Typical pattern of attack
A typical cyber-attack takes place in 3 steps:
- The user’s PC is infected via an e-mail containing an attachment with harmful software (malware)
- The fraudster takes over control of the PC from a remote location
- He then creates fraudulent transactions and tricks the user into signing them
This means that cyber-attacks are targeted at the user’s PC itself. PCs can pick up these infections through ordinary actions such as visiting an infected website or by opening attachments to e-mails.
Once the malware is in place, the fraudster can take full control of the PC without the user even being aware of it. It’s as though the imposter himself (or herself) is sitting at your keyboard. He then waits until you are away from your desk to start making transactions, or he does it in the background.
However, the swindler cannot sign the transactions himself. So he tries to mislead you and encourages you to sign these fraudulent transactions yourself.