Updates from Geebo Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on May 14, 2025 Permalink | Reply
    Tags: , , , ,   

    Fake Refunds, Real Scams 

    Fake Refunds, Real Scams

    By Greg Collier

    There’s already enough anxiety around scams that threaten dire consequences, whether it’s arrest, fines, or lost accounts. But some scams take a different angle, promising something good instead. One such scheme making the rounds in Michigan and other parts of the country is the so-called refund scam, where fraudsters claim that you’re owed money. The offer sounds appealing, especially during times of economic strain, but it’s just another way to steal your personal or financial information.

    Unlike most scams where the fear of loss or punishment is used to manipulate victims, this one dangles the illusion of a reward. The person contacting you may claim to represent your bank, credit union, government office, or a well-known company. They reach out by email, text, phone call, or even social media, claiming you are due a refund or reimbursement. To receive the money, you are often asked to confirm or provide sensitive information like your bank details or Social Security number. In some cases, the scammer might say a small fee is required up front to process the refund.

    These communications often look convincing. The names and logos may resemble real institutions, and the messages might include enough detail to feel personal or urgent. But these tactics are designed to lower your guard. Once the scammer has what they need, the promised money never arrives. Instead, accounts may be drained or identities stolen. In some cases, victims are sent fraudulent checks that later bounce, leaving them responsible for the full amount.

    This type of fraud relies heavily on trust and distraction. The promise of a refund is meant to create a false sense of gain that distracts from the red flags. The safest response is skepticism. If you didn’t ask for a refund or file a claim, be wary of anyone who says you’re getting one. Contact the company directly using verified contact information if you suspect a message could be legitimate. Avoid calling numbers or clicking links provided in unsolicited communications.

    The Michigan Department of Insurance and Financial Services continues to receive reports of these scams. They remind residents that any unexpected communication offering money should be treated with caution. Financial institutions and legitimate businesses do not ask for sensitive information or advance fees to deliver refunds.

    Being cautious about these offers doesn’t mean you’re being paranoid. It means you’re protecting yourself from schemes that promise gain but deliver loss.

     
  • Geebo 8:00 am on May 13, 2025 Permalink | Reply
    Tags: , , ,   

    Scammers Target Student Loan Restart 

    Scammers Target Student Loan Restart

    By Greg Collier

    There’s already enough confusion about student loan relief, or the lack thereof, without scammers adding to the chaos. As of May 5th, the federal government has resumed the collection of defaulted federal student loans for the first time since March 2020, when payments were paused due to the COVID-19 pandemic. In response to this change, the Better Business Bureau is warning Missouri residents to be on alert for scams targeting borrowers.

    According to the Better Business Bureau (BBB), scammers are exploiting the current uncertainty by contacting borrowers with misleading offers that claim to provide quick or guaranteed student loan forgiveness. These schemes may appear convincing and often pressure borrowers into handing over personal information or paying unnecessary fees. The BBB urges borrowers to remain cautious and avoid trusting unsolicited calls, emails, or texts about loan repayment options.

    One way to reduce the risk of falling victim to these scams is by securing an FSA ID through the official Federal Student Aid website. This helps ensure direct and secure communication between borrowers and the government, rather than third parties posing as legitimate servicers. The BBB also emphasizes the importance of using official websites and verified sources when exploring loan repayment or refinancing options.

    Borrowers are advised not to pay for debt relief services and to be skeptical of any company making bold promises about eliminating student loan debt. Scammers often count on confusion and urgency to convince people to act quickly, especially as collection efforts resume after a long hiatus.

    The BBB’s warning serves as a timely reminder that diligence is essential. Staying informed and cautious is the best defense against fraud as the student loan landscape continues to evolve.

     
  • Geebo 8:00 am on May 12, 2025 Permalink | Reply
    Tags: , , , ,   

    Your Phone Number May Not Be Just Yours 

    By Greg Collier

    A recent case in Franklin County, Kentucky, highlights a troubling trend in mobile phone fraud known as SIM-swapping. Despite the name, this scam does not always involve the physical SIM card in a victim’s device. Even phones with eSIMs or those marketed as not using traditional SIM cards are still vulnerable. What matters to the scammer is control over the phone number, not the card itself.

    SIM-swapping, also called “porting out,” is when a fraudster convinces a mobile carrier to transfer someone’s phone number to a new account under the scammer’s control. Once the transfer is complete, the victim’s device is disconnected from service, while the scammer now receives all calls and text messages meant for the victim. This includes two-factor authentication codes and verification messages that many financial and online services rely on for security.

    In this instance, the couple discovered this scam when their phones lost service almost simultaneously. A message from their mobile provider followed, indicating that a request to change service providers had been received and was being processed. Within minutes, their numbers had been hijacked by individuals using different carriers. From that moment, their identities were essentially in someone else’s hands.

    The consequences were swift and invasive. The scammers attempted to open credit accounts in their names. As the couple scrambled to regain control, they encountered the frustrating reality of automated systems and long waits for human support. In today’s digital environment, losing access to a phone number is more than just an inconvenience. It can mean losing access to email, banking, and personal communications.

    Preventing SIM-swapping begins with strengthening account security. Users are advised to set up unique PINs or passcodes with their mobile carriers that must be provided before any changes are made to their accounts. Some carriers offer port protection or number lock features that make unauthorized transfers more difficult. It’s also critical to limit how much personal information is shared online, especially birthdates, phone numbers, and email addresses which can be used to impersonate a customer in support calls.

    Despite the technical-sounding name, SIM-swapping is a social engineering attack at its core. It preys not on vulnerabilities in the phone itself, but on human error and the weak points in customer service systems. As more services rely on mobile phones as a gateway to personal data, awareness and proactive security measures become all the more essential.

     
  • Geebo 8:00 am on May 8, 2025 Permalink | Reply
    Tags: , , , , ,   

    Google Spoof Scam Exposes Flaws 

    By Greg Collier

    Phishing has evolved far beyond clumsy scams riddled with typos and generic threats. It now wears the mask of legitimacy, often cloaked in branding and technical language convincing enough to fool even savvy users. A recent example of this growing trend involves an especially deceptive attack using Google’s own infrastructure as a weapon.

    Cybercriminals have been exploiting Google Sites and other services to distribute phishing emails that appear to originate from Google’s own domain. In this case, a message disguised as a legal request from law enforcement was sent to users, complete with references to subpoenas and the need to review case materials. The message urged the recipient to click on a link to a Google support page, which in reality led to a page designed to harvest login credentials.

    The trap is insidious. The phishing page is hosted on a subdomain of Google.com, lending a false sense of trust to unsuspecting users. Because the site is built with Google Sites, it carries the appearance of a legitimate Google interface. The attackers further muddy the waters by ensuring the phishing email lands in the same thread as previous legitimate security alerts, increasing the likelihood that users will trust it.

    The deeper issue lies in how Google has allowed this vulnerability to persist. The legacy version of Google Sites, still accessible today, permits anyone to publish content on a Google.com subdomain. This opens the door to abuses like malicious scripts and fake credential portals. Google has been warned about this gap in security, yet the core issues remain unresolved. While some reactive measures have been taken, the architecture still leaves room for repeat abuse.

    This raises a broader concern about corporate responsibility in digital security. Google has positioned itself as a cornerstone of online identity and infrastructure, and with that status comes the obligation to protect its users proactively. Allowing these phishing schemes to exploit the trust associated with the Google name creates not just a security risk, but an erosion of that trust.

    Google’s statement suggests users enable two-factor authentication and passkeys as a defense. While this is sound advice, it shifts the burden onto individuals to compensate for shortcomings in the platform’s safeguards. The more sustainable solution would be for Google to close the loopholes that allow bad actors to operate under its umbrella in the first place.

    As phishing continues to mimic trusted entities more convincingly, users must remain cautious. But the companies whose tools are being weaponized also bear responsibility. Until tech giants like Google take these exploits seriously and move swiftly to harden their platforms, the digital wolves will keep getting in, dressed in ever more convincing sheep’s clothing.

     
  • Geebo 8:00 am on May 7, 2025 Permalink | Reply
    Tags: , , , ,   

    Jury Duty Scam Tactics Exposed 

    By Greg Collier

    Two recent incidents in Massachusetts and Texas have highlighted how convincing and costly phone scams involving fake jury duty summonses continue to affect unsuspecting individuals. In both cases, callers impersonated law enforcement officers, presenting official-sounding threats and legal terminology to pressure victims into handing over thousands of dollars.

    In Massachusetts, a resident of Bourne reported losing over $68,000 after being told he had failed to appear for jury duty. The callers warned of immediate arrest if a payment was not made. They provided documents that appeared official at first glance, but closer inspection revealed inconsistencies, such as incorrect addresses and typographical errors. The victim ultimately transferred the funds at a local business before contacting the authorities.

    In San Antonio, a viewer reported being on the phone for nearly an hour with someone claiming to represent the sheriff’s office. The caller cited a missed jury summons and used legal language to establish authority. A second person joined the call to intensify the pressure and demanded thousands of dollars. The attempt was thwarted when a family member intervened and the potential victim conducted a quick online search, discovering similar past scams.

    These incidents reflect a broader trend. The continued prevalence of such schemes stems in part from their effectiveness. Scams like this persist because people continue to fall for them. The tone of authority, the use of court-related language, and the exploitation of fear make these scams particularly difficult to detect in the moment. However, while these scams are common, blaming the victims is not appropriate. No one is immune. Scammers rely on stress, confusion, and isolation to succeed, and even cautious, educated individuals can be caught off guard.

    Law enforcement agencies consistently remind the public that they do not conduct business this way. Phone calls demanding payment or threatening arrest are not standard practice. Those who receive such calls should hang up and verify the information with a trusted source, such as a local police department or court clerk.

    Public awareness is one of the strongest tools in fighting these scams. Sharing experiences helps prevent others from falling into the same traps. The more these tactics are understood, the less power they hold.

     
  • Geebo 8:00 am on May 6, 2025 Permalink | Reply
    Tags: , , , ,   

    Romance Scam Money Mule Sentenced 

    By Greg Collier

    A recent federal sentencing in Phoenix underscores the growing threat of online financial fraud and the serious legal consequences that can come, even to those who claim they were unaware of their role in a scam. A man who laundered nearly $4 million linked to online romance scams was sentenced to 17 months in prison following his guilty plea to conspiring to structure financial transactions in a way that evaded federal detection.

    The case revealed that the individual played a central role in a wider romance scam operation. By opening and managing dozens of bank accounts under various names, he helped conceal and distribute funds obtained from vulnerable victims, many of whom were misled into believing they were helping loved ones in distress. Surveillance footage and financial records placed him at the heart of the scheme, executing transactions designed to fly under the radar of mandatory financial reporting laws.

    Authorities emphasized that even though the man claimed he believed the money was intended for legitimate business ventures, the methods used to move the funds were deceptive and pointed to a clear effort to obscure their origin. The use of fraudulent identities and structured withdrawals ultimately served the goals of a sophisticated criminal enterprise. In at least one documented instance, a victim lost close to $200,000 by sending funds to an address linked to one of the fraudulent identities used in the scheme.

    This prosecution highlights the increasing prevalence of romance scams and related frauds. Federal investigators have seen a rise in schemes like “pig butchering,” where fraudsters spend time gaining victims’ trust before persuading them to invest in fake cryptocurrency platforms.

    Law enforcement continues to stress the importance of reporting suspected scams, no matter how embarrassing or personal the situation may feel. Older adults in particular are often targeted, and the financial damage is frequently compounded by emotional distress and long-term financial insecurity.

    It is critical for the public to understand that even if someone is unknowingly participating in a scam, actions taken to bypass federal regulations, such as using false identities or structuring financial transactions to avoid detection, can still lead to serious criminal charges. Being unaware of the full scope of a scam does not eliminate liability if the conduct involves deceitful or unlawful behavior.

    Staying vigilant, verifying identities, and avoiding pressure to move money under unusual circumstances can help reduce exposure to such crimes. Anyone who suspects they have been targeted should contact authorities immediately to minimize further harm and aid investigations into these increasingly complex fraud operations.

     
  • Geebo 8:00 am on May 5, 2025 Permalink | Reply
    Tags: , , , ,   

    Travel Abroad? Beware Fake Wi-Fi 

    Travel Abroad? Beware Fake Wi-Fi

    By Greg Collier

    As economic concerns continue to affect consumer behavior, many travelers are reconsidering their summer plans. Domestic air travel is seeing a slight contraction, with several airlines recently announcing the cancellation of select routes within the United States. While this has caused frustration for those seeking to travel closer to home, international destinations, especially those in Europe, appear to be gaining momentum as U.S. carriers expand their global offerings.

    This uptick in overseas travel brings with it a host of new considerations, particularly when it comes to staying connected. International roaming fees from major U.S. carriers typically range from $6 to $15 per day, depending on the specifics of one’s plan and destination. To avoid these charges, many travelers opt to leave their phones in airplane mode and instead rely on Wi-Fi hotspots found in hotels, airports, and cafés.

    However, using public Wi-Fi networks comes with significant security risks. One of the more concerning threats is a tactic known in cybersecurity circles as the ‘evil twin’ attack. In such an attack, a malicious actor creates a fake Wi-Fi network that closely mimics a legitimate one, often using names that resemble trusted locations such as “Airport” or “Cafe_Guest.” Once a traveler connects to the fraudulent network, the attacker is able to intercept and monitor the data being transmitted. This type of intrusion allows them to collect sensitive information such as passwords, emails, and even financial data.

    This threat is particularly troubling because it is both simple and inexpensive for attackers to execute. Setting up a fake hotspot often requires little more than a laptop and freely available software. As international travel becomes more common during peak seasons, so too does the likelihood of encountering one of these fraudulent networks.

    To protect personal information while abroad, travelers are encouraged to avoid connecting to public Wi-Fi networks unless they are secured with a password and known to be legitimate. Device settings should be adjusted to prevent automatic connections to nearby networks, and file sharing should be disabled. It is also wise to refrain from accessing sensitive accounts while using any public connection.

    An added layer of protection can be achieved by using a Virtual Private Network (VPN), which encrypts internet traffic and helps shield it from interception. For those seeking more control over their internet access, a portable hotspot that uses a secured mobile data connection may also be a worthwhile investment.

    As more people prepare to travel internationally this year, awareness and caution are essential. A proactive approach to digital security can prevent costly and intrusive experiences and ensure that the memories made abroad are good ones.

     
  • Geebo 8:00 am on May 2, 2025 Permalink | Reply
    Tags: , , , ,   

    Scammers Peddling Fake Health Plans 

    Scammers Peddling Fake Health Plans

    By Greg Collier

    The FBI is warning the public about a widespread scam involving fraudulent discount medical insurance plans. These deceptive schemes are targeting people who are searching for affordable healthcare coverage. Many victims have lost money and received no actual insurance benefits in return.

    These scams typically begin with an unsolicited phone call, email, or text message. The person on the other end poses as a representative from a legitimate insurance provider and offers what sounds like an unbeatable deal. They may promise full medical or dental coverage, the ability to see your current doctor, or even additional perks like help with groceries and gas. The catch is that you have to act quickly. The supposed discount is only available for a short time, creating pressure to make an immediate decision.

    Once people agree and submit their payment, the promised insurance never materializes. Some only discover the truth after trying to use the policy for a medical visit, only to be told they are not insured and must pay out of pocket. Others are misled about refunds or cancellation terms and find themselves unable to stop recurring charges.

    The FBI reports that these scams are not isolated incidents. A recent case in Washington state resulted in a cease-and-desist order against a company operating under several names. The business received more than 100 complaints for misrepresenting coverage, charging unauthorized fees, and denying refunds.

    These operations often use language that resembles official communications, which makes the pitch seem legitimate. Victims are rushed through the process and discouraged from reading the fine print. By the time the deception is uncovered, the damage is already done.

    Consumers are strongly urged to avoid any health insurance or benefit offer that arrives through an unsolicited phone call or message. If it sounds too good to be true, it probably is. Take the time to verify companies through official channels and never give out payment or personal information under pressure.

    These scams are evolving quickly and spreading across the country. The cost of falling for them can be both financial and personal. With millions already lost, awareness remains the best defense.

     
  • Geebo 8:00 am on May 1, 2025 Permalink | Reply
    Tags: , ,   

    Fake Casino Sites Target Missouri 

    Fake Casino Sites Target Missouri

    By Greg Collier

    A new warning from the Missouri Gaming Commission sheds light on a growing scam that could just as easily spread beyond state borders. The scheme involves fraudulent websites posing as legitimate online extensions of real-world casinos in Missouri. These deceptive platforms are being promoted on social media and often feature imagery from actual casinos to reinforce their appearance of legitimacy.

    There is currently no legal online casino gambling in Missouri. Any advertisement claiming that such services are now available to Missouri residents is entirely false. The risk with these illegal websites is significant. Because they operate outside the jurisdiction of regulatory agencies, there is no recourse for players who do not receive promised winnings. What appears to be a payout opportunity may, in fact, be a dead end with no consumer protections.

    With online sports wagering expected to launch in Missouri later this year, the public’s anticipation has created a ripe environment for opportunistic scams. Residents who are eager to participate in legal gambling may be more vulnerable to false advertising, especially when it closely resembles legitimate casino branding.

    This scam is not unique to Missouri. Similar schemes have been reported in other parts of the country, making this a broader issue that could impact residents nationwide. As states move to expand or legalize online gambling, scammers are likely to exploit confusion and excitement surrounding new gambling laws and platforms.

    Authorities advise that anyone who encounters a suspicious betting site should report it to their state’s gaming authority, local law enforcement and the Internet Crime Complaint Center. Until online casino gambling is legalized and properly regulated in Missouri or any other state, it is crucial for residents to remain skeptical of unsolicited betting opportunities online.

    For anyone struggling with a gambling problem, help is available. The National Problem Gambling Helpline can be reached at 1-800-GAMBLER.

     
  • Geebo 8:00 am on April 30, 2025 Permalink | Reply
    Tags: , ,   

    Romance Scam Hits Small-Town Wyoming 

    By Greg Collier

    A recent incident in the small town of Lovell, Wyoming, underscores a sobering truth. Online scams do not just target those in bustling cities or tech-heavy regions. Even in close-knit rural communities, no one is immune to digital deception.

    In this case, a local woman became the target of a romance scam after a well-meaning family member signed her up for a dating site. Although she was not seeking a relationship, she soon found herself fielding message after message from strangers claiming to be lonely widowers. Many of them followed a script, asking the same questions and offering similar life stories. With no prior experience on dating platforms, she did her best to proceed carefully, but the patterns went unnoticed at first.

    Eventually, one online suitor stood out. He presented himself as a hardworking professional traveling abroad, someone grounded, warm, and seemingly sincere. Over time, he built trust without immediately asking for money. He sent flowers, shared music, and made her feel seen. The emotional connection grew, and when a crisis arose, she stepped in to help, believing she was supporting a friend in need.

    What she did not realize until much later was that the crisis was invented. The requests for help were part of a well-crafted manipulation. She ended up sending funds she could not afford to lose. Thankfully, with the help of family and a trusted financial institution, the damage was limited. But the emotional toll was real.

    Scams like these are often underreported, partly due to embarrassment and shame. Victims may blame themselves, but experts stress that anyone can be fooled. The emotional tactics used by scammers are calculated and convincing. Once they succeed, victims may be flagged as potential targets and find themselves approached by other scammers. These operations are organized, profitable, and often shielded by international jurisdictions, making recovery of funds nearly impossible.

    Local law enforcement officials say they are limited in how much they can do unless they are contacted before money changes hands. Once a scam progresses, jurisdictional challenges and international laundering schemes make intervention difficult. This highlights the need for early reporting and open dialogue between the public and authorities.

    In rural areas like Lovell, the belief that “it can’t happen here” can create a false sense of security. But the internet has changed the landscape. Scammers are no longer limited by geography. An internet connection is all it takes for a fraudster to virtually slip through the front door of any home.

    Authorities urge people to remain vigilant when interacting online, especially in emotionally vulnerable spaces like dating platforms. Building trust with someone online should never happen at the expense of common sense. Verification is key, and friends, family, banks, and law enforcement are valuable resources when things feel off.

    This story is a reminder that while technology connects us, it also opens doors for exploitation. Even in the most peaceful towns, the threat is real.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel