Tagged: identity theft Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on May 14, 2025 Permalink | Reply
    Tags: , , identity theft, ,   

    Fake Refunds, Real Scams 

    Fake Refunds, Real Scams

    By Greg Collier

    There’s already enough anxiety around scams that threaten dire consequences, whether it’s arrest, fines, or lost accounts. But some scams take a different angle, promising something good instead. One such scheme making the rounds in Michigan and other parts of the country is the so-called refund scam, where fraudsters claim that you’re owed money. The offer sounds appealing, especially during times of economic strain, but it’s just another way to steal your personal or financial information.

    Unlike most scams where the fear of loss or punishment is used to manipulate victims, this one dangles the illusion of a reward. The person contacting you may claim to represent your bank, credit union, government office, or a well-known company. They reach out by email, text, phone call, or even social media, claiming you are due a refund or reimbursement. To receive the money, you are often asked to confirm or provide sensitive information like your bank details or Social Security number. In some cases, the scammer might say a small fee is required up front to process the refund.

    These communications often look convincing. The names and logos may resemble real institutions, and the messages might include enough detail to feel personal or urgent. But these tactics are designed to lower your guard. Once the scammer has what they need, the promised money never arrives. Instead, accounts may be drained or identities stolen. In some cases, victims are sent fraudulent checks that later bounce, leaving them responsible for the full amount.

    This type of fraud relies heavily on trust and distraction. The promise of a refund is meant to create a false sense of gain that distracts from the red flags. The safest response is skepticism. If you didn’t ask for a refund or file a claim, be wary of anyone who says you’re getting one. Contact the company directly using verified contact information if you suspect a message could be legitimate. Avoid calling numbers or clicking links provided in unsolicited communications.

    The Michigan Department of Insurance and Financial Services continues to receive reports of these scams. They remind residents that any unexpected communication offering money should be treated with caution. Financial institutions and legitimate businesses do not ask for sensitive information or advance fees to deliver refunds.

    Being cautious about these offers doesn’t mean you’re being paranoid. It means you’re protecting yourself from schemes that promise gain but deliver loss.

     
  • Geebo 8:00 am on May 12, 2025 Permalink | Reply
    Tags: identity theft, , , ,   

    Your Phone Number May Not Be Just Yours 

    By Greg Collier

    A recent case in Franklin County, Kentucky, highlights a troubling trend in mobile phone fraud known as SIM-swapping. Despite the name, this scam does not always involve the physical SIM card in a victim’s device. Even phones with eSIMs or those marketed as not using traditional SIM cards are still vulnerable. What matters to the scammer is control over the phone number, not the card itself.

    SIM-swapping, also called “porting out,” is when a fraudster convinces a mobile carrier to transfer someone’s phone number to a new account under the scammer’s control. Once the transfer is complete, the victim’s device is disconnected from service, while the scammer now receives all calls and text messages meant for the victim. This includes two-factor authentication codes and verification messages that many financial and online services rely on for security.

    In this instance, the couple discovered this scam when their phones lost service almost simultaneously. A message from their mobile provider followed, indicating that a request to change service providers had been received and was being processed. Within minutes, their numbers had been hijacked by individuals using different carriers. From that moment, their identities were essentially in someone else’s hands.

    The consequences were swift and invasive. The scammers attempted to open credit accounts in their names. As the couple scrambled to regain control, they encountered the frustrating reality of automated systems and long waits for human support. In today’s digital environment, losing access to a phone number is more than just an inconvenience. It can mean losing access to email, banking, and personal communications.

    Preventing SIM-swapping begins with strengthening account security. Users are advised to set up unique PINs or passcodes with their mobile carriers that must be provided before any changes are made to their accounts. Some carriers offer port protection or number lock features that make unauthorized transfers more difficult. It’s also critical to limit how much personal information is shared online, especially birthdates, phone numbers, and email addresses which can be used to impersonate a customer in support calls.

    Despite the technical-sounding name, SIM-swapping is a social engineering attack at its core. It preys not on vulnerabilities in the phone itself, but on human error and the weak points in customer service systems. As more services rely on mobile phones as a gateway to personal data, awareness and proactive security measures become all the more essential.

     
  • Geebo 8:00 am on April 29, 2025 Permalink | Reply
    Tags: , , identity theft, Real ID,   

    Real ID Deadline Nears Amid Scam Risks 

    By Greg Collier

    The May 7th deadline to upgrade a driver’s license or state ID to a Real ID is approaching quickly. With that deadline looming, the Better Business Bureau is warning that scammers are actively trying to take advantage of individuals eager to meet the requirement.

    A Real ID will be necessary to board domestic flights or enter federal facilities and military bases. On official websites, images of a Real ID feature a gold star in the upper right-hand corner, distinguishing it from licenses that do not meet federal standards.

    Obtaining a Real ID requires providing several sensitive documents. These include proof of identity such as a birth certificate or U.S. passport, proof of residency through items like a utility bill or credit card statement, a social security number, and documentation of any name changes since birth, such as a marriage certificate or court order. Individuals who hold a permanent resident card or employment authorization card will also need to present those.

    Because these documents contain all the information necessary for identity theft, the risk of falling victim to scams is elevated during this period. One of the most common scams involves fake websites that falsely claim to offer Real ID upgrades completely online. In reality, the Real ID application must be completed in person at an authorized location. Although many DMVs are offering Real ID services, it is important to confirm that the specific location you plan to visit participates.

    Individuals are often more vulnerable to scams when they are rushing, and the approaching deadline may lead some to fall for fraudulent offers. It is important to remember that the Real ID process cannot be completed solely online.

    For those who already possess a valid U.S. passport, the May 7 deadline poses less urgency. A passport can also be used for boarding domestic flights and accessing federal buildings or military bases.

    Travelers should keep in mind that it may take several weeks for a Real ID to arrive by mail after applying. To avoid travel disruptions, it is recommended to schedule an appointment at a local tag agency or visit the appropriate government website to find an authorized location.

    Applicants should be aware that while there are many legitimate resources available, fraudulent websites posing as government agencies are also common. Official information will always make clear that in-person verification is required.

    It is also important to note that obtaining a Real ID is not necessary to continue driving, voting, or applying for federal benefits. However, after May 7th it will be required for air travel and entry into certain federal facilities unless a valid passport is presented.

     
  • Geebo 8:00 am on April 14, 2025 Permalink | Reply
    Tags: , , identity theft, , Soup Can   

    What is the Soup Can Scam? 

    What is the Soup Can Scam?

    By Greg Collier

    The original brushing scam is deceptively simple. Third-party sellers, often operating through online marketplaces, send inexpensive items to people who never ordered them. The goal is not theft but visibility. Once the item arrives, the seller creates a fake customer profile using the recipient’s address, then posts a glowing review to artificially boost their product’s ranking. This tactic helps manipulate online algorithms, giving disreputable sellers a competitive edge by appearing more legitimate through fake feedback.

    However, scammers have evolved.

    A new variation on this scheme has surfaced, one that is less about product reviews and more about financial reconnaissance. In this version, the package is not meant to flatter a storefront’s reputation, but to quietly confirm whether a stolen credit card works. A small, low-cost item like a can of soup is purchased and sent to a real address, often with a different name on the label. If the transaction goes through and the package is delivered without raising suspicion, the scammer then feels emboldened to make larger purchases using the same card. The item is a test. The address is a probe. And the real target is someone whose financial information may already be compromised.

    For the recipient, it can be an unsettling experience. The presence of a package that was never ordered, addressed to a stranger but bearing one’s own address, triggers questions. Is it a simple mistake or something more sinister?

    Legally, the item becomes yours if it arrives at your doorstep unsolicited. You are not required to return it. Still, some recipients may prefer to notify the carrier or mark it for return, especially if the situation seems suspicious or if they suspect identity theft. The key is vigilance. A seemingly harmless delivery could be the beginning of a broader fraud attempt.

    Reports of these unexpected deliveries are increasing. While the sight of a random item like canned soup might seem absurd, it may be the precursor to more serious abuse of stolen data. Knowing the difference between a clerical error and a calculated move by a scammer is essential in an age where fraud is often disguised in the most mundane ways.

     
  • Geebo 8:00 am on April 8, 2025 Permalink | Reply
    Tags: identity theft, , , ,   

    Tax Season’s Hidden Dangers 

    Tax Season’s Hidden Dangers

    By Greg Collier

    As the tax season reaches its peak, state revenue departments across the country are issuing urgent warnings about a surge in scams targeting taxpayers. These schemes are increasingly sophisticated, often mimicking official communications in order to exploit individuals during a period of heightened financial activity and anxiety.

