{"id":67911,"date":"2025-05-07T14:08:10","date_gmt":"2025-05-07T19:08:10","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=67911"},"modified":"2025-05-07T14:08:11","modified_gmt":"2025-05-07T19:08:11","slug":"beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/","title":{"rendered":"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools"},"content":{"rendered":"\n<p>In today\u2019s digital age, fraudsters find increasingly sophisticated ways to deceive people and exploit their trust in government institutions. One of the most alarming trends is a growing wave of social security fraud. This scheme targets Americans by impersonating the Social Security Administration (SSA) to steal personal and financial information.<\/p>\n\n\n\n<p>Recently, a particularly dangerous phishing campaign involving fake emails that appear to come from the SSA has been launched. These messages are not just your average scam\u2014they aim to trick victims into installing ScreenConnect, a powerful remote access tool that, when abused, gives cybercriminals complete control over the victim\u2019s device.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">What\u2019s Happening?<\/h1>\n\n\n\n<p>The scam begins with a phishing email disguised as an official message from the SSA. These emails are well-crafted, mimicking the tone and formatting of legitimate federal government communications. They might claim to contain information about your social security benefits or request urgent action related to your social security number.<\/p>\n\n\n\n<p>However, clicking the link in the email downloads a file with misleading names like <em>SSAstatment11April.exe<\/em> or <em>ReceiptApril2025Pdfc.exe<\/em>. These files are ScreenConnect clients, which allow remote users to connect to and control the infected device.<\/p>\n\n\n\n<p>Once installed, the cybercriminals, identified by security researchers as a phishing group called Molatori, gain full access to the victim\u2019s computer. From there, they steal sensitive data such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bank account login information<\/li>\n\n\n\n<li>Direct deposit details<\/li>\n\n\n\n<li>Personally identifiable information<\/li>\n\n\n\n<li>Files containing financial or legal records<\/li>\n<\/ul>\n\n\n\n<p>This can quickly escalate into identity theft, financial fraud, or unauthorized changes to your direct deposit settings, redirecting social security benefits to the scammers\u2019 accounts.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Why This Scam Is Hard to Detect<\/h1>\n\n\n\n<p>This campaign is especially tricky for several reasons:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Legitimate-looking domains<\/strong>: The phishing emails are sent from compromised WordPress sites, so the email addresses and links appear trustworthy.<\/li>\n\n\n\n<li><strong>Image-based content<\/strong>: The text of the email is often embedded as an image, making it harder for traditional email filters to recognize and block it.<\/li>\n\n\n\n<li><strong>Abuse of legitimate software<\/strong>: ScreenConnect (formerly ConnectWise Control) is a trusted tool used by many businesses for IT support. Because it\u2019s not inherently malicious, its presence doesn\u2019t always raise red flags with antivirus software.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">What You Can Do<\/h1>\n\n\n\n<p>It\u2019s essential to remain vigilant and take proactive steps to protect yourself and your family from SSA-related scams. Here\u2019s how:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Be skeptical of unsolicited emails<\/strong><br>If you receive an unexpected message claiming to be from the SSA, don\u2019t click any links or download attachments. Instead, go directly to the official Social Security official website or call their verified phone number.<\/li>\n\n\n\n<li><strong>Verify the sender<\/strong><br>Look for signs of impersonation. Government employees won\u2019t email you asking for sensitive details or require you to install software to access information.<\/li>\n\n\n\n<li><strong>Use search engines<\/strong><br>Copy suspicious phrases or file names from the message and search them online. Many phishing scams leave digital breadcrumbs that can confirm your suspicions.<\/li>\n\n\n\n<li><strong>Report the fraud<\/strong><br>Report fraud immediately if you believe you\u2019ve received or fallen victim to a scam. You can contact the Social Security Fraud Hotline, the Federal Trade Commission (FTC), or local law enforcement. Taking quick action can help stop the spread and protect others.<\/li>\n\n\n\n<li><strong>Protect your devices with PC Matic<br><\/strong>One of the best ways to defend against scams like this is with a comprehensive cybersecurity solution like <strong><a href=\"http:\/\/pcmatic.com\">PC Matic<\/a><\/strong>.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">How PC Matic Protects You<\/h1>\n\n\n\n<p>PC Matic is uniquely positioned to help users combat threats like social security fraud and phishing emails. Here\u2019s how it makes a difference:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Application Allowlisting<\/strong><br>PC Matic uses a proactive security model called Application Allowlisting, which only allows trusted programs to run. If a scam email tries to download and install ScreenConnect or any other unauthorized software, PC Matic blocks it automatically.<\/li>\n\n\n\n<li><strong>Real-Time Malware Detection<\/strong><br>Even if a scammer tries to sneak malware onto your device using misleading file names, PC Matic scans and stops these threats before they can do damage.<\/li>\n\n\n\n<li><strong>RDP and Remote Access Protection<\/strong><br>PC Matic also protects against Remote Desktop Protocol (RDP) attacks, making it harder for cybercriminals to remotely control your device, even if you accidentally install something dangerous.<\/li>\n\n\n\n<li><strong>Web Filtering and Email Security<\/strong><br>By identifying risky websites and malicious links, PC Matic helps prevent users from accidentally clicking into danger.<\/li>\n<\/ul>\n\n\n\n<p>With these layers of protection, PC Matic empowers users to stop cyber threats before they start.