{"id":2469,"date":"2025-08-25T02:55:39","date_gmt":"2025-08-25T02:55:39","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2025\/08\/25\/executives-warned-about-celebrity-podcast-scams\/"},"modified":"2025-08-25T02:55:39","modified_gmt":"2025-08-25T02:55:39","slug":"executives-warned-about-celebrity-podcast-scams","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2025\/08\/25\/executives-warned-about-celebrity-podcast-scams\/","title":{"rendered":"Executives Warned About Celebrity Podcast Scams"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"https:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>A US non-profit has urged business owners and influencers not to fall for a new scam in which threat actors try to gain remote access to their PC and hijack their online accounts.<\/p>\n<p>The Better Business Bureau (BBB) warned that the \u201cpodcast imposter\u201d scam usually begins with an email from the management team of a fictional celebrity podcast series.<\/p>\n<p>\u201cThe \u2018manager\u2019 tells you that your story, experiences, and insights would be perfect for their audience. For your participation, you are offered compensation of $2000. Sounds great, right?\u201d the BBB explained.<\/p>\n<p>\u201cIf you respond to the email and agree to be a guest on the podcast, the \u2018manager\u2019 will ask you to hop onto a call to check your technology (your web camera and audio) before the podcast, which will be held on Facebook or another social media site. This is where things take a turn.\u201d<\/p>\n<p>In fact, the whole set up is an excuse to gain remote access to the victim\u2019s machine and seize the logins for their social media accounts, the BBB warned. Other accounts with the same password could also be at risk.<\/p>\n<p>KnowBe4 security awareness advocate, Martin Kraemer, explained that this <em>modus operandi\u00a0<\/em>is a variation on the classic tech support scam, where victims are tricked into downloading remote access software to give the fraudster unfettered access to their machine.<\/p>\n<p><em>Read more on tech support scams: Indian Police Raid Tech Support Scam Call Center<\/em><\/p>\n<p>\u201cThe main problem with this scam is that the perpetrators are no longer targeting influencers alone, but also and especially specialists and executives in companies,\u201d he added.<\/p>\n<p>\u201cTheir employee accounts are an ideal starting point for penetrating deep into the companies\u2019\u00a0systems unnoticed by their IT security.\u201d<\/p>\n<h2>BBB\u2019s Advice for Businesses<\/h2>\n<p>The BBB urged business users exposed to such tactics to always:<\/p>\n<ul>\n<li>Be skeptical of emails with strange formatting, such as their full name in bold, and of overly generic language not specific to their role or organization<\/li>\n<li>Check the sender email address, noting that legitimate podcast businesses should not be using Gmail. And to check the sender address via a web search<\/li>\n<li>Be cautious about any unsolicited offers of money<\/li>\n<li>Refuse if a stranger asks to take control of their computer<\/li>\n<li>Keep personal information such as logins under lock and key<\/li>\n<\/ul>\n<p>\u201cCaution must be learned. Many cybercriminals have perfected their social engineering skills over the years,\u201d concluded Kraemer.<\/p>\n<p>\u201cTo counteract this effectively, corporate cybersecurity managers must offer training and education to the entire workforce to raise cybersecurity awareness, keeping pace with the latest developments in social engineering and phishing.\u201d<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A US non-profit has urged business owners and influencers not to fall for a new scam in which threat actors try to gain remote access to their PC and hijack their online accounts. The Better Business Bureau (BBB) warned that the \u201cpodcast imposter\u201d scam usually begins with an email from the management team of a<\/p>\n","protected":false},"author":2,"featured_media":2470,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2469-0356d7d6-7fe8-45f0-a5da-4adb10bb9f9a-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=2469"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2469\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/2470"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=2469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=2469"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=2469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}