loder
image
  • Home
  • About Us
  • CERT-GH
  • NCSC Tools
  • NCSC Resources
  • Advisories
  • Media
    NEWS
  • Report An Incident

Press Releases

image
CYBERSECURITY ADVISORY TO THE PUBLIC- GHANA ARMED FORCES (GAF) ENLISTMENT SCAM

TThe National Cyber Security Centre (NCSC) of the Ministry of Communications has received multiple reports of recruitment related scams targeting the public and specifically the youth through the Ghana Armed Forces enlistment programme.

Download
  • Feb 10, 2021
image
Fake Audio Circulating on Social Media

The attention of the National Cyber Security Centre (NCSC) has been drawn to an audio circulating on social media purporting to be a news report from an international news outlet suggesting that a Ghana Government official has been caught laundering cash into the UK.

Download
  • Oct 10, 2020
Stopping your smartphone or tablet being hacked at an airport, hotel or café.

If you use public Wi-Fi or USB power charging stations at airports, hotels, and other locations, make sure to use a VPN when using public Wi-Fi, and always make sure to use a USB data blocker, also known as a USB condom when using the public USB power charging stations.
While the risk from using public USB power charging stations at airports, hotels, and other locations might be minimal, a USB port is a gateway into a device, and allowing any scabby charging station access to your devices seems overall like a bad idea.
The USB data blocker blocks all data transfer, but the built-in chip detects the type of device which is connected and swaps between Apple, Universal, and Samsung charging specifications, thus enabling the fastest charge possible.



Sextortion

Sextortion is a form of blackmail in which sexual information or images are used to extort sexual favors or cash from the victim. Social media and text messages are often the source of the sexual material and the threatened means of sharing it with others.

This is a criminal offence, report immediately, send us an email and report the incident, include all evidence of the blackmail to report@cybersecurity.gov.gh , you can also send us a whatsapp message to 050 160 3111



WhatsApp Scam

Whatsapp Gold!! This is nothing but a trick used by scammers to install malware and viruses onto our phone or device. It’s an old trick, claiming that there is a secret update to WhatsApp that gave users enhanced features that could be shared around. The scammers provide a link that would supposedly enable people to install WhatsApp Gold but, in reality, would trick them into downloading malware.



Ways to Avoid Being a Victim of Mobile Money Fraud

It is highly advised not to share Personal Identification Numbers (PIN) or secrete number with anyone and this includes mobile money agents, workers of any telecommunication network and your friends.
Mobile money agents and telecom workers are not to ask you for your PIN to initiate any transaction on your behalf. Your PIN is your secret number.

Make sure that your PIN is difficult to guess. When choosing your 4 numbers, it’s best to avoid using the year of your birth, the day and month of birth, repetitive numbers like 1111, 2222 etc. Also avoid common pattern numbers like 1234 or 2018.
Use a PIN that would be difficult for people to guess, but easy to remember. If you currently have a weak PIN, you can change it.

Don’t ever give your mobile phone to agents to do a transaction on your behalf. If you give your phone to an agent to initiate a transaction on your behalf, you expose yourself to being defrauded.

Whenever you make a deposit at any mobile money merchant shop, make sure you receive confirmation text before you leave. Make sure the text received is from the said telecom company. Be vigilant and watch out for text messages from suspicious phone numbers. Always verify transaction details before withdrawing or transferring money.

Don’t trust text messages from suspicious phone numbers regarding your mobile money account. Treat such numbers with suspicion and don’t follow instructions they ask. Beware of scam calls asking you to send mobile money to their accounts to receive cash prizes or asking for your account details. Whenever in doubt, don’t hesitate to call the customer service number.

How to Recognize and Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could gain access to your email, bank, or other accounts. Scammers launch thousands of phishing attacks every day and they’re often successful. But there are several things you can do to protect yourself.



Scammers use familiar company names or pretend to be someone you know. They ask you to click on a link or give passwords or bank account numbers. If you click on the link, they can install programs that lock you out of your computer and can steal your personal information. They pressure you to act now – or something bad will happen.

Check it out.
Look up the website or phone number for the company or person who’s contacting you. Call that company or person directly. Use a number you know to be correct, not the number in the email or text. Tell them about the message you got

Look for scam tip-offs.

  • You don’t have an account with the company.
  • The message is missing your name or uses bad grammar and spelling.
  • The person asks for personal information, including passwords.
  • But note: some phishing schemes are sophisticated and look very real, so check it out and protect yourself.
  • Just place your cursor on the link you have been asked to click to verify the web address.

Keep your computer security up to date by installing an antivirus, update it regularly and back up your data often.
Consider multi-factor authentication – a second step to verify who you are, like a text with a code – for accounts that support it.
Change any compromised passwords right away and don’t use them for any other accounts.

Ways to avoid being a Romance Scam victim.

Romance scammers are smooth operators and can take their time to set their trap. Scammers take advantage of people looking for romantic partners, often via dating websites, apps or social media by pretending to be prospective companions. They play on emotional triggers to get you to provide money, gifts or personal details.



  • Your new romantic interest sends you a picture that looks more like a model from a fashion magazine than an ordinary snapshot.
  • The person quickly wants to leave the dating website and communicate with you through email or instant messaging.
  • He or she lavishes you with attention and often overwhelm prospective marks with texts, emails and phone calls to draw them in.
  • He or she repeatedly promises to meet you in person but always seems to come up with an excuse to cancel.
  • Do take it slowly. Ask your potential partner a lot of questions, and watch for inconsistencies that might reveal an impostor.
  • Do check the photo, using Google’s “search by image” feature. If the same picture shows up elsewhere with a different name attached to it, that’s a sign a scammer may have stolen it.
  • Do be wary of flirtatious and overly complimentary emails. Paste the text into a search engine and see whether the same words show up on websites devoted to exposing romance scams.
  • Do cut off contact immediately if you begin to suspect that the individual may be a swindler.
  • Do notify the dating site or the maker of the dating app on which you met the scammer.
  • Don’t feel a false sense of safety because you’re the one who made first contact. Scammers flood dating websites with fake profiles and wait for
  • Don’t reveal too much personal information in a dating profile or to someone you’ve chatted with only online. Scammers can exploit details like your last name or where you work to manipulate you or to commit identity theft.
  • Don’t ever give an online acquaintance intimate photos that could later be used for extortion.
  • Don't send cash to someone you've chatted with only online or put money on a reloadable gift card for the person — you’ll never get it back.

OVERVIEW

Recent announcements from Moderna, Pfizer and AstraZeneca demonstrated efficacy in COVID-19 vaccine trials has brought hope that a return to normality is in sight and more recent news of effectiveness (albeit at a slightly lower rate) in a vaccine from AstraZeneca and the University of Oxford has fueled optimism that even more breakthroughs are on the way.

It is a golden opportunity for cybercriminals, who can use fake vaccine offers as bait to deceive the public in buying fake vaccines which could put people’s health and livelihoods at risk. High demand for the vaccine and potential shortages will likely drive consumers online looking for alternatives. Criminals advertise fake vaccines using the brands of genuine pharmaceutical companies that are already in the final stages of testing

  • The real vaccine will not be distributed online, so avoid circumventing the process for what may seem like early access to the shot. When a vaccine is available, you will want to get the shot from a trustworthy healthcare provider, such as your doctor or from a community nurse at a designated location listed by the Ghana Health Service (GHS).
  • Do not respond to calls seeking personal information to distribute COVID-19 to your outfit. Officials from GHS will not call to demand personal information in the distribution of vaccines to the citizens of Ghana, as such the public should be alert on attempts by fraudsters to obtain personal information under the pretense of distribution of COVID-19 vaccine.
  • The public is advised not to click on social media posts purporting to sell cures for the COVID-19. Such posts might lead users to malicious websites. These malicious actors may advertise their fake vaccines using the brand of genuine pharmaceutical companies.
Report any COVID-19 vaccine fraud to the National Cyber Security Centre through any of the Points of Contact for assistance

OVERVIEW

Cyberbullying is when a young person uses the internet or technology to harass, threaten, embarrass, or target another person. Cyberbullying involves tweens and teens, but adults also experience cyberbullying as well.

Cyberbullying can be particularly damaging and upsetting because it is usually anonymous or hard to trace. It is also hard to control, and the person being victimized has no idea how many people have seen the messages or posts.

The National Cyber Security Centre (NCSC) advice young people to follow the tips below to deal with cyberbullying



  • Tell Someone
  • The first thing to do is to tell an adult you trust when you are experiencing online bullying. Teenagers who are cyberbullied may feel embarrassed or reluctant to report a bully. Cyberbullying can get worse, so speak up until you find someone to help. You can also contact the NCSC on 292 to tackle such issues confronting teenagers and the adult as well.

  • Walk Away
  • Ignoring bullies online is the best way to take away their power, but it is not always easy to do. If you see something upsetting, try to step away from the computer or turn off your phone for a while. Do not respond, and never forward the message to someone else.

    Taking a break will allow you to keep things in perspective and focus on the good things in your life. It also gives you time to figure out how you want to handle things

  • Report bullying
  • Social media sites take it seriously when people post cruel or mean stuff or set up fake accounts. If users report abuse, the site administrator may block the bully from using the site in the future. If someone sends you mean texts or emails, report it to phone service or email providers (such as Google, WhatsApp, MTN)..

  • Block the bully
  • Most devices have settings that let you electronically block the bully or bullies from sending notes. If you do not know how to do this, ask a friend or adult who does, so that you can block such bullies from engaging with you.

  • Be safe online
  • Password protect your smartphone and change your passwords often. It is also wise to think twice before sharing personal information or photos/videos that you do not want the world to see. Once you post a photo or message, it can be difficult or impossible to delete. Remind yourself to be cautious when posting photos or responding to someone's upsetting message.

Report any such cyberbullying to the National Cyber Security Centre through any of the Points of Contact for assistance

OVERVIEW

Investment scams usually involve getting one to put up his/her money for a questionable investment or an investment that does not exist at all. In most cases, the victim will lose some or all his/her money.

In Ghana online investment continues to be appealing to the public despite numerous reports on online investment scams. Ghanaian investors take advantage of a mouthwatering return on their investment and readily put their money into such schemes without proper due diligence. The National Cyber Security Centre (NCSC) therefore urge the public and business entities to follow the tips below to avoid being a victim of an online investment scam
  • Do not assume it is real
  • Professional-looking websites, adverts or social media posts do not always mean that an investment opportunity is genuine. Criminals can use the names of registered businesses, well-known brands, or individuals to make their scams appear legitimate

  • Stay in Control
  • Avoid uninvited investment offers whether made on social media or over the phone. If you are thinking about making an investment, thoroughly research the company first and consider getting independent advice.

  • Make the right checks
  • Investors should make sure the firms are registered to the Securities and Exchange Commission (SEC) or an insurance regulator. One can also check whether they are authorized by the Bank of Ghana.

  • Ignore the ‘everyone is doing it’ story.
  • When considering investing in a firm, do not believe the claims that ‘everyone’ is involved in the deal. One must be wary of a sales pitch that focuses on how many people are investing in the firm, without telling you why the investment is sound.

  • Do not chase "phantom riches."
  • Be skeptical of investment pitches that guarantee a certain return or promise spectacular profits. They are what fraud-fighters call "phantom riches" that you will never see. No salesperson can make those kinds of promises. The reality is that every investment involves risk.

Report any such cyberbullying to the National Cyber Security Centre through any of the Points of Contact for assistance

BACKGROUND

WhatsApp privacy policy helps explain data practices, including the information processed to provide Services. WhatsApp must receive or collect some information to operate, provide, improve, understand, customize, support and market Services, including when users install, access, or use Services

WhatsApp, an encrypted messaging app that sells itself as a privacy-focused service, will start forcing users to share personal data with Facebook, its parent company. Facebook bought WhatsApp in 2014, and in 2016 it gave users a one-time option to opt out of sharing app data with Facebook

WhatsApp users are now receiving an in-app notice regarding the service’s new update of terms and privacy policy. The notice focuses on three key updates:
  • How WhatsApp processes user’s data,
  • How businesses can use Facebook-hosted services to store and manage their WhatsApp chats,
  • How WhatsApp will partner with Facebook to offer integration across Facebook’s products.

These changes will commence on February 8th, 2021 and users will have no option but to either accept these changes if they wish to continue using WhatsApp or delete their accounts.

  • Account Information: mobile phone number and basic information (including profile name and profile picture) are needed to create a WhatsApp account
  • Messages: WhatsApp only stores undelivered messages for 30days after that the message is deleted, and temporarily stores encrypted forms of forwarded messages. WhatsApp offer end-to-end encryption.
  • Users provide their status information.
  • The phone numbers of users WhatsApp contacts.
  • Transaction and payments data.
  • Location information
  • Information about user’s device such as the model, operating system, and mobile network
  • Other information, including user’s IP address, device operations information, and identifiers such as
  • The older version of the privacy policy used to start with the following lines: “Respect for your privacy is coded into our DNA. Since we started WhatsApp, we’ve aspired to build our Services with a set of strong privacy principles in mind.” These lines are no longer part of the new privacy policy. However, WhatsApp stays end-to-end encrypted
  • An increasing reliance on other Facebook products. Third-party services or other Facebook Company Products that are integrated with WhatsApp Services, receive information about what users or other products share with WhatsApp. This information includes improving infrastructure and delivery systems, safety and security around Facebook products and service experiences.
  • Improved relevant offers and ads across Facebook Company Products
  • WhatsApp will collect data about users such as battery level, signal strength, app version, browser information, mobile network, connection information (including phone number, mobile operator or ISP), language and time zone, IP address, device operations information, and identifiers
  • If a user only deletes the WhatsApp app from their device without using the in-app delete my account feature, then that user’s information will remain stored with the platform
    • WhatsApp will store user data using Facebook’s global infrastructure and data centres, including centres in the United States and affiliate companies
    • WhatsApp will collect user’s location even if they are not using the app.
    • fgv
    • Contents shared with a business on WhatsApp will be visible to several people in that business. Businesses working with third-party service providers (which may include Facebook), can help manage communications with their customers
    How other Facebook companies may use the information collected from WhatsApp. This includes:
    1. helping improve infrastructure and delivery systems
    2. understanding how Services are used
    3. promoting safety, security and integrity across the Facebook Company Products, e.g., security systems and fighting spam, threads, abuse, or infringement activities.
    4. providing integrations which enable users to connect their WhatsApp experiences with other Facebook Company Products
Here are some tips to help you keep your information private:

  1. Read the privacy policy and understand what personal information is used and for what purpose.
  2. Look at the settings on your mobile phone for each app.Limit the access you grant to the app to what is absolutely necessary(this could include photos,camera,contacts,files,location or microphone for example)
  3. Similarly, review and update access to the information within the app itself.
  4. Be careful what you share on any social platform limit the personal information available on the app
  5. Keep any confidential or work information strictly to authorised organizational platforms and out of social media and group chat apps
If you are a privacy conscious person an alternative messaging app to use other secured platforms.
  • Abdul Diouf Road Ridge – Accra
  • copyrights 2019-2021 © NCSC All Rights Reserved
  • Digital Address: GA-079-0539
  • +233 503 185 846
  • info@cybersecurity.gov.gh

    PGP Public Keys

  • Download PGP Public Keys
Scroll Up