www.malwarebytes.com
Open in
urlscan Pro
2600:9000:21f3:4000:16:26c7:ff80:93a1
Public Scan
Submitted URL: https://links.e.malwarebytes.com/z/ps1xlpyvu?uid=d66ee2f1-47d5-4d6d-b81c-5182aae1942b&mid=13fa6ef9-e228-4aaf-bd55-878c85c2b357&bs...
Effective URL: https://www.malwarebytes.com/blog/news/2022/08/blog-post?utm_source=blueshift&utm_medium=email&utm_campaign=b2c_pro_oth_aug_1...
Submission: On August 16 via api from BE — Scanned from DE
Effective URL: https://www.malwarebytes.com/blog/news/2022/08/blog-post?utm_source=blueshift&utm_medium=email&utm_campaign=b2c_pro_oth_aug_1...
Submission: On August 16 via api from BE — Scanned from DE
Form analysis
2 forms found in the DOMGET
<form id="search-form" onsubmit="submitSearchBlog(event)" method="get">
<div class="searchbar-wrap-rightrail">
<label for="cta-labs-rightrail-search-submit-en" aria-label="cta-labs-rightrail-search-submit-en" aria-labelledby="cta-labs-rightrail-search-submit-en">
<input type="text" id="st-search-input-rightrail" class="st-search-input-rightrail" placeholder="Search Labs">
</label>
<button type="submit" id="cta-labs-rightrail-search-submit-en" aria-label="Submit your search query"><span class=""><img src="/blog/images/search.svg" alt="Magnifying glass"></span>
</button>
</div>
</form>
/newsletter/
<form class="newsletter-form form-inline" action="/newsletter/">
<div class="email-input">
<label for="cta-footer-newsletter-input-email-en" aria-label="cta-footer-newsletter-input-email-en" aria-labelledby="cta-footer-newsletter-input-email-en">
<input type="text" class="email-input-field" id="cta-footer-newsletter-input-email-en" name="email" placeholder="Email Address">
</label>
<input name="source" type="hidden" value="">
<input type="submit" class="submit-bttn" id="cta-footer-newsletter-subscribe-email-en" value="">
</div>
</form>
Text Content
The official Malwarebytes logoThe official Malwarebytes logo in a blue fontB We research. You level up. Personal Personal * Security & Antivirus * Malwarebytes for Windows * Malwarebytes for Mac * Malwarebytes for Chromebook * Malwarebytes for Android * Malwarebytes for iOS * Malwarebytes AdwCleaner * Online Privacy * Malwarebytes Privacy VPN * Malwarebytes Browser Guard * * All-in-one Protection * Malwarebytes Premium + Privacy VPN New * Get Started * The ultimate guide to privacy protection New VISIT PRIVACY HUB VISIT PRIVACY HUB * * Stop infections before they happen * GET A FREE TRIAL GET A FREE TRIAL * * Find the right solution for you * SEE PERSONAL PRICING SEE PERSONAL PRICING Business Business * Solutions * BY COMPANY SIZE * Small Businesses * single figure icon 1-99 Employees Buy Online * Mid-size Businesses * two figure icon 100-999 Employees * Large Enterprise * three figure icon 1000+ Employees * BY INDUSTRY * Education * Finance * Healthcare * Government * Products * CLOUD-BASED SECURITY MANAGEMENT AND SERVICES * Endpoint Protection * Endpoint Protection for Servers * Endpoint Detection & Response * Endpoint Detection & Response for Servers * Incident Response * Malware Removal Service * Nebula Platform Architecture * Cloud Storage Scanning Service New * CLOUD-BASED SECURITY MODULES * DNS Filtering * Vulnerability & Patch Management * Remediation for CrowdStrike® * NEXT-GEN ANTIVIRUS FOR SMALL BUSINESS * For Teams * Get Started * * Find the right solution for your business * See business pricing See business pricing -------------------------------------------------------------------------------- * Don't know where to start? * Help me choose a product See business products selector -------------------------------------------------------------------------------- * See what Malwarebytes can do for you * Get a free trial Get a free trial -------------------------------------------------------------------------------- * Our sales team is ready to help. Call us now * Phone icon +49 (800) 723-4800 Pricing Partners Partners * Partner Icon Explore Partnerships * Partner Solutions * Resellers * Managed Service Providers * Computer Repair * Technology Partners * Buy now Buy Now * Partner Success Story * Marek Drummond Managing Director at Optimus Systems "Thanks to the Malwarebytes MSP program, we have this high-quality product in our stack. It’s a great addition, and I have confidence that customers’ systems are protected." * See full story See full story Resources Resources * Learn About Cybersecurity * Antivirus * Malware * Ransomware * Malwarebytes Labs – Blog * Glossary * Threat Center * Business Resources * Reviews * Analyst Reports * Case Studies * Press & News * Events * Featured Event: RSA 2021 * See Event See event Support Support * Technical Support * Personal Support * Business Support * Premium Services * Forums * Vulnerability Disclosure * Watch Icon Training for Personal Products * Watch Icon Training for Business Products * Featured Content * Privacy Logo Activate Malwarebytes Privacy on Windows device. * See Content See content FREE DOWNLOAD CONTACT US COMPANY COMPANY * About Malwarebytes * Careers * News & Press SIGN IN SIGN IN * My Account * Cloud Console * Partner Portal SUBSCRIBE News | Scams PHISHY CALLS AND EMAILS PLAY ON ENERGY COST INCREASE FEARS Posted: August 6, 2022 by Christopher Boyd We take a look at a wave of scams involving people's fears of increasing energy prices, and how to avoid being caught out. Gas and electricity price concerns are rife at the moment, with spiralling costs and bigger increases waiting down the line. Sadly this makes the subject valuable material for fraudsters, playing into people's fears with a dash of social engineering to make them worse off than they were previously. Warnings abound of several energy / cost of living-themed scams doing the rounds. Shall we take a look? IDENTIFIERS OF AN ATTACK These attacks target individuals living in countries where oil or electricity prices are a concern. If you have an imminent set of price increases on the horizon, you may be a target. Phone calls, emails, whatever it takes to extract some cash. The UK is a particularly hot flashpoint for these fraud attempts at the moment. The senders will typically claim to be from an organisation with authority. Maybe an energy watchdog, or a consumer rights group, or maybe an energy company. Refunds, rebates, and discounts generally are the order of the day. There's a number of schemes along these lines at the moment due to be rolled out, and you can expect fraudsters to ride on their coat tails. ENERGY REFUND SCAM TYPES FAKE REBATES This scam involves cold calling and a spin on the (genuine) rebate plan put together by the British Government. Fraudsters inform potential victims that they need to hand over bank details in order to qualify. Normally we'd say "this is not true". However: There are some cases where people do hand over payment information. Local councils in the UK have reached out to many people pre-emptively to arrange rebate payments. Where the scammers have an angle is that lots of other residents have not been contacted. In those cases, the onus is on the individual to reach out and apply. They can choose to have the rebate applied to their next local council bill, or have the money paid directly into their bank account. To do this, they need to hand over payment details. The caveat is that the person applying does this themselves, on their local council website. Nobody should be cold-calling asking for payment information. OFGEM IMPERSONATORS Fraudsters are claiming to represent Ofgem, Britain's independent energy regulator. They claim to be able to help you get a better energy deal and then ask for your payment details. These attacks come via text and email, and have been around for at least a month or so. Some of these also tap into the rebate scam, claiming to offer a "secure application" which is really just a phishing website. FAKE ENERGY COMPANY REFUNDS This is a fairly common scam, just like fake tax refunds during tax season. They are definitely more relevant during the current energy crisis though. In this case, we're talking fake refunds and a double-threat attack technique. The victim is lured in with emails offering a refund. Once the information is taken by the phishing website, the scammer calls the victim claiming to be working on behalf of their bank. The scammer goes on to highlight several types of fraud to be wary of, all the while trying to extract around $1,200 during the call. HOW TO AVOID THESE THREATS * Any email or phone call asking for payment information is not going to be legitimate. You should also never be asked for login details for your online banking or other accounts from a cold-caller. * If you receive an unexpected call about energy prices or rebates, Insist on calling "them" back on their official number, taken from an official website, directly. If the caller objects to this, that's an immediate red flag. A genuine caller would have no possible reason to object to this. * Bogus fake energy company websites are very popular and easy to set up. Visit the official website listed in official correspondence only, and pay close attention to URLs sent to you by text or email. Stay safe out there! SHARE THIS ARTICLE -------------------------------------------------------------------------------- COMMENTS -------------------------------------------------------------------------------- RELATED ARTICLES A week in security | News A WEEK IN SECURITY (AUGUST 8 - AUGUST 14) August 15, 2022 - The most important and interesting computer security stories from the last week. CONTINUE READING 0 Comments Podcast DONUT BREACH: LESSONS FROM PEN-TESTER MIKE MILLER: LOCK AND CODE S03E17 August 15, 2022 - This week on Lock and Code, we speak with pen-tester Mike Miller about how he successfully breached a client's offices with little more than a box of donuts. CONTINUE READING 0 Comments News | Privacy ANTI-TRACKING TOOL TELLS YOU IF YOU'RE BEING FOLLOWED August 12, 2022 - At Black Hat, a cybersecurity expert presented an anti-stalking tool they made for a friend. CONTINUE READING 0 Comments VIRAL VIDEO DRIVES MALVERTISING ON SOCIAL MEDIA PLATFORM August 12, 2022 - Tech support scammers are leveraging social media giant Facebook to lure users into clicking on a viral article. CONTINUE READING 0 Comments Exploits and vulnerabilities | News RESEARCHERS FOUND ONE-CLICK EXPLOITS IN DISCORD AND TEAMS August 12, 2022 - A group of security researchers found a series of vulnerabilities in the software underlying popular apps like Discord, Microsoft Teams, and many others CONTINUE READING 0 Comments -------------------------------------------------------------------------------- ABOUT THE AUTHOR Christopher Boyd Lead Malware Intelligence Analyst Former Director of Research at FaceTime Security Labs. He has a very particular set of skills. Skills that make him a nightmare for threats like you. Contributors Threat Center Podcast Glossary Scams Write for Labs Cyberprotection for every one. twitter facebook linkedin Youtube instagram Cybersecurity info you can't do without Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats. Cyberprotection for every one. FOR PERSONAL Windows Mac iOS Android Privacy VPN SEE ALL COMPANY About Us Contact Us Careers News and Press Blog Scholarship Forums FOR BUSINESS Small Businesses Mid-size Businesses Large Enterprise Endpoint Protection Endpoint Detection & Response MY ACCOUNT Sign In SOLUTIONS Free Rootkit Scanner Free Trojan Scanner Free Virus Scanner Free Spyware Scanner Anti Ransomware Protection SEE ALL ADDRESS 3979 Freedom Circle 12th Floor Santa Clara, CA 95054 ADDRESS One Albert Quay 2nd Floor Cork T12 X8N6 Ireland LEARN Malware Hacking Phishing Ransomware Computer Virus Antivirus COMPANY About Us Contact Us Careers News and Press Blog Scholarship Forums MY ACCOUNT Sign In ADDRESS 3979 Freedom Circle, 12th Floor Santa Clara, CA 95054 ADDRESS One Albert Quay, 2nd Floor Cork T12 X8N6 Ireland twitter facebook linkedin Youtube instagram English Legal Privacy Accessibility Vulnerability Disclosure Terms of Service © 2022 All Rights Reserved Select your language1 * English * Deutsch * Español * Français * Italiano * Português (Portugal) * Português (Brasil) * Nederlands * Polski * Pусский * 日本語 * Svenska