    In Georgia, residents have been targeted by an email campaign falsely claiming to originate from the “GA Taxation Office,” a non-existent entity. The email references coronavirus-related relief programs and asks recipients to provide high-resolution images of their driver’s license and Medicare card. The sender’s address resembles a government domain at first glance, but closer inspection reveals it originates from a fraudulent and unofficial source. The Georgia Department of Revenue has emphasized that it does not request sensitive personal information through unsolicited emails or messages.

    Meanwhile, in Utah, taxpayers have reported receiving letters that closely resemble official notices from the state. These fraudulent letters claim the recipient owes unpaid taxes and threaten legal action, property liens, or asset seizure unless immediate payment is made. These tactics are designed to provoke fear and elicit an immediate response, bypassing any verification steps. The Utah State Tax Commission has urged residents to confirm the legitimacy of any questionable tax notices by contacting their offices directly and to avoid engaging with any information listed in the fraudulent documents.

    In Michigan, officials are focused on combating tax-related identity theft, particularly schemes involving the unauthorized filing of tax returns to claim refunds. Cybercriminals are employing deceptive emails and messages that pressure recipients into disclosing personal information under the guise of urgency or legal threat. These scams often succeed when individuals let their guard down, especially when messaging appears to come from a trusted source. The Michigan Department of Treasury is reminding taxpayers to connect only through secure internet networks, avoid clicking suspicious links, and never respond to unsolicited messages requesting personal data.

    Each of these examples underscores the importance of vigilance. Scammers rely on confusion, fear, and the appearance of legitimacy to manipulate individuals into compromising their financial security. Taxpayers should be cautious when receiving unexpected communications about taxes, regardless of the format. Verifying the source through official state websites or direct contact with tax agencies is the most effective way to avoid becoming a victim.

    Tax season will always be a busy time for scammers. Staying informed and exercising caution are essential steps toward protecting your personal information and your refund.

     
  • Geebo 8:00 am on March 11, 2025 Permalink | Reply
    Tags: File Converters, identity theft, ,   

    The Hidden Risks of Online File Converters 

    By Greg Collier

    Converting a document into a different format seems like a simple task, until it isn’t. Many online services promise to do the job quickly and for free, making them an easy choice for those in a hurry. But the FBI is warning that these shortcuts could come with a heavy price.

    Cybercriminals have found a new way to exploit these online tools, embedding malware into downloaded files. While the converter may appear to function as expected, delivering the desired file type, it can also serve as a gateway for hackers to steal personal information. Once installed, malware can grant unauthorized access to sensitive details such as email credentials, banking information, and even social security numbers. Some cases have even led to full-scale ransomware attacks.

    Authorities say this type of scam is on the rise, appearing in cities across the country. Reports from Colorado indicate that cybercriminals are actively using file conversion services to compromise both personal and business networks. The first warning signs of an attack often come from antivirus software flagging an issue, IT departments detecting malware, or users noticing unusual changes to their online accounts.

    What makes these scams particularly dangerous is their international reach. Many perpetrators operate from abroad, making it difficult to track them down and prosecute. This means prevention is the best defense. Experts advise keeping antivirus software updated and scanning any file downloaded from the internet before opening it. Most importantly, taking a moment to verify the safety of an online tool before using it can make all the difference.

    For those who suspect they’ve fallen victim to this scam, immediate action is crucial. Changing passwords from a secure device, contacting banks to monitor account activity, and reporting the incident to the FBI’s Internet Crime Complaint Center are key steps to mitigating the damage.

    While online file converters can be tempting, the risks they pose should not be underestimated. A few extra moments of caution can help users avoid becoming the next target of cybercrime.

     
  • Geebo 9:00 am on February 17, 2025 Permalink | Reply
    Tags: , identity theft, , , , section 8 housing   

    Section 8 Scam Shocks Los Angeles Residents 

    Section 8 Scam Shocks Los Angeles Residents

    By Greg Collier

    Section 8 housing, formally known as the Housing Choice Voucher Program, is a federal assistance initiative designed to help low-income individuals and families afford safe and stable housing. Administered by local public housing agencies (PHAs) with funding from the U.S. Department of Housing and Urban Development (HUD), for now, the program provides subsidies that allow recipients to rent privately owned homes at a reduced cost. Demand for these vouchers is high, and in cities like Los Angeles, long waiting lists and limited availability create challenges for those seeking assistance.

    Unfortunately, the urgency and need surrounding affordable housing have made it a target for scammers. Over the weekend, dozens of people fell victim to a fraudulent flyer circulating online, which falsely advertised a voucher distribution event at a local recreation center. Upon arrival, hopeful applicants were met with a sign informing them that the event was a hoax.

    These scams are often designed to steal personal information for identity theft. Fraudsters may ask victims to provide sensitive details, such as Social Security numbers or bank account information, under the pretense of processing an application. Others may demand upfront fees for guaranteed placement on a waitlist, or offer fake ‘expedited processing’ services.

    To avoid falling for such scams, it’s crucial to verify any claims regarding Section 8 through official channels. Public housing agencies do not charge fees for applications or placement on a waitlist. Official information on the program, including application procedures and open enrollment periods, can be found through HUD’s website or directly from local housing authorities. In Los Angeles, the Housing Authority of the City of Los Angeles (HACLA) is responsible for administering Section 8 vouchers, and updates about the program are available on their official website.

    Individuals seeking assistance should be wary of unsolicited offers, especially those circulating on social media, and report suspicious activities to local authorities. While housing challenges remain a pressing issue, accurate information is the best defense against scams that prey on vulnerable communities.

     
  • Geebo 9:02 am on December 10, 2024 Permalink | Reply
    Tags: identity theft, , ,   

    SIM Swapping Scam Can Happen to Anyone 

    SIM Swapping Scam Can Happen to Anyone

    By Greg Collier

    The convenience of managing our finances and communications through smartphones comes with significant risks. One of the most insidious threats is SIM swapping, a scam that has left countless victims, including a California resident who recently lost $38,000, in financial turmoil. This incident is a reminder that no one is immune to such scams, and protecting oneself requires awareness.

    SIM swapping occurs when a scammer tricks a mobile carrier into transferring a victim’s phone number to a device they control. This doesn’t require physical access to the victim’s phone. Armed with basic personal information, often gathered through online sources or data breaches, fraudsters impersonate the victim to convince the carrier to make the switch.

    Once the fraudsters gain control of a phone number, the possibilities for exploitation are vast. They can intercept calls and texts, including the two-factor authentication (2FA) codes that are often the last line of defense for financial accounts. This allows them to bypass security measures and initiate fraudulent transactions. Alarmingly, this scam isn’t limited to traditional SIM cards as eSIM technology, which doesn’t rely on a physical SIM, is just as vulnerable.

    The victim in this recent case described the harrowing experience of losing access to his phone and, subsequently, his financial accounts. It started with strange notifications and the sudden inability to connect to his cellular network. Soon after, three wire transfers drained his account of $38,000, funds meant for essential living expenses. Despite reporting the fraud, the initial response from his bank denied his claim, citing a confirmation sent via text, a text the victim never received because his phone number was compromised.

    The frustration and helplessness in such scenarios can be overwhelming. Even after the bank reopened the case, uncertainty loomed about whether the funds would ever be recovered.

    According to the FBI, SIM swapping scams affected over 1,000 victims in 2023, resulting in more than $48 million in losses. The alarming aspect of this scam is that victims don’t need to interact directly with the fraudsters. By leveraging personal information available online, names, addresses, and other seemingly innocuous details, scammers can bypass many security measures.

    This underscores the importance of adopting robust security practices that go beyond traditional protections. Simple measures like setting up a PIN for mobile accounts or using app-based authentication for 2FA can make a significant difference.

    The first step in mitigating the risk of SIM swapping is awareness. Recognize that this scam can target anyone, regardless of the type of phone or SIM technology they use. No phone is inherently safe from this attack, and assuming invulnerability can lead to complacency.

    Strengthening your defenses begins with securing your mobile account. Many carriers offer the option to set a unique PIN or passphrase that is required for account changes. Additionally, wherever possible, replace text-based 2FA with app-based authentication tools, which are less susceptible to interception.

    Being mindful of the information you share online is also critical. Social media profiles and public records can provide scammers with the details they need to impersonate you. Regularly monitor your financial accounts for unusual activity and act quickly if you notice anything suspicious.

    If you fall victim to a SIM swapping scam, report it immediately to your mobile carrier and financial institutions. Additionally, filing a complaint with the FBI’s Internet Crime Complaint Center (IC3) can aid in tracking and combating this growing threat. While recovery may take time, persistence and proper documentation of the fraud are essential.

    SIM swapping is a sobering example of how our reliance on technology can be exploited. By staying informed and implementing strong security measures, individuals can reduce their vulnerability to these devastating scams. This is a collective battle, and vigilance is our best defense.

     
  • Geebo 9:05 am on November 12, 2024 Permalink | Reply
    Tags: , , identity theft,   

    Don’t Fall for the Fake Debt Trap 

    Don’t Fall for the Fake Debt Trap

    By Greg Collier

    Scammers are constantly finding new ways to exploit people’s fears, and one of their most alarming tactics involves posing as representatives from loan companies, law firms, or even government agencies. They claim you owe money for a debt that doesn’t exist, using intimidation and urgency to trick victims into paying. These schemes are designed to create panic and pressure, making it easier for fraudsters to steal your money.

    The Better Business Bureau (BBB) has issued a warning about this growing threat. The scheme typically begins with an alarming phone call or text message. The caller or sender, appearing professional and authoritative, asserts that you have an overdue payment. They may cite loans or debts from years ago, hoping to catch you off guard. The urgency in their tone and the specificity of their claims can make their story seem plausible, even if you have no recollection of such a debt.

    For those who question the validity of the debt, scammers escalate their tactics. They might threaten legal action, such as filing a lawsuit or even issuing an arrest warrant. This fear-driven approach is designed to coerce immediate payment, playing on your anxiety to avoid conflict or legal trouble.

    The emotional toll of such harassment can be immense, especially when these con artists persist for weeks or months. Victims often find themselves hounded at home and even at their workplaces, further intensifying the pressure. One individual reported being threatened with a felony charge over a loan they had no memory of, ultimately losing a significant sum of money in their attempt to settle the fictitious claim.

    If you find yourself in a similar situation, it’s crucial to remain calm and take deliberate steps to protect yourself. The law provides safeguards to ensure legitimate debt collection practices. In the United States, for instance, debt collectors must provide a written debt verification letter that outlines the specifics of the debt, including the amount owed, the creditor’s name, and your rights as a consumer. If a caller fails to provide this documentation, it’s a red flag.

    Additionally, never disclose personal or financial information over the phone to unsolicited callers. Real debt collectors will already have these details on file. If you are uncertain about the legitimacy of the claim, contact your loan providers directly. They can verify whether any debts are outstanding. Reviewing your credit report is another vital step in confirming the status of your accounts and identifying potential fraud. If your personal information has been compromised, placing a fraud alert on your credit report can help safeguard against further scams.

    The BBB emphasizes that while the persistence and manipulation of these scammers can be overwhelming, staying informed and vigilant is your best defense. By understanding your rights and recognizing the warning signs, you can shield yourself from falling victim to these deceitful schemes. Remember, no legitimate collector will threaten or coerce you into immediate payment without proper documentation. Trust your instincts, verify claims independently, and report any suspicious activity to the appropriate authorities.

     
  • Geebo 9:02 am on November 11, 2024 Permalink | Reply
    Tags: CBP, Customs and Border Protection, identity theft, ,   

    CBP Warns of a Surge in Scam 

    CBP Warns of a Surge in Scam

    By Greg Collier

    In a growing wave of fraudulent activity, U.S. Customs and Border Protection (CBP) is alerting the public to an alarming rise in scam phone calls targeting individuals across the country. These sophisticated scams exploit fear, aiming to deceive people into sharing sensitive personal and financial information.

    The scam typically unfolds with a chilling claim. CBP has allegedly intercepted a shipment of drugs linked to the victim’s name and address. The caller, posing as a CBP officer, insists that immediate cooperation is essential to resolve the situation. The pressure escalates as the scammer threatens police intervention if the victim refuses to comply.

    Adding to the scam’s credibility, the caller often provides details such as a real CBP employee’s name, fake case numbers, or badge identifiers. This information can be easily harvested from public sources. In some cases, automated messages warn about intercepted shipments and instruct recipients to press a number to speak with a supposed CBP agent. Once connected, the scammer’s primary goal is to extract sensitive details like banking information or Social Security numbers.

    CBP has emphasized that these calls are fraudulent. The agency does not demand personal information or money over the phone, nor does it issue threats involving law enforcement or promises of financial rewards for cooperation. Legitimate communications from CBP will never involve requests for payment via gift cards, cryptocurrency, or wire transfers.

    Fraudsters are becoming increasingly skilled at making their calls appear legitimate, even manipulating caller ID to display authentic-looking numbers. If there is any doubt about the legitimacy of a call, CBP advises contacting the agency directly through its official website. Additionally, victims or those targeted by these scams should report the incident to the Federal Trade Commission.

    Protecting personal information requires skepticism of unsolicited calls, especially those that demand immediate action under the guise of authority. Always verify before you trust, and report any suspicious activity to help combat this pervasive threat.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel