Tuesday, April 28, 2026

Scammers and AI

 

Scammers are getting more and more creative and harder to detect with the advent of Artificial Intelligence.  AI can be a fantastic tool for finding information, helping with documents, doing science.  AI can also be used to nefarious purposes; creating voices of people you know, text in their style of writing, in addition to the usual spoofing of email addresses, presenting as a company you deal with, and more.

Here’s what my credit union, Coast Hills, sent out today about scams.  I thought I’d share with you all.

 

 

Most of us have clicked the little “I’m not a robot” box without giving it a second thought. It’s a normal part of browsing online, whether you’re signing in, filling out a form, or making a purchase. Because it feels familiar, it’s easy to trust. However, scammers are now using fake CAPTCHA pages to take advantage of that trust.

 

These scam pages look like normal security checks, but instead of verifying that you’re human, they’re designed to trick you into infecting your own computer. After clicking the box, you may be told to complete a few “verification steps,” often involving a series of keyboard commands. While it may seem like part of the process, those commands can actually download malware onto your device.

 

Once installed, that malware can give scammers access to sensitive information like saved passwords, online banking credentials and personal data.

 

How CAPTCHA Scams Work 

1.  A Familiar-Looking CAPTCHA Page Appears: You may land on a fake website or click a link that brings up what looks like a standard “I’m not a robot” verification box. Because the page looks legitimate, many people don’t think twice before clicking it.  

2.  You’re Asked to Follow Keyboard Instructions: After clicking the box, the fake CAPTCHA may display step-by-step instructions telling you to press certain keys on your keyboard. For example, it may ask you to open the Run command on your computer, paste in a line of text, and press Enter to “complete verification.” These steps may look like part of the security process, but they are actually designed to run malicious code and install malware on your device.   

3.  The Commands Install Malware: What you are actually doing is running malicious code on your own device. This can install malware that steals information, tracks activity, or gives scammers remote access to your computer.

4.  Your Information Is Put at Risk: Once malware is installed, scammers may be able to capture usernames, passwords and other sensitive personal or financial information without you realizing it.

How to Protect Yourself

1.  Be Suspicious of Extra Steps: A real CAPTCHA test will never ask you to press keyboard shortcuts, copy and paste commands, or open programs on your device. If you see instructions like that, it’s a scam.   

2.  Stop Immediately if Something Feels Off: If a website asks you to complete unusual steps after clicking a CAPTCHA box, close the page right away. Do not continue entering information or following prompts.   

3.  Use Trusted Security Software: Antivirus and browser security tools can help detect malicious websites and block harmful downloads before they can do damage.   

4.  Verify Before You Act: If the CAPTCHA appeared while trying to access an account, go directly to the company’s official website instead of following prompts on a suspicious page.

Scammers are getting creative by making fake security checks look convincing, but the warning signs are there. If a CAPTCHA asks you to do anything beyond checking a box or selecting images, stop immediately. Knowing what to watch for can help protect your personal information and your finances.

If you think you’ve been the target or victim of a scam, please call your financial institution(s) right away and have them check for fraudulent activity on your accounts.  You can also have them activate alerts.  Run your anti-virus and anti-malware programs right away.  Windows has built-in anti-virus, called Windows Defender, which you can run by going to:

 

Settings > Privacy and security > Windows security > Virus and threat protection and then clicking the <Scan Now> button.

 

Windows Defender will also offer to quarantine or remove items it finds that are harmful.

For an additional layer of protection, you might have a program like Malwarebytes Anti-Malware (MBAM) installed.  Its icon is a big blue “M” shape.  Double-click that and then click the <Scan> button.  I’d recommend doing this about twice a month, more often you tend to be online for long periods of time.  If MBAM finds any threats, you can quarantine those items where they will be harmless.

Also, run Windows Update occasionally and install those.  Microsoft has been making a few changes; some are even welcome, to Windows to improve the experience.  Such as once again allowing users to move the Taskbar to places other than the bottom of the screen, and other under the hood improvements for performance and security.

And a friendly reminder to make your backups.  Copy and paste your important files to a USB flash drive, a USB hard drive or solid state drive, or create a DVD with your data on it.  Then keep those in a safe place.  Something that I offer is having a dedicated 2TB (terabyte) USB hard drive just for client data, and I have a Network Attached Storage device.  You can pick up a USB flash drive at Office Depot, WalMart, or order it online from Newegg or the previously mentioned companies.  Good manufacturers are Lexar and Sandisk.  I’d recommend 128GB capacity for a USB flash drive, and 1TB for a USB hard drive, though capacity depends on budget.  Buy what you can afford.  You can find Lexar USB flash drives here.  Or Sandisk drives here.  This is a link to USB hard drives.

            Network Attached Storage is a computer that has a bunch of hard drives in the case.  I found one last year at an estate sale that can hold 12 drives!  Right now, mine has nine drives installed: one that runs the operating system (OS), and eight for data including photos, documents, music and audio, and programs.

            If you already have a spare hard drive, Orico makes excellent cases for both 2.5” laptop style drives, and 3.5” desktop style drives.  They are even tool-less, just slide the cover off, slip the drive in, and close.  There are a variety of connections: USB-A and –C, USB-A is the older rectangular style plug, while USB-C is the smaller oval shape, like on most modern smartphones and tablets.

            In other computer news, prices for parts are still astronomical.  Some tech people are saying that prices should be coming down in a few weeks to months.  Pre-built computers seem to be holding their pricing still, even laptops haven’t affected too much by the increases in memory and SSD (solid state drive) pricing.  Other than grabbing old computers at garage and estate sales, I’m not planning any parts purchasing this year, unless it’s an emergency.

            Even with the pricing being the wrong side of sane, I’d still recommend 16GB (gigabytes) of memory and at least a 512GB SSD, along with a good processor, like an Intel Core i3 or AMD Ryzen 3.  As always, bigger numbers usually mean better performance, and higher cost.  If you are okay with used computers (I know I am normally), you might check out Dell’s refurbished center.  They usually have some good deals and even offer coupon codes with up to 50% off at times.

 

            If you found this useful, and know someone that could benefit from the info, please feel free to forward this document on.  This one is a bit longer than my usual email, but I thought the content from Coast Hills was important to share.

            Any questions, please let me know.

           

 

No comments:

Post a Comment