Fake reservations, cloned voices, and WhatsApp: digital scams are becoming increasingly sophisticated

Fake reservations, cloned voices, and WhatsApp: digital scams are becoming increasingly sophisticated

Online scams have become an organized business, growing increasingly sophisticated and difficult to detect. Artificial intelligence and the use of personal data are changing the rules of the game when it comes to digital fraud. Cybercriminals no longer improvise: they combine advanced technology with real user information to create credible, personalized scams that are very difficult to identify at first glance.



 

Below, the company outlines some of the scams that are currently trending, according to Check Point® Software Technologies:

Travel Fraud: One of the most concerning campaigns detected recently targets travelers who have made reservations at hotels or apartments. Scammers impersonate well-known accommodations or platforms and contact travelers directly via WhatsApp using authentic details: full name, exact dates of stay, or type of reservation.

This information, previously obtained through phishing attacks on hotel systems, is used to build trust. Under the threat of an alleged cancellation within 24 hours, the user is invited to ?verify? their credit card via a fraudulent link, with the aim of stealing credentials or infecting the device with malware.

Voice cloning: Generative artificial intelligence has opened the door to one of the most shocking types of fraud. With just half a minute of audio (extracted, for example, from social media), attackers can mimic the voice of a family member and call pretending there is an emergency.

To reduce the risk, it is advisable to agree on a family code word and, if anything seems suspicious, hang up and call back a trusted number.

Personal data as currency: Information theft fuels these scams. On the dark web, a complete package of personal data can sell for prices ranging from 15 to 200 euros, depending on its quality and level of detail.

With that information, cybercriminals launch massive campaigns that prey on users? fears: fake warnings about ?storage full,? ?subscription expired,? or the loss of photos and files on cloud storage services. The ultimate goal is always the same: to steal more data or money by making users believe that their memories?such as photos or videos?are at risk.

WhatsApp and spam that arrives without permission: Leaked phone numbers also allow users to be added to WhatsApp groups without their consent. From there, fraudulent links, fake promotions, and new chain scams are distributed. Check Point Software reminds users of the importance of reviewing privacy settings to limit who can add us to groups and thus reduce these types of attacks.

To avoid falling into the trap, Check Point Software emphasizes the importance of adopting more critical digital habits. The company recommends always accessing services by typing the official web address directly into the browser, rather than clicking on links received via messages or emails.

It also advises reviewing WhatsApp?s privacy settings, under Settings > Privacy > Groups, to limit who can add you to conversations without your consent.

Also, remember that it is essential to be wary of any message that creates a sense of urgency or imposes very short deadlines. This type of pressure is usually a clear sign of a scam attempt.

Digital scams are no longer isolated attacks, but an organized business that combines artificial intelligence and real user data. This evolution makes fraud increasingly believable and difficult to detect. That is why it is essential for users to adopt more critical digital habits. Verifying information and not acting hastily can make the difference between falling for a scam or avoiding it”, explains Rafa López, Workspace Security Engineer at Check Point Software.