https://cdnimg.rg.ru/img/content/188/47/82/iStock-1133604495_d_850.jpg

“First, you need to pay attention to the address bar of the website, – tells Tatyana Sidorina, senior content analyst “Kaspersky Lab”. – Scammers register domains similar to real. The name of the fake site may be different from the present one or two letters.”

Next, you need to examine the contents of the site for grammar errors and effects layout. Will not be superfluous hover to all links to our site, headlines and menu items. Now all browsers support the function of broadcast link when you hover. All links must be different, if the same links or the end links is a plug in the form of a pound sign, then to the user the website is fake. The same address saying that wherever the user clicked, it will be reassigned to the same crooks right place.

an inexperienced user it is extremely difficult to distinguish the fake from the real, says Eugene Livshits, a member of the Council of the State Duma on information policy, information technologies and communications. “In order not to fall into the trap of scammers, I would recommend to use the mobile applications government services. Now these apps offer the full functionality of the sites, and to forge them much more difficult. The scammers haven’t learned how to create clones, and, in fact, apps are a barrier. Impersonal “download” app in the app Store will not work. For each application there is a specific legal address. Official Google situation is somewhat different, however, to distinguish the real applications from the fake easy – just look at the name of the developer”. Expert recommends to be careful and do not click on suspicious links in emails.

“There are several approaches for the detection of sites-clones, – says Alexey Novikov, Director of the competence center security Positive Technologies. Research and information security company specifically monitor the lists of newly registered domains and through different algorithms searching for similar. They also analyze the sites to determine similarity of images, texts and other signs.”

the attackers usually have much time to “harvest” how much is the procedure of razdelyvanie domain or resource locking. And it all depends on the hosting provider and the country where the website is hosted. In some cases, this procedure may take a week, but sometimes the speed of the reaction of all stakeholders up to several hours, said Novikov.