Updates from June, 2025 Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on June 24, 2025 Permalink | Reply
    Tags: , , , , ,   

    Overpayment Scam Targets Small Businesses 

    By Greg Collier

    Scammers continue to target small business owners, and one recent case in the Tulsa Metro area highlights just how easily a routine job request can turn into a financial trap. This situation involved a new cleaning business that was approached for what seemed like a standard move-in cleaning. The request came through a text message, supposedly from someone who found the company through Facebook and had seen positive reviews.

    The individual claimed to need cleaning services for a home listed for sale, even offering an address and referencing a Zillow listing to make the request appear legitimate. After checking the address and confirming the listing existed, the business owner provided a quote for the cleaning service. The client responded with agreement, saying a check would be sent in advance to avoid delays.

    What arrived, however, was a check for nearly four times the agreed amount. The sender explained the excess was intended for a handyman who would be on-site the same day as the cleaning, asking the business owner to deliver the extra funds directly to that individual. This request immediately raised concerns.

    Additional warning signs appeared. The check was shipped overnight from a sender in New Jersey, yet it was drawn from an account in Oregon and issued by an organization unrelated to the cleaning job. There was even a typographical error in the city name printed on the check. Seeking confirmation, the business owner contacted the listing agent tied to the home on Zillow. The agent confirmed neither the homeowner nor the agency had requested cleaning services, confirming the job offer was fraudulent.

    This type of fraud is a textbook example of an overpayment scam. The victim is sent a check that appears legitimate, deposits it, and then is asked to return or forward the extra money. When the check eventually bounces, the victim is left responsible for any money they withdrew and paid out, losing real funds in the process.

    This case serves as a reminder that small business owners are frequent targets for these types of scams, especially those operating through social media and online platforms. Caution is essential when dealing with unsolicited job offers that involve advance payments or unusual financial arrangements. Even when a job seems straightforward and comes with plausible details, it is worth double-checking every step, especially when unexpected money enters the equation. Recognizing the red flags early can prevent a costly mistake.

     
  • Geebo 8:00 am on June 23, 2025 Permalink | Reply
    Tags: , , , ,   

    Scammers Target Drivers With Texts 

    By Greg Collier

    Toll scams are among the most common digital frauds circulating today, and a recent case out of Utah demonstrates how easily they can catch someone off guard. After completing a cross-country road trip with her husband, one woman found herself navigating toll charges from several different states. She expected to receive payment notices by mail. So when a text message arrived in January asking her to settle an outstanding toll, it didn’t seem suspicious at first.

    The timing felt plausible. She was away from home and in a hurry, so she clicked the link and entered her payment information to resolve the issue quickly. Not long after, her credit union contacted her about two unauthorized charges totaling several hundred dollars. She hadn’t made the purchases. She had been scammed.

    These toll scams are convincing because they prey on routine behavior. When someone knows they’ve driven on toll roads, receiving a message about an unpaid toll feels legitimate. The scam works by mimicking a real toll agency’s communication style and creating a sense of urgency. Victims are told they must pay promptly to avoid penalties or legal consequences. That fear can override skepticism, especially when the message arrives during a busy moment.

    In this case, the text included a payment link that led to a fake site resembling a toll collection portal. Once the victim submitted her debit card information, the fraudsters immediately used it to make unauthorized purchases. This incident underscores the risk of entering sensitive information through links received by text, especially on mobile devices where it’s harder to spot red flags.

    One key detail that might have helped expose the scam was the phone number itself. The message came from a foreign country code, completely unrelated to the toll agency it claimed to represent. A closer look would have revealed that the Massachusetts toll system is unlikely to use a number based in the Philippines. Small inconsistencies like these often go unnoticed when people are trying to act quickly.

    The victim later realized that using a debit card added another layer of risk. Unlike credit cards, debit transactions can be harder to dispute, particularly if a PIN was entered. Consumer advocates often recommend using credit cards instead for online payments, as they offer stronger fraud protections.

    Toll scams like this continue to circulate because they rely on timing and familiarity. They succeed when people are distracted or expecting a message that appears to match their recent activity. Recognizing the warning signs, suspicious links, unfamiliar area codes, and rushed payment demands, can make a crucial difference. Slowing down, verifying the source, and avoiding financial transactions over text can help protect against this increasingly common form of fraud.

     
  • Geebo 8:00 am on June 20, 2025 Permalink | Reply
    Tags: , , , , search parameter injection attack   

    Fake Customer Service Numbers on Real Websites 

    By Greg Collier

    We usually tell readers to visit a company’s official website when they need a customer service number. It’s long been the safest way to avoid fake listings or shady third-party services. But a new tactic used by cybercriminals may force us to rethink that advice. A recent report from Malwarebytes reveals a troubling development in search engine abuse that puts even cautious internet users at risk.

    The issue begins with a sponsored search result on Google. Cybercriminals are paying for ads that appear when users search for customer service support from trusted brands such as Apple, Bank of America, Facebook, HP, Microsoft, Netflix, or PayPal. At first glance, the ad appears legitimate. It often leads to the actual website of the company in question. But here’s the twist. The page you land on displays a fraudulent customer service phone number, not the official one.

    What makes this tactic so effective is that the browser still shows the correct web address. From the user’s perspective, everything appears to be in order. The site design is correct, the branding is familiar, and the URL is clean. But the contact information has been manipulated using what’s known as a search parameter injection attack.

    In simple terms, the attackers craft a URL that takes advantage of the company’s internal search function. That search query then gets reflected back onto the page. Because the site does not properly sanitize or validate the input, the attacker’s text, including a fake phone number, is displayed directly within the legitimate layout of the website. The result is a convincing, dangerous piece of misinformation hiding in plain sight.

    For example, someone looking for support from Netflix might be directed to a Netflix help page, complete with a scam number prominently displayed. The same applies to PayPal or Bank of America. If a victim calls that number, they are greeted by someone pretending to represent the brand. The goal is to extract sensitive information such as login credentials, banking details, or to convince the caller to install remote access software that gives the scammer control of their device.

    According to Malwarebytes, Apple was among the more deceptive examples. In that case, the page showed a message saying there were no results for the user’s search, followed by a prominently displayed number to call for help. It was all part of the same trap.

    HP’s example was slightly more obvious, as it included some visible clues like odd phrasing before the attacker’s message. But the sense of security that comes from seeing a recognizable brand URL often overpowers a user’s instinct to double-check.

    Fortunately, tools like Malwarebytes Browser Guard have started flagging these types of manipulations. When one of these scams is detected, the software displays a warning labeled “Search Hijacking Detected,” explaining that the content has been altered.

    While this is an encouraging step, it’s not a perfect solution. Many users do not use browser protection tools, and many more still place complete trust in top search results. That trust is what scammers are exploiting. They are counting on people to assume that if a website is real, the phone number must be as well.

    This trend raises important questions about the integrity of search platforms, the responsibility of large brands to safeguard their online presence, and the growing sophistication of scams. It also calls for a renewed focus on user awareness. Before calling any support number, it’s now more important than ever to verify it independently through past communication from the company or trusted contact methods.

    The rise of search parameter injection scams highlights the evolving nature of online fraud. It’s not just about tricking people into visiting a fake site. It’s about planting bad information in the spaces people already trust. And that makes it harder to know what, or who, is real.

     
  • Geebo 8:00 am on June 19, 2025 Permalink | Reply
    Tags: , , , ,   

    Scammers Clone Celebrity Voices 

    Scammers Clone Celebrity Voices

    By Greg Collier

    A growing number of scams now involve the use of artificial intelligence to impersonate well-known individuals, including local news personalities and potentially even national celebrities. A recent example in Cincinnati highlights the sophistication of these tactics, as scammers used AI-generated audio to mimic the voice of a local TV meteorologist.

    The scheme involves the creation of fake social media accounts, complete with copied profile photos and fabricated usernames that closely resemble legitimate ones. These impersonators send friend requests to unsuspecting individuals and later initiate private conversations in which they use voice messages to convince the target of their identity. The scammers then ask for large sums of money, exploiting the trust built through this artificial familiarity.

    What makes this scam particularly effective is the use of AI voice cloning. With only a few seconds of publicly available audio, such as from a news broadcast or social media post, malicious actors can create a nearly perfect replica of a person’s voice. This technology is readily accessible through free or inexpensive software tools available online.

    While this incident involved a local media figure, the same approach can be used to mimic actors, musicians, and other public figures. It can also extend to impersonations of family members, as seen in other frauds where a cloned voice is used to trick victims into believing a loved one is in distress.

    Social media companies and cybersecurity experts continue to warn the public about these emerging threats. Verifying the legitimacy of messages or profiles, particularly when they involve requests for money, is critical. Fake accounts often use slight misspellings, have minimal engagement, or were created recently. In many cases, a quick search can reveal the existence of the real account, helping to identify the fraudulent one.

    The rise of AI-powered impersonation poses significant challenges to online safety. It underscores the importance of skepticism, especially when requests come through unofficial or unexpected channels. Awareness and caution remain the first lines of defense against this evolving form of digital deception.

     
  • Geebo 8:00 am on June 18, 2025 Permalink | Reply
    Tags: , , , ,   

    Fake Rehab Ads Mislead the Vulnerable 

    Fake Rehab Ads Mislead the Vulnerable

    By Greg Collier

    A recent enforcement action by the Federal Trade Commission has brought renewed attention to the risks involved in relying on internet search results when looking for critical services, especially in times of vulnerability. The case centered on an addiction treatment center accused of deceiving people searching for help with substance abuse. The alleged misconduct underscores the importance of verifying the legitimacy of online information before acting on it.

    According to the FTC, the company involved placed search ads on Google that mimicked the names of other well-known treatment centers. When individuals in crisis called the number shown in these ads, they were connected to a call center that misrepresented itself as the treatment provider they had searched for. The goal, according to federal regulators, was to steer potential patients toward the company’s own facilities under false pretenses.

    This behavior is particularly troubling given the context. Substance abuse treatment is a multi-billion-dollar industry in the United States. With so much money at stake, the temptation for unethical marketing practices appears to be growing.

    This case serves as both a resolution and a warning. Deceptive online advertising is not just a nuisance, it can directly affect the lives of people seeking urgent and often life-saving services.

    As this case illustrates, not all search results are created equal. Paid advertisements may not always lead to trustworthy providers. Consumers are encouraged to take extra steps to confirm they are contacting the business they intended to reach. That includes checking beyond the first results on a search engine and verifying contact details through official sources.

    The lesson is clear. While internet searches offer speed and convenience, they also carry risks. In matters as serious as addiction treatment, extra care is not only advisable but essential.

     
  • Geebo 8:01 am on June 17, 2025 Permalink | Reply
    Tags: , passports, , ,   

    Fake Passport Sites Steal Your Data 

    Fake Passport Sites Steal Your Data

    By Greg Collier

    As international travel ramps up during the busy summer, scammers are exploiting time-sensitive travelers through deceptive passport and visa renewal websites. These fraudulent sites mimic the appearance of official U.S. government pages in order to trick users into paying for services and documents that should be free.

    The scams are designed to appear as legitimate resources, often using patriotic color schemes, official-looking language, and imagery that resembles government branding. People rushing to renew their documents may not notice the subtle warning signs, such as disclaimers stating the site is not affiliated with the U.S. Department of State. Many end up paying $88 for forms that are freely available through official government channels.

    These sites also gather a wide range of personal information under the guise of processing travel documents. This may include names, birthdates, addresses, and even Social Security numbers. Often, consumers receive nothing more than a PDF containing the same information they provided, which they still must take to a government office to complete the process. The fee is essentially for repackaging publicly available forms, while also exposing users to the risk of identity theft.

    To avoid falling victim to these scams, travelers should take a few precautionary steps. Always check that the website address ends in “.gov” before entering personal information or making a payment. Government websites in the United States exclusively use the “.gov” domain. Taking time to visit the U.S. Department of State’s official site can help prevent costly mistakes and provide accurate information about current passport processing times. Researching a website through the Better Business Bureau’s Scam Tracker can also help determine if others have reported fraudulent activity.

    As tempting as it may be to cut corners when time is limited, rushing through online forms can result in wasted money and serious privacy risks. Scammers know that urgency creates opportunity. Travelers who take a few extra moments to verify where they are submitting their information can avoid becoming the next target.

     
  • Geebo 8:00 am on June 16, 2025 Permalink | Reply
    Tags: , ,   

    Scammers Target Families in Mourning 

    A deeply troubling scam has emerged in Georgetown County, South Carolina, where criminals are preying on grieving families by impersonating funeral home staff. This fraudulent scheme involves callers contacting individuals who have recently lost a loved one, demanding immediate payment for fabricated funeral expenses. Law enforcement officials are now warning the public about the scam’s growing presence.

    The scheme is designed to exploit people in a moment of emotional vulnerability. Scammers are reportedly calling family members of the deceased, claiming to be from local funeral homes, and insisting that a payment is overdue. The calls often come shortly after a death has occurred, when families are still in shock and final arrangements are fresh in their minds. The scammers typically urge the victim to pay over the phone using a credit or debit card, often with aggressive or time-sensitive language.

    Authorities have confirmed that several families in the area have already fallen victim to the ruse. In some cases, victims had already paid for funeral services in full, but the emotional toll of grief and confusion left them susceptible to the convincing and urgent-sounding phone calls. Legitimate funeral homes in the area are reporting that they have never seen anything like this before and are now working with law enforcement to alert the public.

    To avoid falling victim to this type of scam, it is important to remain cautious when receiving unexpected calls involving money, especially during times of personal loss. Funeral homes do not typically demand payment over the phone without prior documentation or a formal billing process. If a call feels suspicious, individuals are advised to hang up and contact the funeral home directly using a verified number. Any payment concerns should be addressed in person or through official, traceable communication channels.

    Criminals will exploit any opportunity, even the death of a loved one. Families are urged to remain cautious and report any suspicious activity to their local authorities. Taking a moment to verify a claim could be the difference between protecting one’s financial security and falling victim to a cruel and calculated deception.

     
  • Geebo 8:00 am on June 13, 2025 Permalink | Reply
    Tags: , , ,   

    Fake Border Agent Scam Hits Midwest 

    By Greg Collier

    A telephone scam that first gained traction in Texas has now reached the Kansas City metro area, with multiple reports surfacing in Excelsior Springs, Missouri. Authorities are warning that this scam is not confined to one region and could target individuals anywhere in the country. Local law enforcement is urging residents to remain cautious after receiving calls from individuals falsely claiming to be agents with U.S. Customs and Border Protection.

    The fraudulent callers typically allege that a car has been rented in the victim’s name and was discovered near the Southern border with drugs inside. The scenario is intended to alarm the recipient and prompt a panicked response, often leading to further demands for personal information or money. In some cases, the scammer escalates the deception by claiming that an arrest warrant has been issued or that federal agents are en route.

    Officials emphasize that U.S. Customs and Border Protection does not contact individuals by phone to accuse them of crimes or request personal data. Any legitimate investigations involving the agency would be conducted through formal procedures and never involve threats or immediate financial demands. Victims are sometimes instructed to pay using wire transfers, cryptocurrency, or gift cards, all of which are red flags for fraud.

    These scams can appear convincing, particularly because callers may use spoofed numbers to mimic government lines. Caller ID is not trustworthy in these situations, and community members are advised to exercise caution, regardless of how credible the call may seem.

    Residents who receive such calls should not engage with the scammer and should never provide personal or financial information. Instead, they are encouraged to independently look up the official contact number for U.S. Customs and Border Protection and call directly to verify any suspicious claims. Using a callback feature or redialing the original number could lead to further contact with the perpetrator.

    The Excelsior Springs Police Department continues to monitor these reports and stresses that public awareness is the best defense against such schemes. Anyone who believes they may have been targeted is encouraged to report the incident to local authorities. Staying informed and skeptical of unsolicited claims can help prevent falling victim to this increasingly widespread scam.

     
  • Geebo 8:00 am on June 12, 2025 Permalink | Reply
    Tags: , , , ,   

    Apple Scam Turned Romance Scam, Costs Victim $1M 

    A troubling scam that started with a simple internet search has become a cautionary tale about how fraud can evolve from impersonation to manipulation and, ultimately, devastating financial loss. The incident began when a man attempted to send money through Apple Pay but encountered an issue. Hoping to resolve the problem, he searched online for a customer service number. Unfortunately, the number he found was fraudulent.

    He was connected to someone posing as an Apple representative. The scammer, identifying herself as a support agent, claimed that his account had been compromised and that immediate action was necessary to protect his finances. What followed was a calculated effort to gain his trust and strip him of his life savings.

    The scam began with requests for gift cards, a well-known tactic used by criminals to extract untraceable funds. The scammer offered scripted responses in case store employees became suspicious. This was followed by months of daily interaction, during which the fraudster created a false sense of companionship and intimacy, turning the financial scheme into a romance scam.

    As trust deepened, the scammer asked the man to retrieve his physical assets from a precious metals depository. He complied, believing he was safeguarding his wealth, only to turn it over to individuals sent to his home. These individuals, known as “money mules,” transport or launder money for criminal networks. Some do so knowingly, while others are themselves manipulated into participating.

    The scammer eventually vanished once the man’s resources were depleted, leaving him with over $1 million in losses.

    The emotional and financial toll is significant, especially for someone who had spent decades building a stable life. Although no arrests have been made, the incident serves as a serious reminder of how quickly trust can be weaponized when criminals take advantage of technology, loneliness, and confusion.

    This case highlights the critical need for caution when seeking customer support online. Fake support numbers often top search results due to paid advertisements or fraudulent search engine optimization tactics. It is essential to visit official websites directly when looking for contact information. Anyone who receives unexpected instructions involving gift cards or in-person exchanges should treat such communications as highly suspicious.

    The best protection remains suspicion. Never transfer money or valuables to a stranger under pressure. Always verify identities independently, especially when financial accounts are involved. While law enforcement continues to investigate, the loss already suffered cannot be undone. But if one person learns from this incident and avoids a similar fate, the story may serve a greater purpose.

     
  • Geebo 8:00 am on June 11, 2025 Permalink | Reply
    Tags: , community colleges, , ,   

    AI Scammers Exploit Student Loans 

    AI Scammers Exploit Student Loans

    By Greg Collier

    A troubling new report from the Associated Press has shed light on a growing form of fraud that exposes how vulnerable and broken the U.S. student loan system truly is. In what has become an increasingly common scheme, criminals are using stolen identities and artificial intelligence to enroll in community college courses, trigger federal student aid disbursements, and disappear with the money. Real people are left with debt, damaged credit, and a grueling bureaucratic fight to clear their names.

    The scams often begin with unsuspecting victims learning they are “enrolled” at colleges they’ve never heard of, with student aid already distributed in their name. Some only discover the fraud after police or school officials question suspicious applications. Others only find out when checking their credit reports or receiving overdue payment notices. Victims have included people who never attended college at all.

    Criminals are exploiting weaknesses in the verification process, especially at community colleges, where tuition is lower and more of the financial aid is returned directly to the “student.” Scammers target asynchronous online classes, where AI-generated bots can enroll, submit generic homework assignments, and claim aid with minimal human oversight. Some colleges have reported entire classes populated by bots. Real students then struggle to register for needed courses, which fill up quickly because of fake enrollments.

    The problem is not limited to one region. In California alone, over a million fraudulent applications were filed in 2024, leading to hundreds of thousands of suspected fake enrollments. The state’s community college system, with its extensive online offerings and large number of campuses, has become a prime target. At least $11.1 million in aid was stolen from California schools in just one year, with no realistic chance of recovery.

    The federal government has acknowledged the scale of the problem. A new temporary rule requires first-time student aid applicants to provide government-issued identification, impacting roughly 125,000 students during the summer term. More permanent and advanced verification systems are said to be in development for future terms. But some worry these steps are too late, and possibly too little.

    Meanwhile, the system intended to help people access education continues to be manipulated. Criminal networks have used names of prison inmates and dead individuals, sometimes coordinating scams across multiple states. Convictions in Texas and New York have revealed fraud rings pursuing millions of dollars. Victims must navigate a slow and confusing process involving schools, loan servicers, and federal agencies, often without clear answers.

    Adding to the concern, the federal office charged with investigating aid fraud has been weakened. Hundreds of staffers were recently laid off or retired from the Federal Student Aid office and the Inspector General’s division. As federal oversight thins, fraudsters may find it even easier to exploit the system.

    The human cost goes beyond financial loss. Some victims, after years of effort, have only just had their fraudulent loans removed. Others are still trapped in the appeals process or seeing their credit scores drop. Some simply wanted to return to school to better their lives, only to find themselves blocked by full classrooms occupied by bots.

    The emergence of artificial intelligence and the increase in online education have opened new doors for opportunity, but also for abuse. What this crisis reveals is not just a failure of cybersecurity or oversight, but a fundamental question about the system itself. If fake students can apply, enroll, and receive aid undetected, how secure or fair is the student loan infrastructure? And if identity theft can leave people burdened with years of debt for schools they never attended, who is the system really serving?

    These scams are not just exploiting financial aid. They are exposing just how fragile the scaffolding of higher education financing has become.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel