Tagged: Google Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on June 20, 2025 Permalink | Reply
    Tags: , , Google, , search parameter injection attack   

    Fake Customer Service Numbers on Real Websites 

    By Greg Collier

    We usually tell readers to visit a company’s official website when they need a customer service number. It’s long been the safest way to avoid fake listings or shady third-party services. But a new tactic used by cybercriminals may force us to rethink that advice. A recent report from Malwarebytes reveals a troubling development in search engine abuse that puts even cautious internet users at risk.

    The issue begins with a sponsored search result on Google. Cybercriminals are paying for ads that appear when users search for customer service support from trusted brands such as Apple, Bank of America, Facebook, HP, Microsoft, Netflix, or PayPal. At first glance, the ad appears legitimate. It often leads to the actual website of the company in question. But here’s the twist. The page you land on displays a fraudulent customer service phone number, not the official one.

    What makes this tactic so effective is that the browser still shows the correct web address. From the user’s perspective, everything appears to be in order. The site design is correct, the branding is familiar, and the URL is clean. But the contact information has been manipulated using what’s known as a search parameter injection attack.

    In simple terms, the attackers craft a URL that takes advantage of the company’s internal search function. That search query then gets reflected back onto the page. Because the site does not properly sanitize or validate the input, the attacker’s text, including a fake phone number, is displayed directly within the legitimate layout of the website. The result is a convincing, dangerous piece of misinformation hiding in plain sight.

    For example, someone looking for support from Netflix might be directed to a Netflix help page, complete with a scam number prominently displayed. The same applies to PayPal or Bank of America. If a victim calls that number, they are greeted by someone pretending to represent the brand. The goal is to extract sensitive information such as login credentials, banking details, or to convince the caller to install remote access software that gives the scammer control of their device.

    According to Malwarebytes, Apple was among the more deceptive examples. In that case, the page showed a message saying there were no results for the user’s search, followed by a prominently displayed number to call for help. It was all part of the same trap.

    HP’s example was slightly more obvious, as it included some visible clues like odd phrasing before the attacker’s message. But the sense of security that comes from seeing a recognizable brand URL often overpowers a user’s instinct to double-check.

    Fortunately, tools like Malwarebytes Browser Guard have started flagging these types of manipulations. When one of these scams is detected, the software displays a warning labeled “Search Hijacking Detected,” explaining that the content has been altered.

    While this is an encouraging step, it’s not a perfect solution. Many users do not use browser protection tools, and many more still place complete trust in top search results. That trust is what scammers are exploiting. They are counting on people to assume that if a website is real, the phone number must be as well.

    This trend raises important questions about the integrity of search platforms, the responsibility of large brands to safeguard their online presence, and the growing sophistication of scams. It also calls for a renewed focus on user awareness. Before calling any support number, it’s now more important than ever to verify it independently through past communication from the company or trusted contact methods.

    The rise of search parameter injection scams highlights the evolving nature of online fraud. It’s not just about tricking people into visiting a fake site. It’s about planting bad information in the spaces people already trust. And that makes it harder to know what, or who, is real.

     
  • Geebo 8:00 am on June 18, 2025 Permalink | Reply
    Tags: , , Google, ,   

    Fake Rehab Ads Mislead the Vulnerable 

    Fake Rehab Ads Mislead the Vulnerable

    By Greg Collier

    A recent enforcement action by the Federal Trade Commission has brought renewed attention to the risks involved in relying on internet search results when looking for critical services, especially in times of vulnerability. The case centered on an addiction treatment center accused of deceiving people searching for help with substance abuse. The alleged misconduct underscores the importance of verifying the legitimacy of online information before acting on it.

    According to the FTC, the company involved placed search ads on Google that mimicked the names of other well-known treatment centers. When individuals in crisis called the number shown in these ads, they were connected to a call center that misrepresented itself as the treatment provider they had searched for. The goal, according to federal regulators, was to steer potential patients toward the company’s own facilities under false pretenses.

    This behavior is particularly troubling given the context. Substance abuse treatment is a multi-billion-dollar industry in the United States. With so much money at stake, the temptation for unethical marketing practices appears to be growing.

    This case serves as both a resolution and a warning. Deceptive online advertising is not just a nuisance, it can directly affect the lives of people seeking urgent and often life-saving services.

    As this case illustrates, not all search results are created equal. Paid advertisements may not always lead to trustworthy providers. Consumers are encouraged to take extra steps to confirm they are contacting the business they intended to reach. That includes checking beyond the first results on a search engine and verifying contact details through official sources.

    The lesson is clear. While internet searches offer speed and convenience, they also carry risks. In matters as serious as addiction treatment, extra care is not only advisable but essential.

     
  • Geebo 8:00 am on May 8, 2025 Permalink | Reply
    Tags: , Google, , , ,   

    Google Spoof Scam Exposes Flaws 

    By Greg Collier

    Phishing has evolved far beyond clumsy scams riddled with typos and generic threats. It now wears the mask of legitimacy, often cloaked in branding and technical language convincing enough to fool even savvy users. A recent example of this growing trend involves an especially deceptive attack using Google’s own infrastructure as a weapon.

    Cybercriminals have been exploiting Google Sites and other services to distribute phishing emails that appear to originate from Google’s own domain. In this case, a message disguised as a legal request from law enforcement was sent to users, complete with references to subpoenas and the need to review case materials. The message urged the recipient to click on a link to a Google support page, which in reality led to a page designed to harvest login credentials.

    The trap is insidious. The phishing page is hosted on a subdomain of Google.com, lending a false sense of trust to unsuspecting users. Because the site is built with Google Sites, it carries the appearance of a legitimate Google interface. The attackers further muddy the waters by ensuring the phishing email lands in the same thread as previous legitimate security alerts, increasing the likelihood that users will trust it.

    The deeper issue lies in how Google has allowed this vulnerability to persist. The legacy version of Google Sites, still accessible today, permits anyone to publish content on a Google.com subdomain. This opens the door to abuses like malicious scripts and fake credential portals. Google has been warned about this gap in security, yet the core issues remain unresolved. While some reactive measures have been taken, the architecture still leaves room for repeat abuse.

    This raises a broader concern about corporate responsibility in digital security. Google has positioned itself as a cornerstone of online identity and infrastructure, and with that status comes the obligation to protect its users proactively. Allowing these phishing schemes to exploit the trust associated with the Google name creates not just a security risk, but an erosion of that trust.

    Google’s statement suggests users enable two-factor authentication and passkeys as a defense. While this is sound advice, it shifts the burden onto individuals to compensate for shortcomings in the platform’s safeguards. The more sustainable solution would be for Google to close the loopholes that allow bad actors to operate under its umbrella in the first place.

    As phishing continues to mimic trusted entities more convincingly, users must remain cautious. But the companies whose tools are being weaponized also bear responsibility. Until tech giants like Google take these exploits seriously and move swiftly to harden their platforms, the digital wolves will keep getting in, dressed in ever more convincing sheep’s clothing.

     
  • Geebo 9:00 am on November 6, 2024 Permalink | Reply
    Tags: , Google, , , Judy May,   

    Google Cleared of Liability in Gift Card Scams 

    Google Cleared of Liability in Gift Card Scams

    By Greg Collier

    A recent ruling underscores the complex legal landscape surrounding tech giants, gift cards, and consumer fraud. In a case reported by Ars Technica, a federal judge granted Google’s motion to dismiss a proposed class-action suit brought by Judy May, a consumer who fell victim to a prevalent form of fraud involving Google Play gift cards. Despite losing $1,000 to scammers in 2021, May’s claims were largely dismissed as the court found Google had no duty to refund her.

    The details of the case highlight how scammers manipulate consumers, often using gift cards as a primary ‘currency’. Victims like May are typically tricked into purchasing these cards with promises of a prize or urgent financial need. In May’s case, scammers convinced her to purchase Google Play gift cards as an upfront cost to unlock a government grant. Upon realizing she’d been defrauded, May reached out to Google, only to be informed that refunds were not possible under Google’s terms of service, terms that she felt were ‘unconscionable’.

    May’s complaint argued that Google is aware of the use of its gift cards in scams, pointing to data showing Google Play gift cards comprised a significant portion of reported scams from 2018 to 2021, with the Federal Trade Commission noting losses of over $17 million. She suggested that Google could take steps to warn customers, such as placing warnings on gift cards, but no such warning was provided.

    In court, Google contended that it did not encourage or induce May to make the purchase; rather, the scammers did. The judge agreed, ruling that Google bore no liability since the economic harm May experienced stemmed directly from the scammers, not from any action by Google itself. May argued that Google indirectly profits from these scams by taking a 15 to 30 percent commission on gift card purchases within the Play Store, but this claim did not sway the court.

    The judge noted that May had not used the gift cards “in their designed way” and that Google had no obligation to issue a refund, as May’s funds weren’t considered “stolen” when she made the purchase.

    May also claimed that Google’s technology could potentially track and prevent transactions associated with scams. However, the court found that May failed to show any duty on Google’s part to investigate or prevent such activity, particularly in her case.

    For victims like May, the ruling is a reminder of the limitations in pursuing refunds for gift card scams through legal channels. In cases where these cards are used fraudulently, it’s not uncommon for large companies to point to refund policies similar to those upheld by major retailers. Google, in this case, referenced policies from Target and Walmart, which also do not issue refunds in similar situations.

    Often, gift card scam victims are left without recourse when companies decline to reimburse fraudulent transactions. While this case reinforces Google’s lack of liability, it also spotlights the vulnerability of consumers to scams exploiting loopholes in refund policies.

    Consumers should be aware that gift cards are intended for personal use within the brand’s ecosystem, not as a payment method for debts, fines, or grants. Until systemic changes are made, consumers must stay vigilant, as tech companies may not be required to intervene or compensate for losses in these situations.

     
  • Geebo 8:00 am on May 31, 2023 Permalink | Reply
    Tags: .zip, Google, , , top level domains, URLs   

    New domain extension already being used in scams 

    New domain extension already being used in scams

    By Greg Collier

    If you’re unfamiliar with .zip files, they can be one large file or several smaller files that are compressed into a .zip file to make the space they take up on your device smaller. These .zip packages can be decompressed, or unzipped, by using programs like Win-Zip, 7-Zip, or the built-in compression utilities provided by operating systems such as Windows and macOS.

    Many software applications and operating systems are distributed in the form of .zip files. This allows developers to package all the necessary files and folders into a single archive, simplifying the installation process for users.

    Earlier this month, Google started offering .zip internet domains. That means anyone who wants to buy a web address can purchase a .zip domain instead of .com or .net. Many tech enthusiasts chided Google for making .zip available for domains, as they could be abused by scammers. Now, according to tech reports, the scams have already begun.

    A victim could be thinking they’re downloading legitimate software, but are then directed to a .zip website that could infect their device with malware, among other things. The website will mimic a .zip file being extracted, along with a fake pop-up that says the .zip file has been scanned and no viruses were found.

    For a more detailed explanation of how this works, please read this article from Bleeping Computer.

    Unfortunately, there’s no hard and fast rule to protect yourself from such a scam. If you do download a .zip file, make sure it’s from a trusted source. Anything else that has .zip at the end of it, you may want to avoid it.

     
  • Geebo 8:00 am on September 22, 2022 Permalink | Reply
    Tags: , bing, , , fake ads, Google, ,   

    iPhone scam is symptom of bigger problem 

    iPhone scam is symptom of bigger problem

    By Greg Collier

    Recently, an iPhone user was locked out of her new iPhone. On her husband’s phone, she did a Google search for ‘Apple Customer Service’ and called the number she found. The person on the other end of the call said they’d be happy to help her out. Except, the woman hadn’t really called Apple. Instead, she had called a phony customer support number run by scammers. These scammers had accessed her iPhone and were able to use her Zelle app to steal $1500. However, this scam is not exclusive to either Apple or Google.

    This scam is a version of the tech support scam. Instead of trying to trick victims into believing there’s a virus on their device, this scam waits for someone with a tech problem to call the scammers. In these cases, the scammers take out ads on popular search engines. Not just Google, but Bing and Duck Duck Go as well. The scammers will submit a flurry of ads to these companies in hopes just a handful get through the vetting process. If the ads get approved, they can be listed at the top of the search engine rankings. While the search engine companies claim to be on top of the problem, scammers continue to have their ads for phony customer services approved.

    There are ways to protect yourself from this scam. The first is when you’re doing a web search, make sure the listing you’re about to click on doesn’t have a tiny ad indicator near it. These are usually little text boxes that say ‘Ad’, but sometimes have a color that’s similar to the page’s background. Another way to protect yourself is by going to the manufacturer’s website directly. For example, instead of doing a web search for Apple Customer Service, just go directly to apple.com in your device’s web browser. From there you should be able to find the customer support number if the company has one.

     
  • Geebo 8:00 am on July 12, 2022 Permalink | Reply
    Tags: , , Google, , , , review bomb,   

    Scam Round Up: Amazon crime day and more 

    Scam Round Up: Amazon crime day and more

    By Greg Collier

    Today in the Scam Round up, we’re bringing you one scam you definitely should be aware of, a new twist on an old scam, and a kind of strange scam.

    ***

    First, we have the new twist on the old scam, the rental scam to be specific. Typically, in a rental scam, the scammers post a home or apartment for rent online they don’t own. They’ll then start collecting security deposits, or rent money, from their victims. This is usually all done without ever meeting face to face. However, a woman from Cleveland, Ohio, is accused of allegedly collecting $20,000 from dozens of victims at the apartment complex she worked at. The scammer would tell victims that their application was approved before taking their money. This included payments in money order, cash, and, of course, Cash App.

    It’s difficult to protect yourself from a scam like this when it’s being perpetrated by an employee of a legitimate apartment complex. While we imagine the odds of this scam happening again are low, if you feel like you’re not receiving enough communication from the property management as you get closer to your move-in date, consider talking to another employee at that complex. If you’ve been scammed like this, don’t hesitate to contact your local police.

    ***

    In our strange scam story, restaurants from across the country are being extorted. A rash of scammers is threatening to review-bomb the restaurants with one-star reviews on Google, if the restaurant doesn’t send a $75 Google Play gift card to the scammer electronically. We’re not just talking about your local Applebee’s, these scammers are also threatening restaurants that have been awarded the much lauded Michelin Stars.

    What makes matters worse, Google isn’t the easiest company to get a hold of when you need an issue like this resolved. Google has even refused to recognize some of the reviews as fake and have refused to remove them from their platform.

    While this scam sounds more like a viral prank than anything, the scammers are not relenting. When a restaurant adds a response to the phony complaint indicating the review is fraudulent, the scammers double down with threats like “We can keep doing this indefinitely. Is $75 worth more to you than a loss to the business?”

    While not a lot of people own restaurants compared to the rest of us, a scam like this can potentially threaten any industry and any business.

    ***

    Lastly, we have the scam that everyone should be aware of. Today starts Amazon Prime Day, one of the online retail giant’s biggest sales event. Cybersecurity experts call Prime Day the Super Bowl for scammers. The biggest threats are said to be phony websites that imitate Amazon and messages that appear to come from Amazon but don’t. If a shopper ends up going to one of these phony Amazon clones, they could be subject to malware, identity theft, and lost funds. Always check the URL, or web address, to make sure you’re on the website you want to be. Scam sites will often have a URL that is spelled like the site they’re imitating, but be one letter off or have left a letter out. They could also have the Amazon name in their URL, but have it direct you to their scam site instead.

    Consumers should also be wary of deals that sound too good to be true. That could also be the indicator of a scam. If you will be shopping online during Prime Day, try to use a credit card whenever possible because they offer more protection than a standard bank debit card.

     
  • Geebo 8:47 am on April 13, 2021 Permalink | Reply
    Tags: Google, Google Photos, , ,   

    Google Photos scam wants your password 

    Google Photos scam wants your password

    By Greg Collier

    It’s difficult to live an online life without using some of Google’s services. For example, if you’re using an Android phone, you’re already entrenched in the Google ecosystem. Because of that, you’re probably using Google services that you might not be aware that you’re using. Google Photos is one of those services. If you use an Android phone you’re probably using Google Photos without even knowing it. In most Android phones, Google Photos will back up the pictures you take with your phone to the cloud. Due to the sheer number of people who use Google Photos, it has become an avenue for identity thieves.

    According to reports, scammers are sending out phony emails that say someone has shared their Google Photos Album with you. These are phishing emails that are said to look authentic. If you click on the link to the supposed photo album you’re asked to enter your Google username and password. Except the website where you just entered your Google information isn’t a Google website. Instead, it’s a website set up by scammers to steal your Google login information.

    Please take a moment to think how much your online life is contained in your Google account. In just your Gmail alone there is probably enough information to steal your identity easily. Between banking information and social media accounts, someone with access to your Google account could essentially take over your identity and ruin it for years to come.

    As is the norm with most phishing emails, you should never click on the link any of these emails contain. On your computer, hover your cursor over the link to see where the link actually directs you. Check for misspellings of actual web addresses used by real companies. Also, don’t click on any links that have been shortened by a link shortening service as they can disguise the links true destination.

     
  • Geebo 9:00 am on February 7, 2020 Permalink | Reply
    Tags: , Google, Google Docs, ,   

    Google Docs used in phishing attack 

    Google Docs used in phishing attack

    It’s difficult to accomplish anything online without using one of Google’s many products. Whether your work uses Gmail as its email service or just conducting a simple web search, the majority of us will use a Google product on a daily basis. With most web users using Google’s Chrome browser, many users are entrenched into the Google ecosystem by default. Because of Google’s reach across the internet, it should come as no surprise that opportunistic cybercriminals will use Google’s familiarity to try to compromise your device and information. Once such instance of these tactics has been recently reported.

    Scammers are sending out emails that appear to be from someone on your contacts list who is sharing a document with you from Google Docs. The email will have logos attached from Google and Norton Security. The email will also say that the email has been scanned for viruses. Then there will be a link leading you to the supposed document. If you click on the link, malware could be installed on your device that not only could steal your information but it could also send out similar phishing emails to everyone on your contact list further spreading this latest attack. This is similar to an attack that happened back in 2017.

    [youtube https://www.youtube.com/watch?v=DybcrJyqvAA%5D

    The best way to protect yourself from this attack is to verify with the sender to make sure if this is a legitimate email or not. Enabling two-factor authentication on your email service will also go a long way in preventing your email from being hijacked. If the scammers can’t access your email remotely then they won’t be able to gain control of your outgoing emails. Most email providers offer two-factor authentication protection. While 2FA is not a 100% guarantee of protection, it does prevent a great number of attacks.

     
  • Geebo 8:06 am on July 2, 2019 Permalink | Reply
    Tags: Google, , , University of Chicago Medical Center   

    Did a major hospital expose medical records to Google? 

    Did a major hospital expose medical records to Google?

    Last week, The University of Chicago Medical Center and Google had a class action lawsuit filed against them. The suit contends that when the Medical Center entered into a partnership with Google it allegedly exposed hundreds of thousands of medical records to the search giant. At the heart of the lawsuit is the allegation that the medical records provided to Google contained identifiable patient information which violates the Health Insurance Portability and Accountability Act, or HIPAA as it’s better known.

    [youtube https://www.youtube.com/watch?v=JY1l5s8ED5c%5D

    According to reports, The University of Chicago Medical Center entered into this partnership with Google in order to assist with Google’s artificial intelligence researchers. The researchers are looking for a way to help doctors better diagnose patients with the help of AI. The medical records provided to Google were said to be stripped of all identifiable information which is permitted under HIPAA. However, the lawsuit claims that the dates of service the patients were seen at the medical center were contained within the medical records. The law firm that has filed the suit states that Google could easily identify a patient with just the dates they were seen because of their knowledge of their users’ search histories.

    So is this a legitimate concern or is this a frivolous lawsuit filed by a paranoid patient? While theoretically, it could be possible for Google to determine a patient’s identity through the records received and their own resources it doesn’t make sense for them to do so. Google has an incalculable number of users and many of them don’t even sign into Google when using the service for search. It also makes no financial sense as Google would not only be open to lawsuits like this but the wrath of the government as well. HIPAA violators tend to be fined very heavily and right now, the government and Google aren’t exactly on the best of terms. So until there is better evidence that Google acted maliciously, it appears that your medical records are currently safe.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel