Cybercriminals try to capitalize on tragedy

Cybercriminals try to capitalize on tragedy

Cybercriminals have tried to profit from the Boston Marathon bombing by fraudulently soliciting donations.

Cybercriminals have tried to profit from the Boston Marathon bombing by fraudulently soliciting donations.

Tragedy can bring out the best and worst in people. On the one hand, the United States saw an outpouring of support from other nations following the bombing that occurred at the Boston Marathon. In addition, numerous corporations and countless citizens have donated money to charities in support of the attack’s victims. On the other hand, several cybercriminals have crawled out of the woodwork looking to capitalize on that spirit of generosity and profit from those attempting to help others in need.

The FBI issued a notification warning the public that cybercriminals were using the tragic event to try and scam internet users with malware. Some instances simply involved fraudulent links to purported news sites covering the bombing. When users clicked on them, however, they were taken to compromised sites rife with malware. In more insidious cases, cybercriminals posed as official organizations representing the Boston Marathon and attempted to solicit donations from members of social media sites.

The FBI recommended that internet users take several precautions to avoid scams such as these:

  • Never agree to download software in order to view site content
  • Practice due diligence before making any donations to a purported charity
  • Only make donations through secured financial transactions such as SSL certificate-secured credit card payments
  • Never click on links received in an unsolicited email, even if they appear legitimate

Precautionary internet surfing practices are a good safeguard against cybercriminals, but users should take steps beyond that as well. People cannot be expected to be alert to the threat of hackers and data thieves at all times. That is why quality application control or whitelisting tools can be major resources for any internet user. If a malware program attempts to launch on a computer, whitelisting software will recognize it as an unauthorized application and block it. With these tools, people can be assured that unidentified malware cannot run on their systems.

About The Author

Scott Cornell

When he’s not knee deep in blogging and all things tech, Scott spends his free time playing ultimate Frisbee and watching foreign films. An expert in emerging tech trends, Scott always has his ear to ground for breaking news related to IT security.

Sign Up For A 30-Day Trial


Deep Freeze Enterprise

Centralized deployment and management as well as a host of configuration options for the Enterprise.

  • This field is for validation purposes and should be left unchanged.

Ready to find out more about Faronics? Let us know how to reach you.

We're here to help you in any way possible.