October 25, 2024

Understanding the Fake Invoice Scam and Protecting the Elderly – An Insightful Guide

This scam example involves Norton Antivirus, but these tactics are not exclusive to them. Scammers have used similar approaches while pretending to represent companies like Microsoft, PayPal, the IRS, Amazon, and more. This article outlines common tactics scammers use, especially against the elderly, and provides tips on preventing these types of scams.

From the FBI, “Elder fraud is an expensive crime. Scams targeting individuals aged 60 and older caused over $3.4 billion in losses in 2023—an increase of approximately 11% from the year prior. The average victim of elder fraud lost $33,915 due to these crimes in 2023.”

The Norton Antivirus Scam

In recent years, the Norton Antivirus scam (or fake invoice) has become increasingly prevalent, targeting individuals through deceptive tactics. This scam typically involves fraudsters posing as representatives of Norton Antivirus, a widely recognized security software brand. The objective is to trick victims into believing their computer is infected with viruses and convince them to purchase unnecessary software or services.

How the Scam Works

The Norton Antivirus scam operates through several common methods:

  1. Fake Emails and Pop-ups: Scammers send out emails that appear to be from Norton Antivirus, warning recipients that their antivirus subscription is expiring or that their computer is infected. These emails often contain links to fake websites that mimic Norton’s official site, prompting users to enter their personal and payment information.
  2. Cold Calls: Fraudsters may also call individuals, claiming to be Norton support representatives. They inform the victim of supposed issues with their computer and offer to resolve these problems remotely. During the call, they may ask for remote access to the computer or request payment for fake services.
  3. Fake Invoices: Some scams involve sending fake invoices via email, stating that the recipient’s Norton subscription is due for renewal. These invoices often include a contact number for “customer support,” which connects the victim to a scammer who requests payment details. The fraudster will often request control of the victim’s computer to process a refund related to the fake invoice.

Protecting the Elderly from Scams

Elderly individuals are often more vulnerable to such scams due to a lack of familiarity with modern technology and online security practices. Here are several strategies to help protect them:

  1. Education and Awareness: Educate elderly family members and friends about the existence of such scams. Explain the tactics scammers use and how legitimate companies like Norton will never ask for sensitive information via email or unsolicited calls. Regularly remind them to be cautious of unexpected communications regarding their antivirus software. Educate the elderly to never allow an unknown person to remotely access their computer. Never allow remote access to your computer and share banking information.
  2. Verify Communications: Encourage the elderly to verify any suspicious communications by contacting Norton directly through official channels. They should avoid using phone numbers or links provided in unsolicited emails or messages. Instead, they can visit Norton’s official website or use a well-known, trusted contact number.
  3. Install Security Software: Ensure that their computers have legitimate security software installed and updated regularly. Many security programs can detect and block phishing attempts, providing an additional layer of protection.
  4. Use Trusted Payment Methods: Advise the elderly to use secure payment methods and avoid sharing credit card or bank details over the phone or through email. Encourage them to use payment methods with fraud protection, such as credit cards, when making online purchases.
  5. Regular Check-ins: Regularly check in with elderly family members and friends about their online activities. Offer assistance with managing their antivirus subscriptions and any other online services they use. This can help identify and address potential issues before they become problematic.
  6. Protect Yourself:
    • Recognize scam attempts and end all communication with the perpetrator.
    • Create a shared verbal family password or phrase that only you and your loved ones know.
    • Search online for the contact information (name, email, phone number, addresses) and the proposed offer. Other people have likely posted information online about individuals and businesses trying to run scams.
    • Resist the pressure to act quickly. Scammers create a sense of urgency to produce fear and lure victims into immediate action.
    • Call the police immediately if you feel there is a danger to yourself or a loved one.
    • Be cautious of unsolicited phone calls, mailings, and door-to-door services offers.
    • Never give or send any personally identifiable information, money, gold or other precious metals, jewelry, gift cards, checks, or wire information to unverified people or businesses.
    • Make sure all computer anti-virus and security software and malware protections are up to date. Use reputable anti-virus software and firewalls.
    • Disconnect from the internet and shut down your device if you see a pop-up message or locked screen. Pop-ups are regularly used by perpetrators to spread malicious software. Enable pop-up blockers to avoid accidentally clicking on a pop-up.
    • Be careful what you download. Never open an email attachment from someone you don’t know, and be wary of email attachments forwarded to you.
    • Take precautions to protect your identity if a criminal gains access to your device or account. Immediately contact your financial institutions to place protections on your accounts and monitor your accounts and personal information for suspicious activity.
  7. How to Report: If you believe you or someone you know may have been a victim of elder fraud, file a complaint at the FBI’s Internet Crime Complaint Center at ic3.gov. When reporting a scam—regardless of dollar amount—include as many of the following details as possible:
    • Names of the scammer and/or company
    • Dates of contact
    • Methods of communication
    • Phone numbers, email addresses, mailing addresses, and websites used by the perpetrator
    • Methods of payment
    • Where you sent funds, including wire transfers and prepaid cards (provide financial institution names, account names, and account numbers)
    • Descriptions of your interactions with the scammer and the instructions you were given

Whenever possible, you should keep original documentation, emails, faxes, and logs of communications.

Conclusion

The fake invoice scam is a sophisticated and insidious fraud that preys on individuals’ fears of computer infections. By understanding how the scam works and taking proactive measures, we can protect our elderly loved ones from falling victim to these deceitful tactics. Education, verification, and regular support are key to ensuring their online safety and peace of mind.

Our mission is to help clients protect assets and enhance employee outcomes through the delivery of exceptional risk management and employee benefit consulting services and products.

Copyright © 2025 The Fedeli Group Powered by DevQ