Part 4/15:
A notable part of this method involves social engineering: establishing trust by sounding official, friendly, and reassuring. The scammer emphasizes that many targets are ordinary people who often lack digital security literacy, making them more susceptible. He describes how the scammer exploits fears of hacking and the trust placed in big corporations.
The scam isn't limited to simple phone calls. The scammer describes sending fake links resembling genuine websites, tricking victims into inputting credentials, which are then harvested for further exploitation like draining bank accounts or cryptocurrency wallets.