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Don&#8217;t Fall for Caller ID or Text Message Tricks<\/h1>\n\n\n\n<p>In addition to phishing emails, scammers often try to reach targets through phone calls or text messages. They may spoof a legitimate caller ID to make it look like the call is coming from the Social Security office, or send links via SMS pretending to confirm social security benefits or verify your bank account.<\/p>\n\n\n\n<p>No matter the method, remember: the federal government will never ask you to verify your social security number or bank information over the phone, via email, or through social media. If someone contacts you claiming to be from the SSA and pressures you to act quickly, hang up and call the SSA directly using their official contact information.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Final Thoughts<\/h1>\n\n\n\n<p>Social security fraud is not just a technical issue\u2014it\u2019s a personal one. It involves criminals exploiting trust, targeting your identity, and putting your financial well-being at risk. These attacks are growing more deceptive, blending impersonation, remote access tools, and legitimate-looking digital footprints.<\/p>\n\n\n\n<p>You can stay one step ahead of scammers by staying informed, verifying sources, and using robust tools like <strong><a href=\"http:\/\/pcmatic.com\">PC Matic<\/a><\/strong>.<\/p>\n\n\n\n<p>If you suspect a scam, don\u2019t wait\u2014report fraud. Alert the SSA, the FTC, and your local law enforcement. Share your experience with others, so they don\u2019t fall victim to the same tricks.<\/p>\n\n\n\n<p>Your digital security starts with awareness, and the right protection can make all the difference.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Resources:<\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Social Security Fraud Hotline: <a href=\"https:\/\/oig.ssa.gov\/\">https:\/\/oig.ssa.gov<\/a><\/li>\n\n\n\n<li>Report Scams to the FTC: <a href=\"https:\/\/reportfraud.ftc.gov\/\">https:\/\/reportfraud.ftc.gov<\/a><\/li>\n\n\n\n<li>PC Matic: <a href=\"https:\/\/www.pcmatic.com\/\">https:\/\/www.pcmatic.com<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital age, fraudsters find increasingly sophisticated ways to deceive people and exploit their trust in government institutions. One of the most alarming trends is a growing wave of social security fraud. This scheme targets Americans by impersonating the Social Security Administration (SSA) to steal personal and financial information. Recently, a particularly dangerous phishing [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":67912,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[6223],"tags":[],"class_list":["post-67911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scam-alert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools<\/title>\n<meta name=\"description\" content=\"In today\u2019s digital age, fraudsters find increasingly sophisticated ways to deceive people and exploit their trust in government institutions. One of the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s digital age, fraudsters find increasingly sophisticated ways to deceive people and exploit their trust in government institutions. One of the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-07T19:08:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-07T19:08:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools\",\"datePublished\":\"2025-05-07T19:08:10+00:00\",\"dateModified\":\"2025-05-07T19:08:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/\"},\"wordCount\":999,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-4.jpg\",\"articleSection\":[\"Scam Alert\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/\",\"name\":\"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-4.jpg\",\"datePublished\":\"2025-05-07T19:08:10+00:00\",\"dateModified\":\"2025-05-07T19:08:11+00:00\",\"description\":\"In today\u2019s digital age, fraudsters find increasingly sophisticated ways to deceive people and exploit their trust in government institutions. One of the\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-4.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools","description":"In today\u2019s digital age, fraudsters find increasingly sophisticated ways to deceive people and exploit their trust in government institutions. One of the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/","og_locale":"en_US","og_type":"article","og_title":"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools","og_description":"In today\u2019s digital age, fraudsters find increasingly sophisticated ways to deceive people and exploit their trust in government institutions. One of the","og_url":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-05-07T19:08:10+00:00","article_modified_time":"2025-05-07T19:08:11+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools","datePublished":"2025-05-07T19:08:10+00:00","dateModified":"2025-05-07T19:08:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/"},"wordCount":999,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4.jpg","articleSection":["Scam Alert"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/","url":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/","name":"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4.jpg","datePublished":"2025-05-07T19:08:10+00:00","dateModified":"2025-05-07T19:08:11+00:00","description":"In today\u2019s digital age, fraudsters find increasingly sophisticated ways to deceive people and exploit their trust in government institutions. One of the","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-4.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/beware-of-social-security-fraud-new-phishing-scam-uses-fake-ssa-emails-and-remote-access-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Beware of Social Security Fraud: New Phishing Scam Uses Fake SSA Emails and Remote Access Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=67911"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67911\/revisions"}],"predecessor-version":[{"id":67913,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67911\/revisions\/67913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/67912"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=67911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=67911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=67911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}