Tagged: identity theft Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:02 am on November 11, 2024 Permalink | Reply
    Tags: CBP, Customs and Border Protection, identity theft, ,   

    CBP Warns of a Surge in Scam 

    CBP Warns of a Surge in Scam

    By Greg Collier

    In a growing wave of fraudulent activity, U.S. Customs and Border Protection (CBP) is alerting the public to an alarming rise in scam phone calls targeting individuals across the country. These sophisticated scams exploit fear, aiming to deceive people into sharing sensitive personal and financial information.

    The scam typically unfolds with a chilling claim. CBP has allegedly intercepted a shipment of drugs linked to the victim’s name and address. The caller, posing as a CBP officer, insists that immediate cooperation is essential to resolve the situation. The pressure escalates as the scammer threatens police intervention if the victim refuses to comply.

    Adding to the scam’s credibility, the caller often provides details such as a real CBP employee’s name, fake case numbers, or badge identifiers. This information can be easily harvested from public sources. In some cases, automated messages warn about intercepted shipments and instruct recipients to press a number to speak with a supposed CBP agent. Once connected, the scammer’s primary goal is to extract sensitive details like banking information or Social Security numbers.

    CBP has emphasized that these calls are fraudulent. The agency does not demand personal information or money over the phone, nor does it issue threats involving law enforcement or promises of financial rewards for cooperation. Legitimate communications from CBP will never involve requests for payment via gift cards, cryptocurrency, or wire transfers.

    Fraudsters are becoming increasingly skilled at making their calls appear legitimate, even manipulating caller ID to display authentic-looking numbers. If there is any doubt about the legitimacy of a call, CBP advises contacting the agency directly through its official website. Additionally, victims or those targeted by these scams should report the incident to the Federal Trade Commission.

    Protecting personal information requires skepticism of unsolicited calls, especially those that demand immediate action under the guise of authority. Always verify before you trust, and report any suspicious activity to help combat this pervasive threat.

     
  • Geebo 8:00 am on October 1, 2024 Permalink | Reply
    Tags: , , identity theft, , ,   

    Are Text Message Scams Targeting Children? 

    Are Text Message Scams Targeting Children?

    By Greg Collier

    Text message scams are evolving, and children are now becoming unintended targets. One recent incident in Lafayette, Louisiana, highlights how scammers send random texts, often addressing the recipient by the wrong name, in hopes of starting a conversation. For example, a teenager received a message intended for ‘Rose’, a name that was unfamiliar to her. While this might seem like a simple mistake, responding with something like “Sorry, wrong number” is precisely what scammers want. Once engaged, they can continue the conversation, pretending to befriend the child by asking casual questions like their name or school.

    Although these scams don’t specifically target children, the random nature of the messages means kids are just as likely to receive them. It’s crucial for parents to stay aware of who is contacting their children. In this case, the teen was able to block the number, but it serves as a reminder for parents to monitor their children’s messages and have open conversations about the dangers of engaging with unknown contacts.

    Identity thieves are increasingly drawn to a child’s personal information because it is often untapped and unmonitored. Since children haven’t established credit yet, their Social Security numbers and other identifying details provide a blank slate for criminals to exploit. Scammers can use this clean credit history to open fraudulent accounts, apply for loans, or commit other forms of financial fraud, all while the child, and their parents, remain unaware for years. By the time the child becomes old enough to establish their own credit, they may discover a damaged credit history. This is why scammers, who might initially seem harmless or casual in their approach, can pose a serious risk if they gain access to personal details through seemingly innocent interactions like text messages. Parents must remain vigilant to protect their child’s identity from being compromised in these scams.

    Children may not always recognize the risks, which is why it’s essential to teach them to be cautious about sharing any personal information with strangers, especially through text. Adjusting phone settings to block unknown numbers and being vigilant about their online interactions can help reduce the chances of children falling victim to these scams. While this may seem like a harmless exchange at first, the underlying goal of scammers is to extract personal or family information, and early intervention can prevent any further risks.

     
  • Geebo 8:00 am on September 20, 2024 Permalink | Reply
    Tags: , identity theft, , ,   

    The Evolving QR Code Scam 

    The Evolving QR Code Scam

    By Greg Collier

    Across the United States, a new scam is making waves, capitalizing on modern technology and targeting unsuspecting victims in their homes. This scam, which revolves around unsolicited packages and QR codes, has been reported in multiple regions, from Ohio to Mississippi, and is showing no signs of slowing down.

    The scam starts innocently enough as an unexpected package arrives at your door, often containing an item like jewelry, gadgets, or other small electronics. There’s no return address or clear indication of who sent it. Inside, a small QR code invites you to scan it for more information about the ‘gift’ or to register the item. But beneath this seemingly harmless gesture lies a potentially dangerous ploy.

    When scanned, the QR code can deliver malicious software directly to your smartphone or computer. The goal is often to steal sensitive data, such as banking information, personal details, or passwords, allowing scammers to access your financial accounts or even your identity. The damage can be swift and severe, with victims reporting emptied bank accounts and compromised personal data.

    This scam is a more dangerous variation of the traditional brushing scam. In the original version, companies would send unsolicited packages to generate fake positive reviews. However, this new version takes it a step further, using technology to infiltrate personal devices and steal valuable information. The unsolicited items may now come with the hidden threat of malware or identity theft, making this a serious issue nationwide.

    What makes this scam particularly concerning is how easy it is to fall for. QR codes have become increasingly common in everyday life, used for everything from restaurant menus to product registration. Scammers exploit this familiarity by enticing victims to scan the code, unaware of the potential risks.

    Reports of this scam have surfaced in various states, signaling that this is not a localized issue but a national problem. As the scam spreads, its potential to cause widespread harm grows, especially when the holiday season approaches and package deliveries increase. During this time, people are more likely to receive unexpected packages and might be less cautious when interacting with them, which plays right into the scammers’ hands.

    To protect yourself from this scam, there are a few important steps to keep in mind. First and foremost, if you receive a package you didn’t order, resist the temptation to scan any QR codes included with it. Even if the item seems harmless or intriguing, interacting with these codes could lead to severe consequences.

    Reporting these packages is also crucial in alerting authorities and preventing future victims. Whether through online retail platforms or local consumer protection agencies, flagging suspicious packages can help others stay informed and protected.

    As scams like these evolve, the need for public awareness becomes even more critical. With the rise of QR codes as a convenient tool for consumers, scammers are finding new ways to exploit technology and manipulate people into handing over their private information. Educating others, and spreading the word about potential dangers, can make a significant difference in combating this growing national threat.

     
  • Geebo 8:00 am on September 17, 2024 Permalink | Reply
    Tags: , , , identity theft, , ,   

    What Is the Evil Twin Attack Targeting Travelers? 

    What Is the Evil Twin Attack Targeting Travelers?

    By Greg Collier

    You might feel safe and relaxed while cruising at 35,000 feet, but there’s something you should be on the lookout for, even mid-flight. It’s a sneaky Wi-Fi scam known as the Evil Twin Attack. This old trick has resurfaced, now targeting airline passengers.

    Recently, news outlets in Australia reported an arrest involving this very scam. Authorities claim that a man stole passengers’ personal information using a fake Wi-Fi network while they were on a flight. How did this happen? Let’s break it down.

    Evil Twin Wi-Fi is a fake network that copies the name of a Wi-Fi you’ve used before and trust. Think of places like airports, hotels, or coffee shops where your phone or laptop automatically reconnects to the Wi-Fi without you even thinking about it. Scammers take advantage of this by creating a Wi-Fi network with the same name to trick your phone into connecting to their network instead.

    In the Australian case, the alleged scammer took it a step further. He boarded multiple flights with a portable Wi-Fi hotspot that mimicked the name of the airport’s Wi-Fi. When the plane took off and passengers switched to airplane mode, their phones unknowingly connected to the imposter Wi-Fi, thinking they were back on the airport’s trusted network.

    Once passengers connected, they were asked to log in using their social media or email passwords. If they did, they handed over sensitive information like usernames and passwords, which could easily be used for identity theft. Essentially, the scammer could pretend to be them online and access their accounts.

    This may sound alarming, but there are simple ways to avoid falling victim to an Evil Twin Wi-Fi attack. One effective method is to delete any public networks your phone automatically reconnects to, such as those from airports, cafes, or libraries. By going into your Wi-Fi settings and removing these unnecessary networks, you can prevent your phone from connecting to potentially fake ones in the future.

    Another smart precaution is to keep your Wi-Fi turned off when you’re not using it. Rather than leaving it on by default, only activate it when you are certain you’re connecting to a trusted network. This small habit can greatly reduce your risk.

    Adding security software, like a virtual private network (VPN), is another protective measure. A VPN will encrypt your data, helping to ensure that even if you accidentally connect to a rogue network, your personal information most likely remains secure.

    These adjustments are simple but can go a long way in keeping your data safe. As scams like this one become more common, especially in places like airports, staying alert and taking these precautions will help protect you, even at 35,000 feet!

     
  • Geebo 8:00 am on August 21, 2024 Permalink | Reply
    Tags: , identity theft,   

    BBB Warns of Nationwide Scam 

    BBB Warns of Nationwide Scam

    By Greg Collier

    In recent months, consumers across the nation have been encountering a troubling trend, mysterious packages arriving at their doorsteps without being ordered. These unsolicited deliveries are part of a growing scam known as the brushing scam, which involves third-party sellers sending items to random addresses to boost their products’ online ratings with fake reviews. While the packages may seem harmless, the underlying scam has concerning implications for those involved.

    The Better Business Bureau (BBB) has issued a warning about this scam, emphasizing its potentially scary downside. The products received through brushing scams are typically lightweight and inexpensive to ship, such as ping pong balls, face masks, or small gadgets. In some cases, recipients have found more unusual items, like a humidifier or a Bluetooth speaker. The common thread is that none of these items were ordered by the recipient, and the packages often arrive without a clear return address, making it difficult to identify the sender.

    The motivation behind these deliveries is simple but effective, scammers are trying to manipulate online marketplaces. By sending these unsolicited items, they can falsely claim that a verified purchase was made, allowing them to post glowing reviews under the guise of legitimate buyers. These fake reviews help boost the product’s visibility and sales, all while the unsuspecting recipient remains unaware of their involvement in the scheme.

    The most unsettling aspect of this scam, as highlighted by the BBB, is that it suggests the sender has access to some of the recipient’s personal information, such as their name, address, and potentially even their phone number. This information, once obtained, can be exploited in various ways by those with malicious intent.

    To protect yourself from this scam, the BBB recommends taking proactive steps if you receive an unsolicited package. First, notify the retailer about the situation and attempt to identify the sender if possible. Check your online accounts for any unauthorized orders, and change your passwords to secure your information. While you are legally allowed to keep the items, it’s crucial to remain vigilant about protecting your identity and monitoring for any suspicious activity.

     
  • Geebo 8:00 am on August 19, 2024 Permalink | Reply
    Tags: , identity theft, National Public Data,   

    Massive Data Breach: What You Need to Know 

    Massive Data Breach: What You Need to Know

    By Greg Collier

    In a chilling reminder of the ever-growing threat to personal data, National Public Data (NPD), a well-known background check service, has confirmed that hackers breached its systems. This disclosure follows the leak of a stolen database containing millions of Social Security numbers (SSNs) and other sensitive personal information.

    The leaked data, which began surfacing earlier this year, includes a vast array of personal details. A staggering number of records were offered for sale, and more recently, a comprehensive version was shared freely online. This information, though extensive, is riddled with inaccuracies and outdated data, adding further complexity to the situation. Some individuals are associated with incorrect details, and in some cases, even deceased persons are listed.

    For those affected, the breach is a cause for concern. The exposure of SSNs and other personal information heightens the risk of fraudulent activity, while the release of contact information opens the door to potential phishing attempts. Monitoring financial accounts and staying alert to suspicious communications are essential steps in protecting oneself from further harm.

    If you suspect that you or a loved one may be affected by the NPD breach, consider the following steps:

    • Monitor your financial accounts for any signs of fraudulent activity.
    • Report suspicious activity to credit bureaus immediately.
    • Be cautious of unsolicited emails, texts, or phone calls that may be phishing attempts.
    • Consider freezing your credit to prevent unauthorized access.

    This breach serves as a stark reminder of the importance of safeguarding your personal information. As we await further developments, staying informed and proactive is the best defense against potential identity theft and fraud.

     
  • Geebo 8:00 am on August 16, 2024 Permalink | Reply
    Tags: , , identity theft, ,   

    The resurgence of check fraud 

    By Greg Collier

    Writing physical checks might seem like an outdated practice. However, despite the decline in check usage, check fraud is not only persisting, it’s on the rise. Many victims of this crime may not even realize they’ve been targeted until it’s too late.

    Imagine receiving a notification from your bank that a check you wrote for a small amount was cashed for a staggering sum. Or worse, that multiple checks you never wrote are now linked to your account. Unfortunately, scenarios like this are becoming more common.

    Criminals have found new ways to profit from stolen checks, with social media platforms like Telegram becoming a marketplace for these illicit transactions. In one recent case, dozens of stolen checks from a specific area were found for sale online. The checks, all pilfered from the same vicinity, were bundled with personal information that was brazenly displayed for potential buyers.

    Once checks are stolen, they are often undergo a process called check washing. This process involves removing the original ink, allowing fraudsters to alter the payee’s name and the amount. These doctored checks are then sold to the highest bidder, often along with other stolen information such as driver’s licenses, and debit cards. The sheer volume of stolen checks has allowed criminals to operate openly, with little need to conceal their activities.

    To protect against check fraud, limiting the use of checks is advisable. If writing a check is unavoidable, it’s wise to avoid dropping it in public mailboxes, where criminals often strike. Instead, taking the check directly to the post office provides a safer alternative. Tracking the check’s progress can also offer peace of mind, ensuring that it reaches its destination without issue. Staying alert and monitoring bank accounts closely can help catch any unusual activity early, allowing for a quicker response if something goes wrong.

    Check fraud may seem like a relic of the past, but its resurgence reminds us that even in a digital world, old threats can still cause significant harm. By taking a few extra precautions, you can help protect yourself from becoming the next victim.

     
  • Geebo 8:00 am on July 15, 2024 Permalink | Reply
    Tags: identity theft, , ,   

    Scammers pose as process servers 

    Scammers pose as process servers

    By Greg Collier

    Process servers play a crucial role in the legal system by ensuring that all parties receive proper notification of legal actions against them, which is a fundamental aspect of due process. They deliver various legal documents, such as subpoenas, summons, complaints, and court orders, to defendants, witnesses, and other parties involved in a legal proceeding.

    They ensure that the delivery of documents follows the legal requirements and procedures set forth by the jurisdiction where the case is being heard. This is crucial to ensure that the served party’s legal rights are upheld.

    Sometimes, finding the person to be served can be challenging. Process servers may need to use investigative skills to locate individuals who are avoiding service or have moved to an unknown address. Process servers typically do not call the parties they are serving to demand personal information. However, scammers have exploited the public’s lack of knowledge about process servers.

    According to the Better Business Bureau (BBB), scammers are posing as process servers and calling their victims over the phone. The caller claims there’s a lien on the victim’s home, or that they’re being taken to court over unpaid bills.

    Additionally, the scammers may claim you or a family member are a person of interest in a matter that requires immediate attention, while hiding behind the lie that federal law prohibits them from sharing any additional information about the matter.

    From there, the scammer will ask a victim to confirm sensitive personal information, such as their date of birth, address, or Social Security number. If a victim asks too many questions, the scammer may become angry and threaten further action.

    Again, process servers do not call their targets in advance. The element of surprise is crucial to effectively serving legal documents, ensuring the recipient cannot avoid the service. They do not have the authority to arrest individuals, enforce court orders, or take any action beyond delivering legal documents. They cannot compel individuals to comply with legal documents they serve.

    These Scammers may already have some personal information from previous scams or data breaches. Avoid providing additional details unless you are sure of the caller’s legitimacy. Be cautious with questions that require a simple yes or no answer.

    You should also avoid providing any information about friends and family members, as these scammers may be targeting someone you know rather than you directly. Instead, hang up the phone and notify the family member about the call you received. This way, they can be on the lookout for other scams and take action to protect their personal and financial information if it’s at risk or has been stolen.

     
  • Geebo 8:00 am on June 10, 2024 Permalink | Reply
    Tags: , identity theft, ,   

    How does this car dealer scam affect you? 

    How does this car dealer scam affect you?

    By Greg Collier

    Driving a new car is a thrill, but what if you end up unknowingly paying for someone else’s joyride? A concerning scam is targeting unsuspecting individuals and leaving them on the hook for cars they never intended to buy.

    One car dealership in Traverse City, Michigan, has encountered this disturbing scam that preys on both car dealers and buyers. Recently, the dealership experienced a close call with a scam that appeared legitimate. Here’s how it typically unfolds: scammers pose as legitimate buyers, providing all necessary contact details and expressing interest in purchasing a vehicle online. They often request that the car be delivered to an offsite location. Everything seems above board until the credit application process begins.

    The dealership conducts due diligence, asking many questions. These questions are crucial because, more often than not, the supposed buyers are using stolen identities to complete the purchase. Once the deal is done, the scammer drives away in a new car, leaving the real person whose identity was stolen to deal with the fallout. Despite these efforts, there are still many potential victims—dealerships, identity theft victims, and even lenders.

    It’s emphasized to stay on top of your credit. Monitoring credit inquiries can alert individuals to any unauthorized activity, allowing them to act quickly. Locking your credit with all three major bureaus is a recommended step. This measure makes it impossible for the financing paperwork to go through and stops the scam in its tracks. Many financial institutions also offer services that monitor social security numbers and alert individuals to any suspicious activity.

    While dealerships and lenders are increasingly aware of this scam, it’s crucial for everyone to stay informed. The digital nature of these transactions can leave a traceable footprint, aiding law enforcement in tracking down perpetrators. However, even with these tools, convictions remain challenging due to the scammers’ adeptness at covering their tracks.

    The convenience of online car shopping is undeniable, but taking precautions can ensure that you’re not inadvertently paying for someone else’s ride.

     
  • Geebo 8:00 am on May 17, 2024 Permalink | Reply
    Tags: , identity theft, , medical identity theft,   

    Medical identity theft prevents crucial treatment 

    Medical identity theft prevents crucial treatment

    By Greg Collier

    Imagine receiving a cancer diagnosis, only to discover that your path to treatment is obstructed by an identity theft scam. This was the reality for a patient at a free clinic in Brevard County, Florida. She had canceled her legitimate health insurance because she couldn’t afford the copays, and was depending on the clinic’s partnership with a top-tier cancer hospital to access the necessary care through an indigent care program.

    When the clinic attempted to enroll her in the hospital’s financial assistance program, they discovered that someone had stolen her social security number and taken out a fraudulent insurance policy in her name. This policy was used by the scammer to earn a commission, with the premiums being paid using a tax credit and sent to a fake address. As a result, the hospital’s system showed she already had insurance, disqualifying her from the assistance program she desperately needed.

    The fraudulent policy cost the patient precious time. She went months without any cancer treatment, a critical period when early intervention is paramount. The volunteer-led clinic realized the extent of the problem and sought help from the cancer hospital. However, the fraudulent policy blocked this route.

    Upon uncovering the scam, the clinic’s director filed a fraud report and managed to get the fake policy canceled. They are now working diligently to expedite her access to the cancer treatment she needs. Despite this progress, the delay has already had serious implications for her health.

    Medical identity theft can be difficult to prevent entirely, especially for those who are already vulnerable. However, there are several proactive steps individuals can take to help protect themselves from such scams.

    Request a copy of your medical records annually from your healthcare providers to ensure there are no inaccuracies or unfamiliar services listed. Shred documents containing personal information, such as medical bills, insurance statements, and other records that include your SSN or medical details. If contacted by someone claiming to be from a healthcare provider or insurance company, verify their identity by calling the organization directly using a known phone number. Carefully review any Explanation of Benefits (EOB) statements you receive from your insurance provider. Look for unfamiliar services or charges and report any discrepancies immediately.

    By taking these precautions, individuals can significantly reduce the risk of becoming victims of medical identity theft and be better prepared to address any issues swiftly if they arise.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel