Impersonation

SHARE
Facebook
Twitter

Impersonation is a technique that fraudsters use to pretend to be someone in authoritative position  such as a CEO,  senior executives, or a reputable company, typically to deceive the victim to reveal sensitive information or to make fraudulent payments for their own benefit. Fraudsters use various methods, including phone calls, AI generated emails, deepfakes and fake websites, to appear legitimate and gain the victim's trust. They often create a sense of urgency or fear to pressure victims into acting quickly without thinking.

How it happens and red flags to look out for

  • The fraudster may pose as a senior leader of an organisation .The goal is to get victims to provide sensitive information or to transfer funds directly to the fraudster.
  • Fraudsters create a sense of urgency, claiming that immediate action is needed to prevent fraud, which can lead victims to bypass normal security protocols, be wary of such requests.
  • Fraudster uses deepfake audio/video to mimic a CEO or stakeholder requesting an urgent transaction.
  • Fraudsters spoof email addresses to appear legitimate, such as using @absa.africa.com instead of the genuine @absa.africa. They also create counterfeit websites that closely resemble the bank’s official site, like www.absa.africa.com instead of www.absa.africa.

How to respond and protect yourself or organisation

  • Remain sceptical / vigilant of urgent requests especially over WhatsApp or unfamiliar channels.
  • Be cautious of divulging sensitive company information.
  • Avoid Suspicious Links: Refrain from clicking links or downloading attachments from unfamiliar sources.
  • Check URLs carefully before providing any information.
  • Verify Communication: Always confirm the identity of anyone requesting sensitive information or funds, particularly if the request is unexpected
  • Look out Slight voice or visual glitches: Lip sync issues, unnatural blinking, or robotic tone to detect deep fakes.
  • Look out for out of the norm requests and do not respond to suspicious requests

Reporting options

Related Articles

FRAUD

Fraud Alert

Fraud is more than just a crime—it’s a global threat that silently drains billions from economies, shatters businesses, and ruins lives. From Social engineering, Cyber scams and identity theft to corporate deception, embezzlement and financial misstatements, fraud erodes trust in systems we rely on daily.

FRAUD

Spyware

Spyware involves the use of malicious software to covertly infiltrate computers or networks with the intent of collecting sensitive information. The information collected can then be used by fraudsters to commit fraud, including unauthorised access to bank accounts, theft of corporate data, and manipulation of financial transactions.

FRAUD

Keylogger

Keyloggers are programs that record everything you type, including passwords, emails, and credit card numbers. Installed via Trojans or malicious downloads.