How to stay digitally secure during holiday season

For every online account, make sure you’re not repeating the same password across any two platforms. EPA/RITCHIE B. TONGO

For every online account, make sure you’re not repeating the same password across any two platforms. EPA/RITCHIE B. TONGO

Published Jan 3, 2023


By Aamir Lakhani, Global Security strategist and researcher

This holiday season, checking off that gift list will look a little different than in past years.

Given the spike in digital activity predicted over the holidays, cybercriminals, too, will be making their lists and checking them twice this year.

It’s a particularly risky time of the year as shoppers of all ages (including those with less experience recognizing digital threats) flock to search engines and online channels to place orders before holiday delivery date cut-offs.

Opportunistic hackers know just how to create enticing, seasonally-appropriate lures—and even some of the simplest scams can fool adept online shoppers.

Here are some of the most common cyber threats to prepare for during the holidays — along with a few unique outliers we’re expecting to see this season.

Online holiday gift card scams

Around the holiday season, when gift card purchases spike, thieves are on the lookout for easy ways to take advantage.

Gift cards are a common vector for cybercriminals and scammers since stealing the money loaded onto them is like stealing cash: Once it’s taken, there’s virtually no way for a victim to get it back (unlike credit card transactions, which allow chargebacks).

Some will go as far as to manipulate gift cards sold in stores, scratching off the layer of protective coating to write down PIN numbers and then “replacing” the coating with a sticker so it looks brand new. Scammers will plug those PINs into software that sends an alert once someone has purchased and activated their gift card—and then proceed to drain all its funds. Cybercriminals may also attempt to scam via email. If you’ve ever received a strange email urging you to help a friend or family member with an emergency – and that email led you down the path of providing a gift card as payment – that email was most certainly a scam.

Another common gift card-related ploy is the account takeover attack (ATO). These attacks tend to spike around the holidays. A cybercriminal first uses credential stuffing or password spraying tactics to obtain account credentials for a particular e-commerce platform. They will then use this information to make purchases using the obtained account information, often buying high-value electronic gift cards in bulk before promptly spending those gift cards to avoid being tracked down.

The best way to avoid becoming the target of gift card scams is to remain vigilant and follow these four best practices:

1. Set a strong password

For every online account, make sure you’re not repeating the same password across any two platforms. Use a password management app to keep track of different accounts. Don’t forget to use random, non-duplicate User IDs as well if the site allows. Unique usernames with unique passwords are better than just unique passwords.

2. Monitor your accounts

Regularly update your login credentials and monitor your payment accounts for signs of unusual activity.

3. Inspect gift cards

If you purchase gift cards in stores, visually inspect them for signs of tampering before loading funds and stick with retailers who keep their gift cards secured behind a checkout counter.

4. Never make purchases via email

Never agree to pay for online purchases in gift cards when prompted via email—in these instances, the item you’re trying to “purchase” probably doesn’t exist. Instead, stick with retailers you know and trust, and make sure the site’s checkout system is secure. Credit cards are the best way to pay since most offer some level of fraud protection. Remember peer-to-peer transaction apps such as Paypal (for friends without payment protection), Venmo, and CashApp should only be used when transactions occur between people you know and trust.

Video conferencing phishing scams

For families that are unable to travel to be with one another this holiday season, celebrating virtually is the next best option. But it’s important to be on the lookout for certain social interaction-based scams that continue to target those who are letting their guard down.

As we continue to rely on video conferencing as a tool for social interaction, cybercriminals will continue to execute phishing campaigns that take advantage of these video-based platforms. These phishing attempts involve emails containing phoney links that prompt the user to download a new version of their video conferencing software.

The link will direct them to a third-party website where the user can download an installer. In some cases, the program does install the video conferencing software — but whether it does or doesn’t, it also loads a remote-access Trojan malware program on the host. This program gives scammers access to the user’s sensitive data and information, which is either sold on the Black Market or leveraged for identity theft.

Other phishing attempts prey on remote employees waiting to receive invitations via email with links to video calls. In these instances, scammers send out links that bring the user to a fake login page (that looks much like the real thing) to steal login credentials. If successful, these attackers will attempt to use these credentials to gain access to corporate accounts and networks.

To avoid video conferencing scams, always follow cybersecurity best practices: Look at the sender’s email address before clicking on emailed links or downloading attachments, even if they appear to come from a trusted source. In most cases, phishing emails are sent from addresses that do not contain the organisation’s legitimate web address. Educate employees, family members, and friends about what to avoid and keep devices updated with the latest security software.

Phishing, Smishing, Vishing: Threats aren’t limited to the desktop

Video conferencing-themed phishing attempts are only the tip of the iceberg this holiday season. Unfortunately, other forms of phishing are still on the rise, including those that target your phone or mobile devices. The telephone version of phishing is sometimes referred to as “vishing,” and text message scams are called “smishing” – a play on SMS.


Mobile phishing attempts are especially common for e-commerce shoppers. More users than ever rely on their smartphones to make purchases. While these devices may seem less vulnerable to threats, that is actually not the case. Online shoppers may receive fraudulent text messages that appear to come from retailers they’re familiar with, for instance. These messages typically contain a link that, once clicked, redirects to a fraudulent website that looks like the retailer’s legitimate site but is designed to extract your personally identifiable information (PII). Malicious apps, particularly for Android devices, can also be used to skim financial data and credentials.

Vishing and Smishing

With vishing, cybercriminals use phone calls to solicit PII, relying on “social engineering” tactics (i.e., an urgent message about your recent order) to trick you into providing information such as login credentials or bank account information. Paradoxically, vishers often leverage our innate fear of cyber scams and attacks to pull off these attacks. For example, a voicemail message may state, “URGENT: Your bank account has been locked due to suspicious activity. Call us back immediately to restore access.” Then, when the victim calls back, they are asked to provide sensitive information that is then stolen and used maliciously.

Avoid vishing and smishing by confirming that the phone number from which you received a call or text message does, in fact, belong to the organisation claiming to have sent it—before you provide any information. Keep in mind that banks and government agencies almost never contact customers or individuals to provide sensitive information. That said, it would be wise to call your bank directly to inquire about the message you received. They’ll be able to tell you whether or not it was legitimate and will report the incident to the appropriate authorities if it turns out to have been a scam.

A new method we are starting to see is scammers adding a QR code on popular products and making banners or marketing materials, and leaving them at physical stores. If a victim sees a product they like and a sign telling them they can get the product faster or at a discounted price, they are more than likely to scan the QR code. But this leads them to a scam website or attempts to download malware.

Final thoughts on digital safety

With the right digital safety precautions, it’s still possible to enjoy your favourite traditions safely. Thanks to digital platforms, we can connect with family and friends from the comfort and safety of our homes – and check off those gift lists without setting foot in crowded malls and shopping centres. It just requires a new level of vigilance that, itself, can become the new normal.

Stay safe online this season by remaining vigilant: Never blindly trust an email, text message, or phone call, especially those that come from unfamiliar numbers or sources. Use common sense to look out for signs of phishing. Update login credentials regularly. And, of course, pass along this information to anyone you believe could benefit from it. Education, after all, is the best weapon in fighting back against cybercrime.