Article

Saturday, October 05, 2024
search-icon

Online gangs pose as local companies to scam buyers

Experts sound alarm on social media fraud: Five ways to stay protected

publish time

05/10/2024

publish time

05/10/2024

Online gangs pose as local companies to scam buyers

KUWAIT CITY, Oct 5: Two experts have stressed the need to verify the authenticity of companies before making transactions, following a series of electronic fraud cases where citizens purchased products from social media accounts falsely posing as reputable Kuwaiti companies. These fraudulent accounts lure buyers by offering products at significantly reduced prices, sometimes less than half their actual value. Payments are usually requested via links or bank cards, without an option for cash, and the theft occurs once users accept the link or input their card information.

Shurooq Al-Sayegh, a member of the Board of Directors of the Kuwait Information Society, pointed out that this has become a widespread method of electronic fraud. Fraudsters create fake offers or send deceptive messages, prompting Al-Sayegh to advise the public to verify the credibility of the accounts and offers before engaging with them.

She emphasized the importance of confirming that the account is authentic and has a blue verification badge, especially if it claims to represent a well-known company or public figure. Al-Sayegh noted that fake accounts usually exhibit limited or suspicious engagement, and random or illogical comments may be a sign of fraudulent activity.

Al-Sayegh also advised consumers to be wary of offers that seem too good to be true, urging them to verify the source before sharing personal or financial information and to report any suspicious activity. Additionally, she recommended enabling two-factor authentication to strengthen account security and make it more challenging for fraudsters to gain access.

Engineer Hussein Ali Al-Nakas, an IT and cybersecurity consultant, highlighted that some individuals unknowingly enable fraud by neglecting proper verification and auditing processes, which makes it easier for impostors to carry out scams. He explained that phishing is a common method used in these schemes.

Al-Nakas warned that theft typically happens when users enter their bank card information into malicious links, which often contain hidden software that can steal data or conduct espionage. He also cautioned against falling for fake product offers or job scams, which could result in involvement in money laundering activities.

To protect against such fraud, experts suggest the following five steps:

1. Verify the account’s identity.

2. Review the account’s engagement.

3. Be cautious of tempting offers.

4. Use the reporting feature for suspicious activity.

5. Confirm the account’s geographical location.