Fake Colonel: how scammers speculate on the topic of military awards
Fraudsters began to send fictitious orders for awarding military personnel, the Interior Ministry warned about this. Using false documents, the attackers, under the guise of clarifying data, are trying to identify officials of battalions, regiments, brigades and divisions, as well as obtain other information. For more information about how scammers speculate on the topic of military awards, how dangerous such schemes are and how to protect themselves from them, see the Izvestia article
What is known about the schemes of fraudsters with military awards
The fact that fraudsters began to send fictitious award orders to military personnel on behalf of staff members was reported in the Department for organizing the fight against the illegal use of information and communication technologies (UBK) of the Ministry of Internal Affairs of Russia.
"Malefactors, posing as staff members, send fictitious orders for awarding military personnel. Under the guise of "clarifying data" or "filling out documents," they are trying to identify officials of battalions, regiments, brigades and divisions, as well as obtain other information," the UBK said.
The department noted that conversations with unknown people in messengers are always fraught with risks. They can lead to the spread of malicious software, phishing — the theft of passwords, documents and contacts, as well as the collection of personal and, most dangerous of all, official information. "Any leak of official data can have consequences not only for an individual, but also for the whole department," the UBC stressed.
What is the topic of military awards interesting to scammers?
Awarding military personnel causes a high public response and trust: people who receive messages about awards or social benefits most often perceive them as official and do not question them, says Maria Mikhailova, head of the Angara MTDR brand protection group, in an interview with Izvestia.
"This is especially important if such information is received against the background of active government support for military personnel, veterans and their families," the specialist notes. — Scammers monitor the news agenda and use it to create their own deceptive schemes.
Under the pretext of "clarifying data," attackers collect personal information, information about the unit, contacts of commanders and colleagues, adds Natalia Abramova, head of the Information Protection company, an AI specialist. This data often becomes the basis for targeted attacks and phishing using the fake boss technique of replacing the head.
What fraud schemes have you encountered against the military before
In 2025, Angara MTDR experts repeatedly encountered various scenarios of fraudsters who used the themes of the Great Patriotic War, special military operation (SVO) and other military operations for their own purposes, says Maria Mikhailova.
— In particular, the spread of banking Trojans under the guise of databases for searching missing persons, fraudulent schemes with payments and social assistance to military personnel, veterans and their families, as well as fraudulent schemes under the guise of deductions for their military education, were recorded, — says the interlocutor of Izvestia.
In addition, attackers often use calls demanding to "pay for registration" of non-existent awards or payments, as well as phishing under the guise of social services and fundraising for fake monuments and veteran organizations, adds Konstantin Larin, head of the cyber intelligence department at Bastion.
However, one should not forget about the traditional fraudulent schemes aimed at military personnel and their relatives, the expert notes. One example is the "Secure Account" scheme, when attackers, posing as employees of a bank or government agencies, convince them to transfer funds to a "special secure account" for their safety. In fact, this money goes to the accounts of scammers, after which it is almost impossible to return it.
— All these schemes are based on social engineering and emotional impact, — emphasizes Natalia Abramova.
What fraud schemes against the military may appear in 2025
In their new scenarios, attackers can create "official" Telegram bots to receive rewards, Maria Mikhailova says in an interview with Izvestia. These bots can collect personal data "for paperwork" or request a "commission for sending a reward."
— It is also possible to create deepfakes imitating representatives of charitable organizations, which will give additional credibility to calls or mailing lists of scammers, — the expert predicts.
In terms of fraud attacks on military personnel, as in other areas of fraud, the use of deepfake calls from "commanders" is expected to increase, compromising real accounts of military personnel and other forms of targeted intervention, adds Konstantin Larin.
According to the expert, the schemes will become more sophisticated and technologically advanced, aiming to bypass standard verification mechanisms and trust filters in order to reduce alertness and encourage hasty decisions. In turn, Natalia Abramova notes that fake documents created by neural networks can become one of the tools of fraudsters: fake orders and certificates with realistic seals and signatures.
"Other possible threats include phishing QR codes in fake award orders, scanning which will lead to the installation of spyware, as well as fake profiles of officers on professional networks and messengers for intelligence gathering," says the specialist.
The purpose of all the old and new schemes is to collect confidential information about users, gain access to their accounts on Public Services, as well as financial information and funds, summarizes Maria Mikhailova.
What are the dangers of fraud schemes against the military and how to protect yourself from them
Even if schemes against military personnel, veterans and their families are not aimed at direct embezzlement of money, fraudsters can collect personal data or information about officials with whom the victims are familiar, says Maria Mikhailova. Such information allows attackers to prepare convincing scenarios for the future.
— Fraudsters can impersonate acquaintances or colleagues, use real names and links to positions to gain access to classified information, agreements and logistics, — says the interlocutor of Izvestia. —Information about connections with specific officials also opens up a wide field for threats.
In addition to financial losses, such scams cause serious psychological damage and can undermine confidence in real volunteer and government initiatives, Konstantin Larin notes. In addition, data leakage can lead to criminal liability under Articles 283-284 of the Criminal Code of the Russian Federation for disclosure or loss of information constituting a state secret.
In order to protect yourself from such threats, it is important to remember that government agencies never charge for awards, payments, or other forms of encouragement. All incoming information must be checked exclusively through official channels — the leadership of the military unit or the military commissariat using confirmed contact numbers, says Konstantin Larin.
— Check all messages and orders through official channels, and also do not transmit official data in messengers, — advises Natalia Abramova. — Use only certified means of communication and cryptographic information protection, two-factor authentication and updated antivirus software.
Today, the topic of military awards remains a sensitive area of social engineering. Legitimate orders only go through the official document management system, and any attempt to obtain information through third-party channels should be considered a potential cyber threat. At the slightest doubt, it is necessary to inform the security service of the unit or the cyber police of the Ministry of Internal Affairs, concludes the interlocutor of Izvestia.
Переведено сервисом «Яндекс Переводчик»