7am: Read the newspaper or watch the news. Staying up on current events and hot button topics can provide opportunities for new tricks and scams. 9am: Time to head to the office! While there are some lone wolves, many organized cyber criminals find safety (and talent) in numbers. 11am: Ransomware attack on a hospital. He has complete control over all their systems and data, and the hospital will have to pay him to regain access to their own systems and private records. Now all the criminal must do decide is ‘how much?’. 1pm: After a lunch break, it’s time to start scrolling on social media. Cyber criminals often have multiple fake accounts, built out with stolen photos and information to make them look like real people. They send out friend requests, and, when someone accepts, they use the information listed on their profile to target them for different scams and schemes. They can even use the information to hack them directly, gaining even more access to personal information that can be used, shared, or sold. 4pm: End the day with cold calls. Thanks to lists obtained on the dark web, cyber criminals have access to personal information they can use to fool you over the phone. With caller ID spoofing software, you’ll never know who’s calling or how to track them down once they’ve gotten what they want. |