LEGAL/ETHICS
Out-thinking the cybercriminal
Cybercriminals take advantage of the nature of human psychology to ensnare their victims. Understanding the tactics they employ is the key to defeating them
March 1, 2012
-
The internet is a domain where we can feel both secure and anonymous, or afraid to the point of panic due to our uncertainty about cybercrime. At times we feel safe and secure – the criminals cannot physically reach us (or so we tell ourselves), and our presence online feels anonymous in many cases. On the other hand, we hear the tales of those who have fallen victim to online offenders, and we fear that a similar fate may await us if we do not take adequate care of our online selves. Both aspects of these conflicting emotions are exploited by cybercriminals, who take advantage of the nature of human psychology to ensnare us in traps such as fraud, downloading malicious software and, in some cases, the online predation of children.
Cybercrime includes a wide variety of activities, including hacking, malware development and distribution, identity theft, child pornography offences, cyberterrorism and copyright infringement. These offences and their perpetrators are fascinating from a psychological perspective, in particular because of the psychological tactics that some of these offenders use in order to ensnare their victims.
Looks phishy?
Most internet users will have experienced a ‘phishing’ scam at some point, where an email is received which asks the recipient to engage in a behaviour which can eventually lead to fraud or identity theft. Cybercriminals attempt to exploit weaknesses in human perception and decision-making in order to draw in their victims and persuade them to part with personal information. Firstly, they might include information in the emails that makes it look like they have originated from a legitimate entity, such as a trusted company or organisation. This information can include elements such as the organisation’s logo, a legitimate-sounding email address, and use of the recipient’s name. These tactics rely on the ‘heuristics’ or shortcuts that humans use when making decisions – it is impossible for people to consider all elements of every situation, and so we tend to pay more attention to salient cues – those cues which ‘jump out’ at us. We are especially likely to comply when these cues suggest that the source of the email is an authority figure, such as a well-known company, a bank executive or a professional in a position of authority.
This weakness in decision-making may occur if the potential victim feels that they are under time pressure to respond, and potential fraudsters also make use of this vulnerability by inducing fear or greed in their victims. Fear is invoked by suggesting that the victim may lose money or get into trouble with authorities if they do not respond to the phishing email quickly. Some emails have given the impression of coming from government agencies, indicating that users must respond immediately to pay overdue taxes, and a delay in responding could result in prosecution. Similarly, a phishing scam may attempt to worry victims by suggesting that their online banking account may have already been infiltrated, and they must immediately log in to ensure their losses are minimised. They are encouraged to do this by clicking on a link in the email which brings the user to a webpage which appears to be the login screen for the online banking account. The user may then input their username and password for the account, and only later discover that the webpage is only a copy of the site, created by the fraudster to capture the victim’s account information.
A potential victim’s greed is manipulated when an email offers a share of a large amount of money if the victim agrees to help the fraudster in some way (such as by moving a substantial inheritance or cash amount out of one country and into another). Other emails suggest that the recipient has won a lottery, or is entitled to some form of compensation which they have not applied for. Any person who responds to these ‘advance fee fraud’ emails will find that they are asked for an initial cash injection, either to enable the transfer of the larger sum or as an administrative charge. As the scam progresses, the victim is asked to part with larger and larger sums of money, without ever seeing the promised windfall. On a positive note, similar scams which offer significant sums of money have been in circulation for some time, and as such many internet users are aware of their existence and the nature of the fraud involved. Nevertheless, some fraudsters have developed new methods of exploiting human greed. A recent email circulating in Ireland was written in Irish, and appeared to come from the Revenue Commissioners. This email indicated that the recipient had overpaid taxes, and as such was due a refund. The sum was small, but still desirable, and the email simply asked the user to complete an online form to claim their refund. The information provided through this form would be sufficient for identity theft to take place.
An emotional phish
Online fraudsters may also attempt to manipulate other emotions in their potential victim, including sympathy or guilt. This can be accomplished by sending emails that ask the recipient to send a donation to the sender so that they can obtain some vital food or equipment which they need for survival. The recipient is likely to find that if they make the initial donation, they are repeatedly asked for larger and larger sums. In some cases, the email may claim to be from someone who is suffering from a life-threatening illness. This individual may claim to need the direct financial support of the potential victim, and in these cases the emails are designed to elicit sympathy, but in other cases these emails may use a combination of the sympathy and greed tactics. They do this by suggesting that the sender is close to death, and needs to transfer a significant amount of money out of their country, which they can only accomplish with the help of the email recipient. Such emails often indicate that the monies transferred should be used for specific purposes, often relating to religious charities, but the amounts involved are sufficiently high so as to tempt the potential victim to keep some or all for themselves. These emails sometimes indicate that the target was chosen as they appeared in online search results for an ‘honest’ or ‘honourable’ individual. This is mentioned in order to explain why the email recipient does not know the sender. The email may also use friendly or overly familiar language in an effort to gain the recipient’s trust.
In some instances, the potential fraudster might target a specific individual – a technique known as ‘spear-phishing’. In this case the fraudster may take considerable time and effort to uncover details about the target, such as the name and details of their manager, colleagues or even friends and family. The email sent can then include these details, lending greater weight to the content as it in some cases appears to be endorsed by people the recipient trusts.
These types of attack demonstrate another human psychological weakness: confirmation bias. When we develop a tentatively held belief – such as that our manager has requested us to share confidential data with a third party – we tend to seek information that confirms this belief (for example, mention of our manager by name in the email) and do not actively seek evidence which might support an alternative conclusion (for example, a brief phone call to our manager would quickly uncover the fraud, but we are not inclined to do so).
A final type of fraud involves online dating. In this type of offence a user of an online dating website might find themselves communicating with a potential partner, only to find that their perceived love interest makes more and more demands of them, often seeking financial support. The excuses the dating partner provides are numerous, and often heart-wrenching, as they might seek money to help to pay hospital bills or to make emergency travel plans. Many individuals have been defrauded of significant amounts of money due to such scams, and when the truth finally emerges the victim may find themselves with particularly deep emotional wounds, as they also face the reality that their potential romantic relationship was a lie.
Malware
‘Malware’ is a catch-all term for ‘malicious software’ – any type of software which causes intentional harm to a victim’s computer or other device. Malware includes software such as computer viruses and spyware, as well as lesser-known terms such as ‘rootkits’, ‘Trojans’, ‘keyloggers’ and ‘worms’. The methods of transmission of such malware have changed over time – 20 years ago one of the most common methods of transmission was by infected floppy disks, whereas today most malware is transmitted using the internet. Nevertheless, in many cases the malware requires some human action before it can infect a system or replicate itself.
Some malware hides itself within seemingly useful programmes or files which a user may download from a website. Other malware is transmitted using email or via social networking sites. In many cases, the malware takes advantage of human psychological processes to encourage a user to install or download the file. Historically, there are key examples of computer viruses that exploited human desires: the ‘I love you’ virus of 2000 infected millions of computers as their owners attempted to open an email attachment that appeared to be a love letter. In 2001, the ‘Anna Kournikova’ virus spread rapidly as it feigned to be a photograph of an attractive tennis player. In more recent times, social networking site users have been the targets of malware, and again the malware appears to offer something of interest to the user. This may be a video or photograph, or even an application which allows the user to see who has viewed their profile. When a user clicks on such links, they can inadvertently allow the malware to collect personal information from their account. The malware will frequently post a new link to itself on the user’s status update, often without the user’s knowledge. In these cases, the malware can spread quickly, as it appears to friends of the initial victim that the person has endorsed and approved of the video, photograph or application, and so many may unintentionally fall for the same trick.