Tagged: impersonation scam Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on June 19, 2025 Permalink | Reply
    Tags: , , impersonation scam, ,   

    Scammers Clone Celebrity Voices 

    Scammers Clone Celebrity Voices

    By Greg Collier

    A growing number of scams now involve the use of artificial intelligence to impersonate well-known individuals, including local news personalities and potentially even national celebrities. A recent example in Cincinnati highlights the sophistication of these tactics, as scammers used AI-generated audio to mimic the voice of a local TV meteorologist.

    The scheme involves the creation of fake social media accounts, complete with copied profile photos and fabricated usernames that closely resemble legitimate ones. These impersonators send friend requests to unsuspecting individuals and later initiate private conversations in which they use voice messages to convince the target of their identity. The scammers then ask for large sums of money, exploiting the trust built through this artificial familiarity.

    What makes this scam particularly effective is the use of AI voice cloning. With only a few seconds of publicly available audio, such as from a news broadcast or social media post, malicious actors can create a nearly perfect replica of a person’s voice. This technology is readily accessible through free or inexpensive software tools available online.

    While this incident involved a local media figure, the same approach can be used to mimic actors, musicians, and other public figures. It can also extend to impersonations of family members, as seen in other frauds where a cloned voice is used to trick victims into believing a loved one is in distress.

    Social media companies and cybersecurity experts continue to warn the public about these emerging threats. Verifying the legitimacy of messages or profiles, particularly when they involve requests for money, is critical. Fake accounts often use slight misspellings, have minimal engagement, or were created recently. In many cases, a quick search can reveal the existence of the real account, helping to identify the fraudulent one.

    The rise of AI-powered impersonation poses significant challenges to online safety. It underscores the importance of skepticism, especially when requests come through unofficial or unexpected channels. Awareness and caution remain the first lines of defense against this evolving form of digital deception.

     
  • Geebo 8:00 am on June 16, 2025 Permalink | Reply
    Tags: , impersonation scam,   

    Scammers Target Families in Mourning 

    A deeply troubling scam has emerged in Georgetown County, South Carolina, where criminals are preying on grieving families by impersonating funeral home staff. This fraudulent scheme involves callers contacting individuals who have recently lost a loved one, demanding immediate payment for fabricated funeral expenses. Law enforcement officials are now warning the public about the scam’s growing presence.

    The scheme is designed to exploit people in a moment of emotional vulnerability. Scammers are reportedly calling family members of the deceased, claiming to be from local funeral homes, and insisting that a payment is overdue. The calls often come shortly after a death has occurred, when families are still in shock and final arrangements are fresh in their minds. The scammers typically urge the victim to pay over the phone using a credit or debit card, often with aggressive or time-sensitive language.

    Authorities have confirmed that several families in the area have already fallen victim to the ruse. In some cases, victims had already paid for funeral services in full, but the emotional toll of grief and confusion left them susceptible to the convincing and urgent-sounding phone calls. Legitimate funeral homes in the area are reporting that they have never seen anything like this before and are now working with law enforcement to alert the public.

    To avoid falling victim to this type of scam, it is important to remain cautious when receiving unexpected calls involving money, especially during times of personal loss. Funeral homes do not typically demand payment over the phone without prior documentation or a formal billing process. If a call feels suspicious, individuals are advised to hang up and contact the funeral home directly using a verified number. Any payment concerns should be addressed in person or through official, traceable communication channels.

    Criminals will exploit any opportunity, even the death of a loved one. Families are urged to remain cautious and report any suspicious activity to their local authorities. Taking a moment to verify a claim could be the difference between protecting one’s financial security and falling victim to a cruel and calculated deception.

     
  • Geebo 8:00 am on June 10, 2025 Permalink | Reply
    Tags: , , impersonation scam,   

    Scam Exploits Grant Program Promises 

    By Greg Collier

    A scam reported in Greenville, South Carolina, is drawing attention for its use of fake Community Development Block Grant offers to steal money from unsuspecting victims. The scam appears to rely on impersonation through social media and persuasive tactics that exploit the trust people place in government programs and familiar online contacts.

    The fraud begins when a scammer contacts a potential victim on a platform like Instagram while pretending to be an old friend or acquaintance. The impersonator shares what appears to be good news about a government grant program offering large amounts of money to individuals over the age of 50. They claim the funds do not need to be repaid and suggest reaching out to a so-called grant agent. Once contact is made, the victim is told they qualify for an unusually high payout but must first pay a fee for validation or delivery, typically using Apple gift cards.

    After initial compliance, the scammers escalate the deception by introducing further obstacles, such as fake delivery arrangements and fabricated tax debts. Each new demand involves more money and continues until the victim becomes suspicious or runs out of resources. In this case, the scam led to a financial loss of $1,200 before the victim realized the truth and reported it to law enforcement.

    Officials from the South Carolina Department of Commerce, which oversees legitimate Community Development Block Grant funding in the state, have made clear that no individual is required to pay money upfront to receive such assistance. Legitimate grant programs do not involve personal agents, third-party couriers, or gift card transactions.

    Though this scam was reported in South Carolina, the tactics used are not limited by geography. Similar schemes have surfaced in other states, often adapting to target local programs and demographics. Social media continues to be a key tool for these scams, as impersonation of friends and family members makes it easier to build trust quickly.

    To avoid falling for such scams, it is important to verify any claims of government assistance directly through official websites or agencies. If contacted by someone promising large sums of money in exchange for fees or gift cards, stop and investigate before responding. Confirm identities independently and never rely solely on social media messages for verification. Reporting suspicious activity to local authorities and consumer protection agencies can help prevent others from falling victim to the same scheme.

    As these scams evolve and become more sophisticated, public awareness and skepticism remain the strongest defenses against financial exploitation.

     
  • Geebo 8:00 am on May 29, 2025 Permalink | Reply
    Tags: , impersonation scam, , ,   

    Fake DMV Texts Are the New Nationwide Scam 

    By Greg Collier

    A new phishing scam is spreading across the country, targeting drivers with fraudulent text messages that appear to come from official motor vehicle departments. These messages claim the recipient has unpaid traffic fines and threaten license suspension or other penalties unless immediate action is taken. In reality, these texts are not from any legitimate agency and are designed to steal personal and financial information.

    In Georgia, the messages reference a nonexistent Department of Motor Vehicles and warn about suspended driving privileges unless payment is made. Officials in that state have clarified that there is no state DMV and that real agencies, like the Department of Driver Services, do not use text messages for these purposes.

    In Illinois, the scam texts include specific legal codes, threatening prosecution and credit score damage. The messages cite fake administrative laws and demand payment through a fraudulent link. State officials have warned that such texts are not a legitimate form of communication for any action involving traffic violations or license status.

    Louisiana drivers have received similar texts claiming they owe fines. The state’s Office of Motor Vehicles confirmed these messages are not legitimate and has issued warnings advising residents not to click on any links. Officials say these scams are part of a broader phishing campaign that could also lead to malware infections or identity theft.

    This wave of fake DMV text messages appears to be the latest version of the toll scam texts that circulated widely earlier this year. In those cases, scammers pretended to represent toll agencies and used a similar strategy of creating urgency to push recipients into making fake payments. The transition to impersonating motor vehicle departments suggests that scammers are adapting their tactics to stay ahead of public awareness.

    These scams exploit common anxieties about driving privileges, legal consequences, and unpaid fines. By mimicking the language and tone of government agencies, the messages aim to pressure individuals into quick action before they have time to verify the source. In each case, the fraudulent messages include links to sites that harvest sensitive data or install harmful software.

    As this scam continues to appear in multiple states, it highlights the importance of being cautious with any unsolicited message, especially those requesting immediate payment or personal information. Motor vehicle agencies generally communicate through secure channels and do not use text messages to issue threats or collect fines. Drivers are encouraged to verify any suspicious message by contacting their local agency directly.

     
  • Geebo 8:00 am on May 28, 2025 Permalink | Reply
    Tags: impersonation scam, , , ,   

    Scammers Are Sliding Into LinkedIn 

    LinkedIn is often considered one of the safer corners of social media, a place where professionals share career milestones, expand their networks, and connect with future colleagues. But even platforms aimed at career growth are not immune to deception. As one recent incident illustrates, scammers are watching just as closely as potential employers.

    A newly hired employee at a North Carolina television station had shared a standard career update on LinkedIn to mark the beginning of a new role. It was a common post, the kind many professionals make to celebrate career changes. But shortly after connecting with colleagues, the employee received a suspicious text message. The sender claimed to be a manager at the new job, asking if she was available. The message came from an unfamiliar number. Rather than responding right away, she verified the sender through official work channels. That quick check confirmed her instincts that the message was a scam.

    This incident is part of a broader trend of social engineering schemes that target people through LinkedIn and similar platforms. Security experts have long warned that scammers often impersonate employers, recruiters, or co-workers. While some of these messages are after money or personal information, others aim to pull unsuspecting users into criminal activity without their knowledge. Fake job offers, especially ones promising remote work for easy pay, can sometimes serve as fronts for money laundering operations. Scammers may ask victims to transfer funds, purchase gift cards, or engage in other seemingly legitimate tasks, all designed to disguise the origin of illicit gains.

    The growing capabilities of artificial intelligence and deepfake technology are only making these scams harder to detect. Fraudsters can now use fabricated audio and video content to mimic real people and sound convincingly professional. As technology advances, even savvy internet users may struggle to identify what is real and what has been manipulated.

    It’s important to remember that even platforms built for professional engagement are not immune from manipulation. LinkedIn’s focus on career development can create a false sense of security, but scammers thrive in these environments because they know people often let their guard down. Users should be cautious about what they share publicly and consider reviewing their privacy settings. Reducing the visibility of personal details can be one way to limit exposure.

    There are also tools available to help manage your digital footprint. Some online services allow users to request the removal of personally identifiable information from search results. Taking advantage of these features may reduce the risk of being targeted.

    If anything seems off, whether it’s a job offer that feels too good to be true or a message from someone you don’t recognize, verify through a trusted channel before engaging. In today’s digital landscape, vigilance remains one of the most reliable defenses.

     
  • Geebo 8:00 am on May 16, 2025 Permalink | Reply
    Tags: , impersonation scam, ,   

    Fake Process Servers Exploit Legal Fears 

    Fake Process Servers Exploit Legal Fears

    By Greg Collier

    A process server has a simple but important job. Their role is to deliver legal documents, such as court summonses or subpoenas, to individuals involved in a legal proceeding. This delivery must follow legal procedures to ensure the recipient is properly notified. Real process servers do not make threats, demand personal information, or call ahead with demands.

    The Better Business Bureau has issued a warning about a growing scam involving fake process servers. Scammers are contacting people by phone and falsely claiming to be process servers attempting to deliver legal papers. In many cases, the callers allege there is a lien against the victim’s home or that legal action is being taken for unpaid medical bills. The intent is to create panic, pushing the person to give up sensitive information.

    In some instances, these callers go beyond the initial target. They may contact relatives or friends, claiming those individuals could face consequences if they do not help reach the original target. These tactics are designed to amplify fear and force quick action. However, no actual legal documents are involved. The goal is identity theft or financial fraud.

    There are ways to identify a real process server from a scammer. A legitimate process server does not ask for Social Security numbers or banking information. They typically do not call ahead with warnings, nor do they try to verify private details over the phone. Most importantly, they serve papers in person and do not threaten arrest for noncompliance. Anyone concerned about potential lawsuits or liens can search court records directly through official court websites.

    Recognizing these signs can help prevent falling victim to this scam. As with many forms of fraud, the key is to stay calm, verify independently, and never give away personal information under pressure.

     
  • Geebo 8:00 am on May 8, 2025 Permalink | Reply
    Tags: , , impersonation scam, , ,   

    Google Spoof Scam Exposes Flaws 

    By Greg Collier

    Phishing has evolved far beyond clumsy scams riddled with typos and generic threats. It now wears the mask of legitimacy, often cloaked in branding and technical language convincing enough to fool even savvy users. A recent example of this growing trend involves an especially deceptive attack using Google’s own infrastructure as a weapon.

    Cybercriminals have been exploiting Google Sites and other services to distribute phishing emails that appear to originate from Google’s own domain. In this case, a message disguised as a legal request from law enforcement was sent to users, complete with references to subpoenas and the need to review case materials. The message urged the recipient to click on a link to a Google support page, which in reality led to a page designed to harvest login credentials.

    The trap is insidious. The phishing page is hosted on a subdomain of Google.com, lending a false sense of trust to unsuspecting users. Because the site is built with Google Sites, it carries the appearance of a legitimate Google interface. The attackers further muddy the waters by ensuring the phishing email lands in the same thread as previous legitimate security alerts, increasing the likelihood that users will trust it.

    The deeper issue lies in how Google has allowed this vulnerability to persist. The legacy version of Google Sites, still accessible today, permits anyone to publish content on a Google.com subdomain. This opens the door to abuses like malicious scripts and fake credential portals. Google has been warned about this gap in security, yet the core issues remain unresolved. While some reactive measures have been taken, the architecture still leaves room for repeat abuse.

    This raises a broader concern about corporate responsibility in digital security. Google has positioned itself as a cornerstone of online identity and infrastructure, and with that status comes the obligation to protect its users proactively. Allowing these phishing schemes to exploit the trust associated with the Google name creates not just a security risk, but an erosion of that trust.

    Google’s statement suggests users enable two-factor authentication and passkeys as a defense. While this is sound advice, it shifts the burden onto individuals to compensate for shortcomings in the platform’s safeguards. The more sustainable solution would be for Google to close the loopholes that allow bad actors to operate under its umbrella in the first place.

    As phishing continues to mimic trusted entities more convincingly, users must remain cautious. But the companies whose tools are being weaponized also bear responsibility. Until tech giants like Google take these exploits seriously and move swiftly to harden their platforms, the digital wolves will keep getting in, dressed in ever more convincing sheep’s clothing.

     
  • Geebo 8:00 am on April 17, 2025 Permalink | Reply
    Tags: , impersonation scam, ,   

    Tariff Confusion Opens the Door to Scams 

    By Greg Collier

    A new scam is capitalizing on growing confusion around tariffs, and it was only a matter of time. With talk of new trade measures circulating again under The White House’s proposed economic policies, fraudsters have found a fresh angle. The latest scheme pretends to be official communication from federal agencies and demands that consumers pay money for tariffs. These messages often arrive by email or text, look convincingly official, and direct people to fraudulent websites designed to look like government portals.

    The problem is compounded by the fact that many people are not entirely sure what tariffs are, or how they actually work. Tariffs are taxes placed on imported goods. They are paid by the companies importing the products, not by the consumer directly. However, if the added cost cuts into a company’s profit margin, the company might pass that cost along by raising the price of the product. In that case, the consumer feels the effect of the tariff through higher prices at the store, not through a separate payment to the government.

    That key distinction is precisely what scammers are exploiting. By claiming consumers must pay tariffs directly, they use the complexity of the issue to create a false sense of urgency and confusion. The messages often include links to websites that mimic real government domains, sometimes even using visual tricks to make the addresses appear legitimate at a glance. But real U.S. government websites always end in “.gov” and they do not initiate unsolicited payment requests.

    Increased media coverage of possible tariff hikes creates fertile ground for misinformation. These scams thrive when the public is unclear about how policies work or whether something like a direct tariff bill might be plausible. That fog of uncertainty is undoubtedly where cybercriminals like to operate.

    Anyone receiving unexpected requests for money linked to tariffs should treat them with skepticism. Government agencies do not communicate in that way, and no tariff policy, proposed or enacted, requires private citizens to pay directly in response to a text or email. The only real impact consumers might feel comes later, when goods become more expensive due to changes in trade policy. However, that happens at the register, not through surprise digital invoices.

    As tariff discussions continue, these kinds of scams are likely to persist. Understanding how tariffs work is the first step in avoiding exploitation. And for now, the only tariff threat the average person needs to worry about is the fake one sitting in their inbox.

     
  • Geebo 8:00 am on April 9, 2025 Permalink | Reply
    Tags: impersonation scam, , , , TurboTax   

    SIM Swap Fraud During Tax Season 

    By Greg Collier

    With millions of Americans filing their taxes between January and mid-April, this period becomes fertile ground for digital deception. One particularly insidious tactic gaining traction is SIM swap fraud, a type of identity theft that can occur without a scammer ever touching your phone.

    A recent case in Wisconsin highlights how easily a seemingly routine moment can spiral into a security breach. A consumer had just begun the tax filing process in early February when she received a message claiming to be from a TurboTax. The message included a security code and instructions not to share it with anyone. Although she had not completed her filing with TurboTax, the timing and branding appeared legitimate, prompting her to interact with the message.

    What followed was a total loss of cellular function. Phone calls, text messages, and all forms of communication stopped working. After reaching out to her wireless provider, she learned that her phone number had been transferred to another device entirely. This is the essence of SIM swap fraud, a scam that allows criminals to reroute your phone number to their device without needing physical access to yours.

    This tactic enables scammers to intercept text messages, including those containing security codes used for two-factor authentication. Once they’re in control of your number, they can attempt to access your financial accounts, email, or even social media, often using brute force or previously stolen credentials.

    In this particular case, the victim’s credit union was contacted by someone impersonating her, attempting to guess account passwords. Fortunately, the breach was detected in time and no funds were lost. However, the emotional toll was significant. The sense of violation left the victim unable to feel secure, questioning whether every online interaction was truly safe.

    While this incident happened soon after she began filing taxes through TurboTax, it is important to note that the platform itself was not compromised. The timing was purely coincidental. Scammers often cast a wide net, sending messages disguised as major companies to thousands of random numbers, hoping that even a few people will take the bait.

    Preventing this type of fraud requires preparation. Consumers should ensure that all software on their devices is up-to-date and avoid reusing passwords across accounts. Writing down passwords and storing them in a secure location is preferable to saving them on digital devices, which can be more easily compromised. Contact information for banks or financial institutions should be sourced independently, rather than trusted from unsolicited messages.

    One of the most effective steps consumers can take to prevent SIM swap fraud is to contact their mobile phone provider and request that a personal identification number be added to their account. This PIN acts as an additional layer of security, making it significantly harder for scammers to transfer your phone number without your permission.

    Without the correct PIN, even a scammer who has obtained some of your personal information will be blocked from making changes to your account. Setting up this PIN typically takes just a few minutes but can offer long-term protection against one of the most dangerous forms of digital identity theft.

    When in doubt, it is always safer to pause before acting. Messages that demand immediate action or contain subtle grammatical errors are red flags. Even if a message appears to come from a trusted source, verifying it through official channels can prevent irreversible damage.

    Scammers are persistent and adaptive, but so are the tools and strategies available to stay ahead of them. Awareness, skepticism, and a methodical approach to digital security remain the strongest defense against schemes like SIM swap fraud, especially during high-risk seasons like tax time.

     
  • Geebo 8:00 am on March 25, 2025 Permalink | Reply
    Tags: , impersonation scam, ,   

    Scammers Are Still Cloning You 

    Scammers Are Still Cloning You

    By Greg Collier

    A new type of scam is becoming more common, and more convincing, thanks to rapidly evolving artificial intelligence. The Better Business Bureau has issued a warning about voice-cloning scams that are impacting individuals and families across the country.

    These scams rely on technology that can mimic someone’s voice with alarming accuracy. With just a few seconds of audio, sometimes lifted from voicemail greetings, casual conversations, or even online videos, scammers can generate a voice that sounds nearly identical to that of a loved one. This makes it incredibly difficult to distinguish between a real call and a fake one, especially when the voice on the other end is claiming to be in trouble, asking for money, or offering a too-good-to-be-true opportunity.

    In one case recently reported, an individual spent nearly a week performing tasks for what appeared to be a remote job, unaware that the employer’s true intent was to capture voice recordings. The concern is that these recordings may later be used in scams that impersonate the individual or manipulate others into sharing sensitive information.

    Scammers are becoming more strategic. They’re using AI not just to imitate voices, but also to weave those voices into emotional scenarios that cause panic or urgency, situations where someone might act quickly without verifying the call. This emotional manipulation is what makes these scams so dangerous. A familiar voice saying it’s an emergency can override our instincts and judgment in a matter of seconds.

    To protect yourself, take steps that make it harder for these scams to succeed. If you receive a call that seems suspicious, even if the voice sounds familiar, don’t respond right away. Take a moment to pause. Hang up and call the person directly using a known number. This simple step can often expose the scam for what it is.

    Securing your digital presence is also key. Enable multifactor authentication on your accounts whenever possible. It adds an extra layer of protection that can prevent scammers from accessing your information, even if they manage to imitate your voice or steal your password. At work, businesses should invest in cybersecurity training for employees. Building a culture of awareness and caution can prevent data breaches and manipulation.

    AI voice scams are still a developing threat, and organizations like the BBB are working to find solutions and increase public awareness. Until then, staying skeptical, careful, and informed is the best defense. In this new era where hearing a familiar voice doesn’t guarantee safety, taking a second to verify can make all the difference.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel