking if we proceed with sending our details, the hacker may very easily claim our account ownership.
7) Survey
The email will have surveys to collect information from the user. These surveys can appear as display ads on websites and in the news feed, and more. The most important thing to note is that no legitimate organization will survey by asking about your credentials.
8) CEO fraud/ Higher official scam
You may receive a simple mail from someone like a higher authority in your organization. For example, someone under your organization’s higher official name will ask you to mail your mobile number to discuss urgent needs like that.
9) Romance scam
The hacker may have got the email from any dating web and started sending mail. After a while, the hacker may ask for money from the user or ask serious questions about the user. These questions are asked to understand the security questions the user may have given for password retrieval and more. If not careful, the romance scams broke not only the bank vault but also the heart.
10) Lottery
The mail we receive may contain details such as our mail id may be won a lottery among many thousands of mail id. They will ask for our details to send the prize amount and our details for the same.
It may come as attachments or links or in many forms. The ultimate goal of the scam is to get the details of the user.