Tagged: impersonation scam Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:00 am on November 6, 2025 Permalink | Reply
    Tags: disaster, impersonation scam, plane crash, , UPS   

    Scammers Exploit UPS Crash Victims 

    By Greg Collier

    Every time tragedy makes headlines, scammers swoop in like vultures. They exploit heartbreak, confusion, and fear—turning moments of grief into opportunities for greed. The deadly UPS plane crash in Louisville is no exception.

    What’s Going On:

    Just days after the crash, Louisville Metro Police warned that fraudsters are contacting victims’ families, pretending to have information about their loved ones. Then they demand thousands of dollars in exchange for those supposed details.

    It’s an unconscionable tactic, but not a new one. From natural disasters to violent crimes, scammers know that shock and sorrow make people vulnerable.

    How the Scam Works:

    The con is simple and cruel. Someone calls, emails, or messages a family member claiming to be from the police, airline, or another “official” source. They say they can provide critical information—but only after payment.

    They may pressure victims to act fast, threaten to withhold information, or claim, “This is your only chance.” They’ll often request payment through untraceable means like gift cards, wire transfers, or cryptocurrency.

    But here’s the truth: law enforcement and government officials will never ask for money for information. Ever.

    Why It’s Effective:

    Scammers understand human emotion. In times of tragedy, people want answers, not logic. These criminals prey on grief, spinning believable stories and false hope to extract money. It’s psychological manipulation at its worst—calculated, cold, and heartless.

    Red Flags:

    • Calls or texts from unfamiliar numbers claiming insider information.
    • Demands for immediate payment or “processing fees.”
    • Urgent or emotional language meant to force quick decisions.
    • Vague credentials or refusal to provide verifiable identification.

    If You’ve Been Targeted:

    If you receive one of these messages, do not respond, do not pay, and do not panic.
    Instead:

    1. Report the message to the Louisville Metro Police Department.
    2. File a complaint with the FTC at reportfraud.ftc.gov.
    3. Alert your bank if you’ve already made a payment.

    Even one report could help prevent someone else from becoming a victim.

    Final Thoughts:

    This scam is proof that no tragedy is too sacred for con artists. They’ll exploit anything—from plane crashes to pandemics—to make a profit. Staying skeptical, verifying sources, and pausing before you pay can keep heartbreak from becoming financial ruin.

    Further Reading:

     
  • Geebo 9:00 am on November 4, 2025 Permalink | Reply
    Tags: , , impersonation scam, ,   

    Scammers Exploit SNAP Delays Amid Shutdown Confusion 

    Scammers Exploit SNAP Delays Amid Shutdown Confusion

    By Greg Collier

    A new scam warning out of Abilene, Texas, could soon spread nationwide. With the ongoing federal government shutdown disrupting SNAP benefits, scammers are using the moment to strike vulnerable families from coast to coast. What started as a local warning has the potential to become a nationwide scam targeting anyone who depends on SNAP to feed their family.

    What’s Going On:

    As the shutdown continues, millions of households relying on SNAP benefits are facing uncertainty about when their assistance will arrive. Scammers are jumping at the opportunity, posing as SNAP representatives to “verify” personal information—but their real goal is identity theft.

    The Better Business Bureau in Abilene says families are getting phone calls, emails, or texts from imposters pretending to be from the government. They claim they need details like your Social Security number or driver’s license to “restore” benefits. Once they get that data, they can open credit accounts, drain funds, or steal your identity entirely.

    Why It’s Effective:

    When food benefits are on the line, fear makes people act fast. Scammers know this. They tailor their calls and emails to sound official, even citing real headlines about SNAP delays caused by the shutdown. BBB President John Riggins says these “government imposters” rely on trust and confusion—making victims believe they’re helping fix a problem when, really, they’re creating one.

    Red Flags:

    • Unsolicited calls, texts, or emails claiming to be from SNAP or any government office.
    • Requests for personal data such as SSNs, bank info, or driver’s license numbers.
    • Threats or urgency, saying your benefits will be cut off if you don’t comply.
    • Refusal to provide proof by mail or official documentation.

    No government agency will ever call or text to request your personal information.

    How to Protect Yourself:

    • Never share personal data unless you initiated the contact.
    • Ask for proof by mail and verify it directly with your local SNAP office.
    • Hang up immediately if the caller becomes aggressive or demands sensitive information.
    • Block unknown numbers through your carrier or phone settings.
    • Report scams to the BBB’s Scam Tracker so others can be warned.

    Each report helps build a bigger picture—allowing investigators to connect dots across state lines and stop similar scams before they spread.

    If You’ve Been Targeted:

    • If you think you’ve already shared information with a scammer, act fast:
    • Contact your bank or credit union immediately. Explain that you may have been a victim of a scam and ask them to monitor or freeze your accounts if needed.
    • Report identity theft at IdentityTheft.gov
      to get a recovery plan and official documentation.
    • Change passwords and PINs on any accounts you believe may be compromised.
    • Alert your state SNAP office so they can note your account and prevent fraudulent activity.
    • Keep records of any calls, texts, or emails from the scammer—they could help investigators track the operation.

    Even if you didn’t lose money, reporting the attempt helps others stay safe. Scammers often hit multiple people in the same area, so your report could be the missing puzzle piece.

    Final Thoughts:

    Scammers are exploiting fear and confusion at a time when millions are simply trying to put food on the table. Whether you live in Texas or anywhere else in the country, stay alert and don’t share your information. If someone claims to be from SNAP, hang up, verify, and report it.

    Further Reading:

     
  • Geebo 8:00 am on October 29, 2025 Permalink | Reply
    Tags: , , , impersonation scam, ,   

    Double-Billed and Deceived: A Travel Scam 

    By Greg Collier

    A Tennessee man thought he was booking a dream trip to Prague through Expedia. Instead, he was talking to a scammer pretending to be from the travel site and ended up paying $722 twice for the same flight.

    What’s Going On:

    David, who asked that his last name not be used, booked his trip online and even signed up for a new “One Key” credit card offer to get a travel bonus. Everything looked legitimate until he received an email claiming his payment was denied. The sender? Supposedly Expedia.

    When he called the number in the email, a woman claiming to be an Expedia representative told him he needed to repay the $722 to secure his flight. To avoid losing his vacation, he complied. What she didn’t say: he was paying PCM Travels, a company later flagged for deceptive practices and scam alerts.

    Why It’s Effective:

    This scam works because it piggybacks on real bookings. Victims like David have already made a legitimate purchase, so follow-up emails referencing the same dollar amounts appear trustworthy. The scammers add pressure by implying your booking is at risk unless you act immediately, a classic manipulation tactic.

    By the time the second payment is made, the money is gone. To make matters worse, scammers often insert legal-sounding language like “non-refundable” and “non-disputable” to discourage victims from contacting their credit card companies.

    Red Flags:

    • Emails claiming payment failure right after a successful booking
    • Customer service numbers in emails instead of on the company’s official website
    • Requests for payment by phone or through a new company name (like PCM Travels)
    • Statements that charges are “non-refundable” or “can’t be disputed”

    How to Protect Yourself:

    • Always verify contact info. Don’t use numbers or links from emails; instead, go directly to the airline or booking site’s official page.
    • Check your billing statements closely after booking. If you see double charges or unfamiliar company names, dispute them immediately.
    • Avoid offers that sound too generous. Legitimate travel rewards don’t require on-the-spot payments or new credit cards to redeem.
    • Freeze your card the moment you suspect a scam.

    The Aftermath:

    David is still fighting to get his $722 back. Despite showing his credit card company the proof, the scammers had documentation showing he “agreed” to the charge, technically true, but under false pretenses. He’s now submitting a letter of intent in hopes the dispute can be reopened.

    Final Thoughts:

    Travel scams like this are growing more sophisticated, exploiting real company names, official-looking emails, and victims’ excitement about upcoming trips. Always book directly through official airline or hotel websites, and never let urgency override your instincts.

    Have you been targeted by a fake travel agent or booking site? Share your experience below or send this post to someone planning their next vacation. Awareness is the best passport against scams.

    Further Reading:

     
  • Geebo 8:00 am on October 22, 2025 Permalink | Reply
    Tags: , , impersonation scam, political donations, , , ,   

    Deepfake Donors: When Political Voices Are Fake 

    Deepfake Donors: When Political Voices Are Fake

    By Greg Collier

    You get a text from your “preferred political candidate.” It asks for a small donation of ten dollars “to fight misinformation” or “protect election integrity.” The link looks official. The voice message attached even sounds authentically passionate, familiar, and persuasive.

    But it isn’t real. And neither is the person behind it.

    This fall, investigators from the U.S. Treasury and U.K. authorities announced their largest-ever takedown of cybercriminal networks responsible for billions in losses tied to fraudulent campaigns, fake fundraising, and AI-generated political deepfakes. This operation struck transnational organized criminal groups based especially in Southeast Asia, including the notorious Prince Group TCO, a dominant cybercrime player in Cambodia’s scam economy responsible for billions in illicit financial transactions. U.S. losses alone to online investment scams topped $16.6 billion, with over $10 billion lost to scam operations based in Southeast Asia just last year.​

    These scams are blurring the line between digital activism and manipulation right when citizens are most vulnerable: election season.

    What’s Going On:

    Scammers are exploiting voters’ trust in political communication, blending voice cloning, AI video, and fraudulent donation sites to extract money and personal data.​

    Here’s how it works:

    • A deepfake video or voicemail mimics a real candidate, complete with campaign slogans and “urgent” donation requests.
    • The links lead to fraudulent websites where victims enter credit card details.
    • Some schemes even collect personal voter data later sold or used for identity theft.

    In 2024’s New Hampshire primaries, voice-cloned robocalls impersonating national figures were caught attempting to sway voters, a precursor to the tactics now being scaled globally in 2025.​

    Why It’s Effective:

    These scams thrive because people trust familiarity, especially voices, faces, and causes they care about. The timing, emotional tone, and recognizable slogans create a powerful illusion of legitimacy.

    Modern AI makes it nearly impossible for the average person to distinguish a deepfake from reality, especially when wrapped in high-stakes messaging about public service, patriotism, or “protecting democracy.” Add in social pressure, and even cautious donors lower their guard.

    Red Flags:

    Before contributing or sharing campaign links, pause and check for these telltale signs:

    • Donation requests that come through texts, WhatsApp, or unknown numbers.
    • Voices or videos that sound slightly “off,” mismatched mouth movements, odd pauses, or inconsistent lighting.
    • Links that end in unusual extensions (like “.co” or “.support”) rather than official candidate domains.
    • Payment requests through Venmo, CashApp, Zelle, or crypto.
    • No clear disclosure or FEC registration details at the bottom of the website.

    Quick tip: Official campaigns in the U.S. are required to display Federal Election Commission (FEC) registration and disclaimers. If that’s missing, it’s a huge red flag.

    What You Can Do:

    • Verify before donating. Go directly to the official campaign site; don’t use links from texts or emails.
    • Treat urgency as a warning. Real campaigns rarely need “immediate wire transfers.”
    • Listen for tells. Deepfakes often have slightly distorted sounds or mechanical echoes.
    • Cross-check messages. If you get a surprising call or voicemail, compare it with the candidate’s latest verified posts.
    • Report and share. Submit suspicious calls or videos to reportfraud.ftc.gov or your state election board.

    Platforms including Google, Meta, and YouTube are now launching active detection systems and educational tools to flag deepfake political content before it spreads.​

    If You’ve Been Targeted:

    • Report donations made to fake campaigns immediately to your bank or credit card provider.
    • File a complaint through the FTC and local election authorities.
    • Freeze credit if personal or voter identity data were shared.
    • Publicize responsibly. Sharing examples with the right context can warn others, but avoid amplifying active scams.

    Final Thoughts:

    Deepfakes are no longer a distant concern; they’re reshaping political communication in real time. What makes this wave dangerous isn’t just money loss; it’s trust erosion.

    The recent takedown of the Prince Group’s transnational criminal networks by U.S. and U.K. authorities, which included sanctions on key individuals and cutting off millions in illicit financial flows, underscores the global scale of this problem. Their coordinated actions disrupted the infrastructure enabling these massive fraud campaigns, providing a much-needed deterrent to criminals using AI-based scams during critical democratic processes.​

    Staying safe now means applying the same critical awareness you’d use for phishing to the content you see and hear. Don’t assume your eyes or ears tell the full story.

    Think you spotted a fake campaign video or suspicious fundraising call? Don’t scroll past it; report it, discuss it, and share this guide. The more people who know what to look for, the fewer fall for it.

    Further Reading:

     
  • Geebo 8:00 am on October 20, 2025 Permalink | Reply
    Tags: , , , impersonation scam, ,   

    AI Is Calling, But It’s Not Who You Think 

    By Greg Collier

    A phone rings with an unfamiliar number while an AI waveform hovers behind, symbolizing how technology cloaks modern impersonation scams.

    Picture this: you get a call, and it’s your boss’s voice asking for a quick favor, a wire transfer to a vendor, or a prepaid card code “for the conference.” It sounds exactly like their tone, pace, and even background noise. But that voice? It’s not real.

    AI-generated voice cloning is fueling a wave of impersonation scams. And as voice, image, and chat synthesis tools become more advanced, the line between real and fake is disappearing.

    What’s Going On?:

    Fraudsters are now combining data from social media with voice samples from YouTube, voicemail greetings, or even podcasts. Using consumer-grade AI tools, they replicate voices with uncanny accuracy.

    They then use these synthetic voices to:

    • Impersonate company leaders or HR representatives.
    • Call family members with “emergencies.”
    • Trick users into authorizing transactions or revealing codes.

    It’s a high-tech twist on old-fashioned deception. Google, PayPal, and cybersecurity experts are warning that deepfake-driven scams will only increase through 2026.​

    Why It’s Effective:

    This scam works because it blends psychological urgency with technological familiarity. When “someone you trust” calls asking for help, most people act before thinking.

    Add to that how AI-generated voices now mimic emotional tone, stress, confidence, and familiarity, and even seasoned professionals fall for it.

    Red Flags:

    • Here’s what to look (and listen) for:
    • A call or voicemail that sounds slightly robotic or “too perfect.”
    • Sudden, urgent money or password requests from known contacts.
    • Unusual grammar or tone in follow-up messages.
    • Inconsistencies between the voice message and typical company protocols.

    Pause before panic. If a voice message feels “off,” verify independently with the real person using a saved contact number, not the one in the message.

    What You Can Do:

    • Verify before you act. Hang up and call back using an official phone number.
    • Establish a “family or team password.” A simple phrase everyone knows can verify real emergencies.
    • Don’t rely on caller ID. Scammers can spoof names and organizations.
    • Educate your circle. The best defense is awareness—share updates about new scam tactics.
    • Secure your data. Limit the amount of voice or video content you share publicly.

    Organizations like Google and the FTC now recommend using passkeys, two-factor verification, and scam-spotting games to build intuition against fake communications.​

    If You’ve Been Targeted:

    • Cut off contact immediately. Do not reply, click, or engage further.
    • Report the incident to your bank, employer, or relevant platform.
    • File a complaint with the FTC or FBI Internet Crime Complaint Center (IC3).
    • Change your passwords and enable multifactor authentication on critical accounts.
    • Freeze your credit through major reporting agencies if personal data was compromised.

    AI is transforming how scammers operate, but awareness and calm action can short-circuit their success. Most scams thrive on confusion and pressure. If you slow down, verify, and stay informed, you take away their greatest weapon.

    Seen or heard something suspicious? Share this post with someone who might be vulnerable or join the conversation: how would you verify a voice you thought you knew?

    Further Reading:

     
  • Geebo 8:00 am on October 10, 2025 Permalink | Reply
    Tags: impersonation scam, , , , Supreme Court   

    Supreme Court Social Security Scam Hits Retirees 

    Supreme Court Social Security Scam Hits Retirees

    By Greg Collier

    The Office of the Inspector General for the Social Security Administration has issued an alert regarding a new scheme that attempts to deceive retirees and other beneficiaries through counterfeit correspondence designed to resemble official government communication.

    The scheme centers around letters styled to appear as “certificates” issued on fraudulent Supreme Court letterhead. These letters include forged signatures from high-ranking judicial figures and are tailored to look personally addressed to the recipient. The message typically claims the recipient is under investigation for alleged criminal activity. It asserts that agencies such as the Social Security Administration and a misnamed federal law enforcement division have determined that the recipient’s personal information has been compromised in an identity theft case. The letter further claims that financial institutions have been instructed to freeze all accounts unless the recipient cooperates.

    Many fraudulent schemes rely on what cybersecurity experts refer to as authority exploitation, in which scammers impersonate organizations that appear too powerful or formal to question. References to the judiciary or federal departments can create a sense of urgency and intimidation, discouraging recipients from verifying the legitimacy of the correspondence. Seniors, in particular, may feel pressure to comply when the communication appears to come from a Supreme Court office rather than a local agency.

    To heighten urgency, the document warns against maintaining more than a set amount in bank accounts or investments and urges immediate contact with the sender to avoid supposed legal consequences. Recipients are pressured to provide personal details or transfer funds under the belief that doing so will resolve the fictitious allegations. Some versions also instruct recipients not to disclose the communication to others, increasing the likelihood of compliance.

    It is important to understand how legitimate agencies communicate. The Social Security Administration and the judicial system do not initiate legal accusations through informal letters or emails demanding immediate action. Formal legal notices are delivered through established court procedures and never require beneficiaries to verify their identity by phone or to transfer funds to prove compliance. Recognizing these communication standards can help distinguish real government contact from fabricated threats.

    This fraud relies heavily on fear and manufactured authority. Many retirees depend on monthly Social Security benefits, and disruptions to these payments can be alarming. Scammers exploit this vulnerability by imitating official institutions and using legal terminology to create panic. Responding to such messages can lead to identity theft or substantial financial loss.

    The Social Security Administration advises disregarding unsolicited letters, texts, emails, or calls that demand immediate action or payment. Official agencies do not threaten beneficiaries with arrest, asset seizures, or legal charges through informal correspondence. They also do not request personal or financial information through unsecured channels.

    Anyone who encounters a message of this kind is encouraged to report it through the agency’s official portal at ssa.gov/scam. Confirming the legitimacy of any communication through verified government sources is essential. Discussing suspicious messages with trusted individuals can provide an additional safeguard against deception.

    Public awareness remains one of the most effective defenses against fraud. By recognizing the signs of fabricated government communication and refusing to engage, beneficiaries can protect both their financial security and peace of mind.

     
  • Geebo 8:00 am on October 6, 2025 Permalink | Reply
    Tags: , , impersonation scam, , , ,   

    Shutdown Fuels Federal Impostors 

    Shutdown Fuels Federal Impostors

    By Greg Collier

    With the federal government shutdown creating uncertainty across the country, consumers are being urged to stay alert for scams that exploit the disruption. Officials in North Carolina recently issued a warning after seeing signs that criminals are using the shutdown to impersonate federal agencies and obtain personal or financial information. The concern is not limited to one state, since the agencies being mimicked operate nationwide and shutdown-related confusion affects people in every region.

    Past shutdowns have shown that scammers quickly adjust their tactics to match the moment. During previous funding lapses, people reported fraudulent claims about suspended Social Security checks, frozen food assistance, or threats that Medicare coverage would end unless immediate action was taken. In some instances, callers falsely offered help to federal workers or contractors struggling with missed paychecks, using the shutdown as cover to push loans or collect personal data.

    These schemes commonly arrive by phone, text message, or email and rely on pressure and urgency rather than credibility. Scammers often use caller ID spoofing or fake email domains to make their messages appear to come from federal agencies. That technology can make it difficult for people to immediately recognize that the communication is fraudulent.

    Government officials are emphasizing that legitimate agencies will not make unsolicited requests for sensitive information or demand payment through gift cards, wire transfers, or similar methods. Any unexpected outreach from someone claiming to represent a federal program should be treated with caution. People are encouraged to end the communication and reach out directly to the agency using verified contact information if there is reason to confirm anything.

    In North Carolina, the Consumer Protection Division of the state Department of Justice is continuing to accept fraud complaints during the shutdown. Other states have similar channels for reporting suspicious activity. Remaining cautious, especially when receiving messages that appear urgent or threatening, is one of the most effective ways to prevent financial or identity theft while the shutdown continues to create opportunities for exploitation.

     
  • Geebo 8:00 am on September 30, 2025 Permalink | Reply
    Tags: impersonation scam, , , ,   

    Tax Refund Text Scam Spreads Nationwide 

    Tax Refund Text Scam Spreads Nationwide

    By Greg Collier

    What began as a problem in just two states has since spread more widely, as residents across the country continue to report fraudulent text messages designed to steal financial information. State tax agencies are issuing alerts warning that these scams are evolving in both scale and sophistication, now targeting households in New York, Pennsylvania, Minnesota, Connecticut, Michigan, New Jersey, and beyond.

    The messages often claim to come from state revenue departments and tell recipients that their refund request has been processed and approved. They then urge taxpayers to provide banking details, with some versions threatening permanent forfeiture of a refund if payment information is not submitted. Officials stress that legitimate state agencies do not request sensitive personal or financial information through unsolicited texts, emails, or phone calls.

    These fraudulent messages are structured to mimic the formal language of government communication. Some include references to tax statutes or deadlines, while others attempt to create urgency with warnings about penalties. Scammers rely on this sense of pressure to convince recipients to click links that lead to spoofed websites or to respond directly with private information. In some cases, even a simple reply can help scammers bypass basic security safeguards on some mobile devices.

    Cybersecurity experts point out that these campaigns have shifted from their earlier focus on banks and retailers to government institutions. By impersonating state tax departments, attackers exploit the authority of trusted institutions. The result is a scam that is more difficult for many taxpayers to dismiss outright.

    Tax agencies across multiple regions are advising residents to exercise caution. Suspicious messages should not be clicked or answered. Verification should be sought only through official state channels, such as tax department websites or phone lines. The broader pattern of these scams reflects the adaptability of cybercriminals and the need for continued public awareness, particularly during tax season when individuals are more likely to be anticipating legitimate communication from government offices.

     
  • Geebo 8:00 am on September 19, 2025 Permalink | Reply
    Tags: impersonation scam, , , ,   

    Lottery Winner Texts Are a Scam 

    By Greg Collier

    A new wave of fraudulent text messages has been reported in North Carolina and across the country, with scammers posing as generous lottery winners offering to share their supposed jackpot fortunes. The Federal Trade Commission warns that these messages are not legitimate and advises consumers to exercise caution when receiving such unexpected communications.

    One example circulating now claims that the recipient has been chosen at random to receive one million dollars in cash and a new car. The message explains that the selection was made by an automated system and provides a number to contact a so-called managing director with a special claimant code. When reporters attempted to follow the instructions, the call could not be completed, but the text line produced a swift response. Soon after, the sender requested detailed personal information, including name, address, marital status, occupation, age, income, and even a photograph.

    To test the claim further, reporters tried to initiate a video call, but the call went unanswered. Instead, another message arrived from a foreign number containing a picture of a duffel bag stuffed with cash. The elaborate performance only underscored the deceptive intent.

    According to the Better Business Bureau, the very nature of unsolicited text messages promising money is an immediate red flag. Experts emphasize that responding only confirms to scammers that a real person is at the other end, which encourages them to continue targeting the victim. The goal is almost always to obtain enough personal information to commit identity fraud or to manipulate the target into paying money under false pretenses.

    The Federal Trade Commission stresses the importance of deleting and reporting these texts rather than engaging. Responding can expose recipients to identity theft or malware, especially if links are clicked. Scammers are adept at creating a sense of urgency and legitimacy, but regulators urge people to verify any extraordinary claim through trusted channels rather than through the contact information provided in suspicious messages.

    This type of fraud is not rare. The FTC estimates that Americans lose tens of millions of dollars every year to prize and sweepstakes scams, with older adults among the most frequent targets. The tactics vary, but the pitch is nearly always the same. A promise of sudden wealth, accompanied by requests for personal details or money. A critical fact to keep in mind is that legitimate lottery organizations do not notify winners by text message or through social media, and they do not ask for photographs, income details, or banking information in order to release winnings.

    For anyone who has already replied to one of these messages, experts recommend taking immediate steps to protect personal security. This can include contacting your mobile carrier to block further messages, checking your credit report for unusual activity, and notifying your bank if financial details were shared. It may also be wise to change passwords associated with accounts that could be linked to the information provided. Even if no money was lost, reporting the interaction to the FTC and the BBB helps create a clearer picture of the scam’s reach and may prevent others from becoming victims.

    While these scams are persistent, their effectiveness lies in exploiting the universal hope of financial relief and good fortune. By mimicking the thrill of winning, criminals draw people into sharing information or parting with money. Recognizing the warning signs and taking quick protective measures can turn a potential loss into an important lesson. The safest response remains simple. Treat unexpected lottery offers not as opportunities, but as clear warnings to protect yourself and your information.

     
  • Geebo 8:00 am on September 17, 2025 Permalink | Reply
    Tags: impersonation scam, , , ,   

    States Warn of Tax Refund Text Scams 

    States Warn of Tax Refund Text Scams

    By Greg Collier

    State tax agencies are once again warning residents to be cautious about fraudulent text messages designed to steal personal and financial information. Following reports of fake texts in New Jersey earlier this year, the Michigan Department of Treasury has now issued its own alert after receiving complaints of similar activity.

    In New Jersey, scammers have been sending messages that claim to come from the Department of the Treasury’s Division of Taxation. The texts state that a refund request has been processed and approved but warn that if payment details are not submitted by a specified deadline, the refund will be permanently forfeited under the New Jersey Gross Income Tax Act. The Division of Taxation has confirmed that these messages are not legitimate and has explained that text communication is used only in limited circumstances when requested through its phone system. Officials emphasize that residents should avoid clicking links or replying to such texts, since doing so can lead to spoofed websites that mimic official branding and request sensitive financial details. Replying with a single character such as “Y” can also be an attempt by scammers to bypass cell phone security safeguards.

    The Michigan Department of Treasury has reported nearly identical tactics. Residents have received texts that falsely claim to be from the agency, with messages urging them to update payment information or risk forfeiting their refunds. The Treasury has made clear that it never sends unsolicited text messages to request sensitive information and that official correspondence with taxpayers is conducted through letters sent via the U.S. Postal Service. Officials urge residents to delete suspicious messages and to contact the department directly with any questions about refunds or tax obligations. The state’s Individual Income Tax Information Line can also be used to log these scams and verify tax information.

    Authorities in both states describe these fraudulent texts as another tool in the cybercriminal playbook. They rely on urgency and the appearance of official language to pressure recipients into surrendering personal data. Cybersecurity experts note that links embedded in such messages often lead to convincing but fraudulent websites designed to capture bank account or credit card details.

    These scams also take advantage of the psychology of tax season. Residents may already be anticipating communication about refunds or tax issues, and scammers exploit this expectation by imitating the formal language of government. References to state statutes or threats of forfeiture are designed to create an appearance of authority and urgency, making recipients more likely to respond without questioning the message’s authenticity.

    Smishing campaigns have historically focused on banks, shipping companies, and retailers, but government agencies have increasingly become the target. By impersonating tax departments or other state offices, scammers add a layer of credibility that makes their messages seem harder to dismiss. This evolution reflects a broader trend in cybercrime, where attackers adjust their tactics to exploit the most trusted institutions and the most stressful times of year.

    As tax agencies across different states continue to issue similar warnings, the pattern highlights the adaptability of smishing campaigns and the importance of public awareness. Residents who receive suspicious messages are advised to treat them with caution, verify claims directly with state agencies, and avoid engaging with any request for personal or financial information delivered by text.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel