Cyber attackers constantly come up with new ways to trick us into doing things we shouldn’t do, like clicking on malicious links, opening infected email attachments, even giving up our passwords. While all of this may seem overwhelming, most of these attacks share one thing: emotion. By knowing the emotional triggers that cyber attackers try and exploit, you can often spot their attacks no matter what method they’re using. Here is a list of the most common triggers.
Urgency
Urgency probably tops the list for criminals because it’s so effective. They will often use fear, anxiety and intimidation to rush you into making a mistake. An example would be you get a text message from a cyber attacker pretending to be the government saying your taxes are overdue and you have to pay now or you’ll go to jail. The IRS would never send a text like that, but it can be nerve wracking.
Curiosity
Sometimes the attacks that are the most successful say the least. Curiosity is evoked with surprise; we want to learn more. It is a response to something unexpected. For example, a cyber attacker sends you a message that a package is undelivered and to click on a link to learn more, even though you did not order anything online. We are enticed to learn more! Unfortunately, there’s no package, just malicious intent on the other side of that link.
Excitement
You get a text message from your bank or service provider thanking you for making your payments on time. The text message then provides a link where you can claim a reward–a new iPad, how exciting! The link takes you to a website that looks official, but asks for all of your personal information, or says that you need to provide credit card information to cover small shipping/handling costs. This is a cyber attacker who is simply stealing your money or your identity.
Trust
Attackers use a name or brand you trust to convince you into taking an action. For example, a message pretending to be from your bank, a well-known charity, a trusted government organization, or even a person you know. Just because an email or text message uses a name of an organization you know and their logo, does not mean the message actually came from them.
Sometimes cyber attackers will use a combination of these different emotions in the same email, text message, social media post, or phone call – making it that much more effective.
Here is the tough part about these criminals. They don’t always just use one method. They’ll use a combination of emotional attacks in the same email, text, social media post, or phone call – making the crime much more effective.
However, by better understanding these emotional triggers, you will hopefully be better prepared to spot and stop cyber attackers, before it’s too late. If you have questions or feel like you have been scammed by a fraudster, please don’t hesitate and reach out immediately. We’re are always available to help. Contact your local office today.