Tagged: impersonation scam Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on April 17, 2025 Permalink | Reply
    Tags: , impersonation scam, , tariffs   

    Tariff Confusion Opens the Door to Scams 

    By Greg Collier

    A new scam is capitalizing on growing confusion around tariffs, and it was only a matter of time. With talk of new trade measures circulating again under The White House’s proposed economic policies, fraudsters have found a fresh angle. The latest scheme pretends to be official communication from federal agencies and demands that consumers pay money for tariffs. These messages often arrive by email or text, look convincingly official, and direct people to fraudulent websites designed to look like government portals.

    The problem is compounded by the fact that many people are not entirely sure what tariffs are, or how they actually work. Tariffs are taxes placed on imported goods. They are paid by the companies importing the products, not by the consumer directly. However, if the added cost cuts into a company’s profit margin, the company might pass that cost along by raising the price of the product. In that case, the consumer feels the effect of the tariff through higher prices at the store, not through a separate payment to the government.

    That key distinction is precisely what scammers are exploiting. By claiming consumers must pay tariffs directly, they use the complexity of the issue to create a false sense of urgency and confusion. The messages often include links to websites that mimic real government domains, sometimes even using visual tricks to make the addresses appear legitimate at a glance. But real U.S. government websites always end in “.gov” and they do not initiate unsolicited payment requests.

    Increased media coverage of possible tariff hikes creates fertile ground for misinformation. These scams thrive when the public is unclear about how policies work or whether something like a direct tariff bill might be plausible. That fog of uncertainty is undoubtedly where cybercriminals like to operate.

    Anyone receiving unexpected requests for money linked to tariffs should treat them with skepticism. Government agencies do not communicate in that way, and no tariff policy, proposed or enacted, requires private citizens to pay directly in response to a text or email. The only real impact consumers might feel comes later, when goods become more expensive due to changes in trade policy. However, that happens at the register, not through surprise digital invoices.

    As tariff discussions continue, these kinds of scams are likely to persist. Understanding how tariffs work is the first step in avoiding exploitation. And for now, the only tariff threat the average person needs to worry about is the fake one sitting in their inbox.

     
  • Geebo 8:00 am on April 9, 2025 Permalink | Reply
    Tags: impersonation scam, , , , TurboTax   

    SIM Swap Fraud During Tax Season 

    By Greg Collier

    With millions of Americans filing their taxes between January and mid-April, this period becomes fertile ground for digital deception. One particularly insidious tactic gaining traction is SIM swap fraud, a type of identity theft that can occur without a scammer ever touching your phone.

    A recent case in Wisconsin highlights how easily a seemingly routine moment can spiral into a security breach. A consumer had just begun the tax filing process in early February when she received a message claiming to be from a TurboTax. The message included a security code and instructions not to share it with anyone. Although she had not completed her filing with TurboTax, the timing and branding appeared legitimate, prompting her to interact with the message.

    What followed was a total loss of cellular function. Phone calls, text messages, and all forms of communication stopped working. After reaching out to her wireless provider, she learned that her phone number had been transferred to another device entirely. This is the essence of SIM swap fraud, a scam that allows criminals to reroute your phone number to their device without needing physical access to yours.

    This tactic enables scammers to intercept text messages, including those containing security codes used for two-factor authentication. Once they’re in control of your number, they can attempt to access your financial accounts, email, or even social media, often using brute force or previously stolen credentials.

    In this particular case, the victim’s credit union was contacted by someone impersonating her, attempting to guess account passwords. Fortunately, the breach was detected in time and no funds were lost. However, the emotional toll was significant. The sense of violation left the victim unable to feel secure, questioning whether every online interaction was truly safe.

    While this incident happened soon after she began filing taxes through TurboTax, it is important to note that the platform itself was not compromised. The timing was purely coincidental. Scammers often cast a wide net, sending messages disguised as major companies to thousands of random numbers, hoping that even a few people will take the bait.

    Preventing this type of fraud requires preparation. Consumers should ensure that all software on their devices is up-to-date and avoid reusing passwords across accounts. Writing down passwords and storing them in a secure location is preferable to saving them on digital devices, which can be more easily compromised. Contact information for banks or financial institutions should be sourced independently, rather than trusted from unsolicited messages.

    One of the most effective steps consumers can take to prevent SIM swap fraud is to contact their mobile phone provider and request that a personal identification number be added to their account. This PIN acts as an additional layer of security, making it significantly harder for scammers to transfer your phone number without your permission.

    Without the correct PIN, even a scammer who has obtained some of your personal information will be blocked from making changes to your account. Setting up this PIN typically takes just a few minutes but can offer long-term protection against one of the most dangerous forms of digital identity theft.

    When in doubt, it is always safer to pause before acting. Messages that demand immediate action or contain subtle grammatical errors are red flags. Even if a message appears to come from a trusted source, verifying it through official channels can prevent irreversible damage.

    Scammers are persistent and adaptive, but so are the tools and strategies available to stay ahead of them. Awareness, skepticism, and a methodical approach to digital security remain the strongest defense against schemes like SIM swap fraud, especially during high-risk seasons like tax time.

     
  • Geebo 8:00 am on March 25, 2025 Permalink | Reply
    Tags: , impersonation scam, ,   

    Scammers Are Still Cloning You 

    Scammers Are Still Cloning You

    By Greg Collier

    A new type of scam is becoming more common, and more convincing, thanks to rapidly evolving artificial intelligence. The Better Business Bureau has issued a warning about voice-cloning scams that are impacting individuals and families across the country.

    These scams rely on technology that can mimic someone’s voice with alarming accuracy. With just a few seconds of audio, sometimes lifted from voicemail greetings, casual conversations, or even online videos, scammers can generate a voice that sounds nearly identical to that of a loved one. This makes it incredibly difficult to distinguish between a real call and a fake one, especially when the voice on the other end is claiming to be in trouble, asking for money, or offering a too-good-to-be-true opportunity.

    In one case recently reported, an individual spent nearly a week performing tasks for what appeared to be a remote job, unaware that the employer’s true intent was to capture voice recordings. The concern is that these recordings may later be used in scams that impersonate the individual or manipulate others into sharing sensitive information.

    Scammers are becoming more strategic. They’re using AI not just to imitate voices, but also to weave those voices into emotional scenarios that cause panic or urgency, situations where someone might act quickly without verifying the call. This emotional manipulation is what makes these scams so dangerous. A familiar voice saying it’s an emergency can override our instincts and judgment in a matter of seconds.

    To protect yourself, take steps that make it harder for these scams to succeed. If you receive a call that seems suspicious, even if the voice sounds familiar, don’t respond right away. Take a moment to pause. Hang up and call the person directly using a known number. This simple step can often expose the scam for what it is.

    Securing your digital presence is also key. Enable multifactor authentication on your accounts whenever possible. It adds an extra layer of protection that can prevent scammers from accessing your information, even if they manage to imitate your voice or steal your password. At work, businesses should invest in cybersecurity training for employees. Building a culture of awareness and caution can prevent data breaches and manipulation.

    AI voice scams are still a developing threat, and organizations like the BBB are working to find solutions and increase public awareness. Until then, staying skeptical, careful, and informed is the best defense. In this new era where hearing a familiar voice doesn’t guarantee safety, taking a second to verify can make all the difference.

     
  • Geebo 8:00 am on March 24, 2025 Permalink | Reply
    Tags: , impersonation scam, ,   

    Scammed and Drained in a Single Day 

    By Greg Collier

    It started with a simple text. A “fraud alert” popped up on a phone, seemingly from a well-known bank, asking if a purchase had been made. With a quick reply of ‘No’, a chain of events unfolded that would upend a family’s sense of safety and drain their entire savings.

    What followed was a carefully staged performance. A caller claimed to represent her longtime bank and spoke with unsettling familiarity, addressing her by name, reciting her address, even referencing account details. According to him, fraudsters were attempting to wire tens of thousands of dollars out of her accounts. The message was urgent, serious, and disturbingly convincing.

    Under the guise of protection, he urged immediate action. Her money, he insisted, needed to be moved to a ‘safe’ account. One he would establish at another bank. A new debit card was remotely added to her digital wallet, making the ruse feel even more legitimate. When a snowstorm delayed her response, the next morning brought more pressure, heightened threats, added urgency, and fresh instructions.

    She was warned not to trust her own bank, and was told her accounts had been frozen. Access to her online login was supposedly locked. She was instructed to keep the call going while entering the bank and even while standing at the ATM. Every step was scripted, from what to say if questioned, to what must be kept hidden.

    Over the course of the day, she withdrew $44,000 in cash from two bank branches. She followed instructions to the letter, depositing the full amount into a new ATM account that she believed would protect her savings. The reality, however, was far more devastating, her money was gone, funneled into the hands of a stranger who had earned her trust through deception and fear.

    What makes this story even more painful is how deeply targeted it was. The caller didn’t just affect her finances. Two linked accounts belonging to her daughter were also wiped out, including the daughter’s entire savings. The emotional toll hit just as hard as the financial loss.

    After the scam became clear, so did the broader consequences. Shaken, anxious, and overwhelmed, she no longer feels safe doing basic tasks online. She questions everything and everyone. And when a data breach notification arrived just a day later, tied to a massive cyberattack on a major healthcare company, it only deepened the sense that this might not be over. Her information may have been stolen, sold, passed from one criminal hand to the next.

    What makes scams like this so dangerous is how much they’ve evolved. Gone are the days of clumsy, misspelled emails. Today’s scammers use real names, familiar logos, and cloned phone numbers. They build credibility before dismantling it. They construct elaborate narratives, carefully crafted to isolate and confuse. And they prey heavily on older adults, individuals more likely to pick up a call, more likely to trust a voice claiming to be from a bank, and more likely to feel a sense of obligation to act quickly in the face of danger.

    This story, painful as it is, is being shared with a purpose. To warn others. To protect others. To remind people that any unexpected communication involving urgent requests for money, especially from someone claiming to be from a trusted institution, deserves extra scrutiny. Always verify these claims independently. Never give in to pressure, and if something feels off, take a moment to stop and check with a friend, a family member, or directly with your bank using a trusted number.

    The truth is, anyone can be targeted. Scammers are skilled manipulators, and no one should feel ashamed for being caught in a moment of fear or confusion. What matters now is spreading awareness, strengthening protections, and supporting those who come forward, not just with empathy, but with action.

    If this happened to you or someone you love, would you know what to do? Now is the time to talk about it with your parents, with your neighbors, with your community. A single conversation could save someone’s life savings. And that’s something none of us can afford to ignore.

     
  • Geebo 8:00 am on March 14, 2025 Permalink | Reply
    Tags: , impersonation scam, , ,   

    FBI Warns: Toll Text Scam Sweeping the U.S. 

    FBI Warns: Toll Text Scam Sweeping the U.S.

    By Greg Collier

    The latest wave of scams preying on unsuspecting Americans has taken the form of fraudulent road toll collection texts, prompting the FBI to issue a public warning. These deceptive messages claim that recipients have outstanding toll balances, threatening fines or even suspension of driving privileges if they fail to make immediate payment. But rather than being legitimate notices from state toll authorities, these texts are part of a growing cybercrime operation designed to steal personal and financial information.

    This type of scam falls under ‘smishing’, a variant of phishing that relies on SMS messages rather than emails. The scammers’ approach is alarmingly effective. Messages appear authentic, often using official-sounding language and formatting that mirrors legitimate toll collection agencies. The scam is spreading rapidly, shifting from state to state with nearly identical wording in each new location.

    Authorities are urging recipients not to engage with these messages. The FBI recommends reporting them through its Internet Crime Complaint Center and then deleting them without responding. Unfortunately, the fraudsters behind this scheme have refined their methods to circumvent certain smartphone security features. For example, while Apple restricts clickable links in texts from unknown senders, these scammers prompt users to reply with ‘Y’ to re-establish communication, bypassing this safeguard.

    A cybersecurity analysis revealed that bad actors have registered over 10,000 domains to facilitate these scams, targeting toll services and package delivery systems across multiple states and even into Canada. The scale of this operation suggests a level of coordination that goes beyond the typical small-scale scam.

    Historically, the most frequently reported phone scam involved fraudulent jury duty claims, where scammers would impersonate court officials and demand immediate payment under the threat of arrest. However, at least anecdotally, the toll text scam appears to have surpassed it in prevalence. With so many Americans accustomed to electronic toll payments, these fraudulent messages often seem credible at first glance, increasing the likelihood of engagement.

    The unfortunate reason this scam is becoming so common is simple, it’s working. Scammers wouldn’t keep running these schemes if they weren’t succeeding in tricking victims into handing over their personal and financial information. Every person who falls for the scam encourages criminals to expand their operations, making it even more widespread.

    The best defense remains skepticism. State agencies do not request payments through unsolicited text messages, and any demand for financial information via text should be treated with extreme caution. As the scam continues to evolve, staying informed is key to avoiding falling victim to these deceptive tactics.

     
  • Geebo 9:00 am on March 7, 2025 Permalink | Reply
    Tags: , impersonation scam, , ,   

    New $5K Scam Uses DOGE & Gov’t Promise 

    New $5K Scam Uses DOGE & Gov’t Promise

    By Greg Collier

    A new scam is making the rounds via text message, luring victims with the promise of a $5,000 federal subsidy. Authorities in Crawford County, Kansas, are warning residents to stay vigilant as scammers attempt to trick recipients into handing over personal information under the guise of government assistance.

    The fraudulent message claims that recent budget cuts by the Department of Government Efficiency have freed up money for distribution. It instructs recipients to reply with a confirmation, reopen the message, and click a provided link. This is an attempt to bypass security settings and increase engagement. The scammers promise that after submitting personal details, a check will be deposited directly into the recipient’s bank account or mailed within days.

    Officials have confirmed that this is a scam. Legitimate government agencies do not distribute funds in this manner, nor do they request sensitive information via unsolicited text messages. Anyone receiving such a message should delete it immediately and block the sender if possible. If there’s any uncertainty about a suspicious message, local law enforcement agencies can provide guidance, and reports can also be filed through official fraud reporting channels.

    This scam is just one example of how fraudsters exploit official-sounding names to appear legitimate. By invoking the ‘Department of Government Efficiency’, scammers create a sense of credibility, making their scheme more convincing. Similar tactics have been used in the past, and it’s likely that more scams will emerge using fabricated agencies or misleading government affiliations. Staying cautious of unsolicited financial offers, especially those that pressure quick action or request personal information, is essential in avoiding these ever-evolving threats.

     
  • Geebo 9:00 am on March 4, 2025 Permalink | Reply
    Tags: , gold coins, impersonation scam, ,   

    Gold Coin Scams: A Growing U.S. Threat 

    Gold Coin Scams: A Growing U.S. Threat

    By Greg Collier

    Recently, financial scams have evolved into increasingly sophisticated operations, targeting vulnerable individuals with elaborate deception. One alarming trend that has surfaced across the United States is scams that demand gold, where victims are tricked into purchasing and handing over gold under the guise of government intervention. Law enforcement agencies have reported an increasing number of cases where individuals, particularly seniors, are manipulated through fear and coercion into parting with their life savings.

    One such case recently unfolded in Clark County, Washington, where a woman in her 70s fell victim to a highly orchestrated scam. The fraudsters initiated contact by posing as government officials, claiming that fraudulent activity had been detected involving her Social Security number. Over time, they convinced her that in order to protect her financial assets, she needed to transfer them through an official process. Adding another layer of credibility, the scammers even staged a phone call from an individual impersonating a local police officer to validate the fraudulent claims.

    The scheme ultimately led the victim to withdraw the majority of her liquid assets, convert them into gold coins, and hand them over to a supposed undercover agent. The false promise that her assets would later be reissued to her ensured that she continued following their instructions without suspicion. By the time she realized what had happened, the perpetrators had vanished without a trace. In total, the victim lost $500,000 to the scammers.

    Gold has become an increasingly attractive target for scammers because, unlike digital transactions, it is nearly impossible to trace once it leaves the victim’s possession. Once gold is physically handed over, it can be melted down, resold, or transported without the same level of oversight as traditional banking methods. This makes it particularly appealing to criminals who want to avoid the risk of detection through electronic transactions or wire transfers.

    This method of deception is not isolated to one region. Other cases across the country have demonstrated similar patterns, where scammers exploit online vulnerabilities or impersonate trusted institutions to gain access to financial assets. Victims are often instructed to keep their interactions private, warned that speaking to others could compromise the security of the supposed investigation. This tactic effectively isolates them, preventing intervention from family members or financial advisors who might otherwise recognize the scam.

    Authorities emphasize the importance of vigilance when receiving unsolicited calls, emails, or messages claiming to be from government agencies. No legitimate government office will ever request payments in gold, cryptocurrency, or gift cards. If such a request is made, it is a clear indicator of fraud. Verifying claims through direct contact with the agency in question, by independently looking up their phone number rather than using a provided contact, is a crucial step in preventing financial loss.

    As financial fraud continues to evolve, spreading awareness remains one of the most effective defenses against these types of scams. Checking in with elderly family members and ensuring they are aware of these tactics can make a significant difference in preventing future cases. Law enforcement agencies remain committed to investigating these crimes, but prevention is key in stopping scammers before they succeed.

     
  • Geebo 9:00 am on February 26, 2025 Permalink | Reply
    Tags: , , impersonation scam, ,   

    Scammers Prey on Grieving Tulsa Family 

    Scammers Prey on Grieving Tulsa Family

    By Greg Collier

    Losing a loved one is one of life’s most painful experiences, and in the midst of that grief, the last thing a family expects is to become the target of a cruel scam. But for one Tulsa family, that is exactly what happened. While struggling to cover the costs of a funeral, they were deceived by a scammer who preyed on their vulnerability, using publicly available obituary information to pose as an insurance representative.

    The ordeal began when a caller claimed that a long-lost insurance policy had been discovered in the name of a deceased relative. The promise of a financial payout seemed like an unexpected blessing, offering relief during an already difficult time. However, the supposed payout came with a catch. Before the family could receive their funds, they needed to cover a ‘deductible’ fee. Desperate for the financial support they were assured was coming, they scraped together what they could, even pawning personal belongings to meet the scammer’s demands.

    Almost immediately after sending the money, doubt crept in. The caller’s tone changed, and communication became rushed and evasive. It became clear they had been tricked, and instead of receiving the large sum of money they were promised, they were left with nothing but financial loss and heartbreak.

    This tragic deception is not an isolated case. Scammers routinely comb through online obituaries, extracting personal details to manipulate grieving families. With names, relationships, and other sensitive information readily available, these fraudsters craft convincing stories to exploit those already facing emotional turmoil.

    Consumer advocates warn that this type of scam is on the rise, and they urge people to be cautious when receiving unexpected financial promises. If someone claims that a loved one has left behind money, experts advise verifying the legitimacy of the claim by independently contacting the alleged agency or company. Most importantly, they stress one key rule. If you are asked to send money in order to receive money, it is almost certainly a scam.

    For this Tulsa family, the pain of their loss has been compounded by the betrayal of a stranger who took advantage of their grief. But by sharing their experience, they hope to prevent others from falling victim to the same cruel scheme.

    As funeral homes and consumer protection agencies work to raise awareness, the message is clear. Always verify before you trust, and never let desperation override caution. In moments of vulnerability, scammers see opportunity, but with knowledge and caution, families can protect themselves from further loss.

     
  • Geebo 9:00 am on February 25, 2025 Permalink | Reply
    Tags: fake car dealership, impersonation scam, , ,   

    Beware: Fake Car Dealership Scam Surge 

    By Greg Collier

    Scam alert stories have taken a new twist in Wisconsin, where a disturbing pattern of fraudulent car sales has emerged online. In recent developments, state transportation officials have observed a surge in deceptive practices by individuals posing as legitimate car dealerships. These con artists create polished online storefronts that mimic real businesses, using stock images and visuals of genuine vehicles to lure unsuspecting buyers into what appears to be a bargain.

    The fraudulent operations begin with an elaborate digital setup. Fake websites and social media profiles are crafted to look like authentic dealership pages, complete with images that lend an air of legitimacy. Vehicles are often advertised at prices that seem too enticing to pass up, which, in reality, serve as bait to draw in potential buyers. The entire transaction is managed remotely, without any face-to-face meeting or physical inspection of the vehicle, a detail that, under normal circumstances, should raise a few red flags.

    Once a prospective buyer is convinced by the attractive price and seamless online presentation, they are typically asked to complete a wire transfer. At that point, the scammer vanishes. Despite receiving documents that mimic a bill of sale, the buyer soon discovers that the vehicle either never existed or is impossible to retrieve. This pattern of deception highlights the sophisticated methods these fraudsters employ and underscores the need for caution when engaging in any transaction over the internet.

    Wisconsin officials are urging consumers to exercise extreme caution in every step of their purchase process. They advise that anyone considering a vehicle purchase from an online source should conduct thorough research and verification. Confirming the legitimacy of a business through official channels can save one from the significant financial and emotional toll of falling victim to such scams. Even when the offer appears to be a once-in-a-lifetime deal, it is crucial to trust one’s instincts and seek additional validation.

    The convenience of online transactions is often accompanied by hidden risks. The recent rise in fake car dealership scams serves as a stark reminder that a careful, measured approach is essential when dealing with unfamiliar entities online. Maintaining a healthy level of skepticism and taking the necessary steps to verify the authenticity of an offer can help ensure that what seems too good to be true doesn’t turn into a costly mistake.

     
  • Geebo 9:01 am on February 20, 2025 Permalink | Reply
    Tags: , dogecoin, impersonation scam, , ,   

    DOGE Chaos: Fake Agents, Real Security Threat 

    DOGE Chaos: Fake Agents, Real Security Threat

    By Greg Collier

    San Francisco City Hall was the scene of an unusual and unsettling event on February 14th when three men, claiming to work for the Department of Government Efficiency (DOGE), attempted to gain access to office computers. Lacking identification but armed with bold attitudes, they demanded that staff upload information from their systems via a USB drive they provided. Their aggressive demeanor and refusal to provide credentials led employees to deny their requests, but the audacity of their actions has left lingering questions about their true motives.

    The supposed Department of Government Efficiency is an initiative linked to the Trump administration and informally led by Elon Musk, purportedly aiming to root out waste, fraud, and abuse within government agencies. However, its lack of formal structure and transparency has made it difficult to discern what authority, if any, these individuals actually had. Their presence was not only disruptive but also legally questionable. Surveillance footage captured them in DOGECOIN t-shirts, a curious wardrobe choice that only deepens the mystery.

    To complicate matters further, similar reports surfaced from an administrative building within the San Francisco Unified School District, where three men fitting the same description attempted to gain entry. Whether this was an extension of the same operation or a separate act under the same guise remains uncertain.

    The nebulous nature of DOGE, both as a government initiative and a cultural phenomenon, creates a breeding ground for confusion, and with confusion comes opportunity, for deception, manipulation, and exploitation. The name itself, associated both with government efficiency and a satirical cryptocurrency, makes it difficult to determine what is genuine and what is an elaborate hoax. This is precisely the kind of environment where future scams could flourish.

    With no clear organizational structure, anyone with a few printed t-shirts and a persuasive tone could claim to represent DOGE and exploit the fear of government oversight. Fraudsters could gain unauthorized access to sensitive data or systems by leveraging the ambiguity surrounding this initiative. Given the rise of social engineering attacks, where deception is used to manipulate individuals into divulging confidential information, it is not difficult to imagine similar schemes emerging under the DOGE banner, targeting government offices, businesses, or even everyday citizens.

    This incident at City Hall raises serious concerns about security, credibility, and the ease with which a group of unverified individuals can attempt to infiltrate government offices. The absence of immediate consequences for the perpetrators only emboldens copycats who might see an opportunity to exploit the situation for their own gain. If nothing else, it serves as a stark reminder that in an age where information is power, skepticism and verification are essential defenses against those who seek to take advantage of institutional uncertainty.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel