“Hello Emmanuel, I am the Escrow for the (*calls the name of the telegram crypto group where I was scammed of my close to last 3k earlier in the day*) what happened you just disappeared, the guy that wanted to sell the cypto to you was looking for you, we couldn’t proceed with the transaction”
Quick Pause, Let’s rewind.
So here I was, a broke Nigerian student who had just received his monthly 10k from home. I had heard a lot about how ‘**Crypto has changed a lot of people’s lives**’ so I started planning on how I would also invest small money and cash out big -lol, I did my own research online and in the process of my ***great research***, I ran into a telegram group whose **mode of operation made sense to me; it appeared okay**
You announce if you want to buy or sell, then a potential buyer or seller who is interested negotiates with you in public, then after agreeing on a price you guys call on the Escrow who then sends his account details and the price he would charge for the transaction, payment is made to his account, and the coin is sent to the receiver who then notifies the admin on receiving the coin so the money can be released to the seller. The admin acts as a middleman who makes money from commissions – who would think it was a well-planned fraud.
I observed the platform for a while, and I was persuaded by what I had seen on the platform. Fast forward to the D-day, I had just received my monthly alert, paid my tithe did my calculations, and saw that the money left wasn’t close to being enough, so I thought the best thing to do was *invest 2k in one coin like that* which I heard about online, it pumps between 1 or 2 weeks and then I kiss SAPPA bye forever – perfect plan.
So, I announced I needed a coin on the platform, found a seller, we agreed on the rate then called on the admin/Escrow who told us about his commission, I agreed, and then he sent his account details which I sent the money to after which I was waiting for the escrow to confirm the alert. After waiting for a while, I sent him a message on the group that I sent the money to, he told me to wait for him to confirm and then suddenly, I could not find the group in my telegram app – I had been removed….. I searched for the group on telegram but I could not find it. It was then I started to think the group might be a scam.
Back to the future [later in the evening].
The admin called asking me what happened, that “all of a sudden I disappeared from the group”, he sounded so concerned that for a moment I believed it could have been a bug in the telegram. To cut the story short this guy only called to extract more money from me but as I was broke already I couldn’t pay more money to get more crypto-like he suggested so I asked for a refund which he promised after his Association of Telegram Escrow meeting, two days and multiple calls passed but I still didn’t get back my money, only for me to end up being blocked by the Escrow, at this point, it became clear beyond doubt that I had been scammed. How is that even possible –PERSUASION
What are persuasion techniques?
Persuasion is the process by which a person’s attitudes or behavior are, without duress, influenced by communications from other people. One’s attitudes and behavior are also affected by other factors (for example, verbal threats, physical coercion, one’s physiological states)
Hackers, social engineers, or con artists often employ Persuasion Techniques to influence people’s attitudes, thought processes or decisions. Below are the most used of these techniques.
People are conditioned to respond to an authority figure or do a great deal for someone they think is in authority. Compliance is easier to obtain when it is perceived that the requestor is in a position of authority, as people usually follow an expert or pretense of authority. This is because we tend to assume their position gives them access to information or power. Fraudsters often exploit this to their advantage. An example of how criminals use authority is the common CEO fraud. In this fraud, criminals impersonate the CEO or financial head of an organization either through email or a phone call and get an employee (in the accounts department) to wire money to a fraudulent account.
Spotting the use of authority can be daunting, but possible. It begins by having critical trust in Authority, knowing that even if the source of the message is a legitimate, well-intentioned authority, they may not always be correct. Also, ask yourself if the authority is acting in ways consistent with their character and be suspicious of requests from authority figures that use urgency or fear.
Social proof/Social Influence
People are more likely to conceive of a behavior as normal, and to engage in those behaviors if there is a belief that others are doing the same thing. That is, we are more likely to engage in an activity if we are convinced that others are doing so, or they approve if such. This technique is widely used to commit fraud based on the popular saying that ‘Nothing draws a crowd like a crowd.’ This technique can be seen in Emmanuel’s scam experience. The telegram group was populated with fake accounts connected to the scammers to give it an appearance of legitimacy. To an outsider just joining the group, it would appear as if transactions were being carried out by many people.
To mitigate social proof, it is always good to remember that the involvement of many people does not grant legitimacy. Watch out for conversations that begin with “other are into it,” such you set off alarm bells.
Urgency and Scarcity
Urgency has to do with time constraints while scarcity is concerned with limited availability or quantity. People are influenced to make decisions based on the fear of losing a perceived opportunity or if that thing will soon be restricted or more expensive later. An example of a cybercriminal using urgency would be a phishing email asking you to click a link to reset your password as it is set to expire in the next 24 hours. While that of scarcity would be an investment scammer telling you he has only three more slots available for an opportunity that would earn you a ton of money.
To avoid being a victim of this, you need to train yourself to recognize scarcity and urgency in communications. When appraising any communication, ask yourself questions such as:
Am I being asked to perform an action within a limited time?
Does the offer or opportunity limited with respect to time, information or quantity?
Once the presence of such is noticed pause and do more research.
Commitment and Consistency
As humans we value commitment and consistency. No one admires someone who says one thing and does another. As such people tend to adapt their self-image to commitments, they believe they have made, particularly when those commitments are written down, recorded, or formally made. Fraudsters exploit this trait by getting people to make an initial commitment, they know once someone has made a commitment, they are more likely to abide by it since they would not want to be seen as being inconsistent. An example of this can be found in romance scams. The fraudster asks the victim for a “favor” that is insignificant or would not cost the victim much. Once the victim performs this initial act, the fraudster then sets us a scenario the requires the victim to do something more significant or costly.
A way to mitigate this is to be on the lookout for those who request repeat favors. After ana initial request is obliged, if someone returns asking you for something else, pause and ask yourself, “Am i being manipulated?” Do not perform the action requested but take some time to think it over.
Likability and Similarity
Christopher Hadnagy captures the core of Likability and Similarity when he said “People like people who are like them. People like people who like them.” The first part of the statement, “People like people who are like them” refers to similarity. People tend to like other people with similar interests, hobbies, dispositions, or backgrounds. Fraudsters take advantage of this by joining groups to which their targets belong. For instance, an investment scammer might join a gym or a club where wealthy targets go to get common grounds and points of similarity for future engagements with the targets.
The second part “People like people who like them” refers to likability. People tend to reciprocate likeness to people who like and show an interest in them. Scammers exploit this trait by dressing smartly to appear likable and complimenting their targets and feigning interest in them.
To mitigate this, you must audit your decision-making process and ensure that you are not making decisions based on factors such as your likeness of the person involved or that you share common interests.
This uses the tendency for people to feel an obligation to make a concession to someone who has made a concession for them. People are more likely to follow a request when they feel a sense of obligation or indebtedness towards a requestor. This technique is commonly used by scammers for planned fraud against people, by offering them favors or kindness causing people to feel indebted to returning the kindness. For example, an investment scammer might invite you to attend an “investment seminar” where the first fifty people would get free gifts. Such gifts are to make you more likely to invest your money out of a sense of obligation.
It is worth noting that these techniques can be used on their own but are more powerful when combined. Fraudsters and Cybercriminals often use two or more techniques together, with devastating effects. But we believe that being aware of and understanding these techniques can help you avoid being defrauded.
Egbetola OluwasolaBadmus AnuoluwapoEgbetola Oluwasola