Cybercriminals turn to mind games to trick users

New research from the University of Leicester finds that cybercriminals are increasingly using psychological techniques to get victims to download malware.

Organised crime is turning to using mind games on PC users in a bid to trick them into handing over personal information and money, according to new research.

The study, carried out by Professor Clive Hollin, a forensic psychologist at the University of Leicester, found that criminals are assuming trustworthy identities and engaging in friendly banter in order to steal from their victims.

The Mind Games report, commissioned by anti-virus company McAfee, found that internet fraudsters carry out research into psychological "hotspots" and triggers of potential victims. This meant that fraudsters often piggybacked scams on top of topical news stories or current sporting events in order to make the scam appear authentic.

Also, typical emails will contain essential elements that play on and exploit the human condition. Examples cited in the research were web links that read "Click here for a reward" or "Click here to avoid something you don't want to happen".

Professor Hollin said that given the right conditions in terms of the persuasiveness of the communication and the critical combination of situational and personal factors, most people may be vulnerable to misleading information.

"This point is true both for experienced and inexperienced computer users: while naivety may be a partial explanation, even sophisticated users can be deceived and become suggestible to misleading messages," said Hollin.

According to Greg Day, security analyst at McAfee, cybercriminals are relying more and more on social engineering techniques as computer security improves.

"Like con men on the street devising new tricks, internet fraudsters need a never-ending supply of ways to exploit victims online," said Day. "Bypassing mental barriers rather than software security is an increasingly evident tactic of cybercriminals and one that will only continue become more prolific in the raft of online attacks."

Featured Resources

Seven steps to connect and empower your frontline workers

How business leaders can improve communication with a secure platform

Free download

Create what’s next

The future of collaboration and productivity

Free Download

Leveraging the cloud without relinquishing control

Your data. Their cloud.

Free download

Re-architecting for nonstop innovation

Unlocking productivity, scalability, and lower costs for cloud natives

Free Download

Most Popular

Looking beyond the obvious: What’s best for multi-cloud?
Sponsored

Looking beyond the obvious: What’s best for multi-cloud?

8 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021
How to speed up Microsoft's Windows 11
Microsoft Windows

How to speed up Microsoft's Windows 11

9 Nov 2021