Tagged: impersonation scam Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on August 28, 2025 Permalink | Reply
    Tags: , impersonation scam, , , , technical support scam   

    FBI: Phantom Hacker Scam Drains Life Savings 

    By Greg Collier

    The FBI’s Internet Crime Complaint Center has issued a warning about a sharp increase in so-called “Phantom Hacker” scams that are targeting older Americans and causing many victims to lose their life savings. This scheme is a more advanced form of the traditional tech support scam, using multiple layers of deception to convince victims they must move their money in order to keep it safe.

    Reports indicate that scammers impersonate customer support representatives, financial institutions, and even U.S. government agencies. Victims are told their accounts have been compromised by foreign hackers and are pressured to transfer money into fraudulent accounts controlled by the scammers. Often, the stolen funds include retirement accounts and long-term savings.

    Between January and June 2023, the FBI’s Internet Crime Complaint Center received more than 19,000 reports related to tech support scams, representing losses of more than $542 million. Nearly half of these victims were over the age of 60, and those cases accounted for two-thirds of the total reported losses. As of August 2023, the amount lost to such scams was already 40 percent higher than the total losses reported in all of 2022.

    The operation of these scams often begins with a fraudulent technical support alert that instructs the victim to call a phone number. Once contact is made, scammers gain remote access to the victim’s computer and pressure them to open financial accounts, pretending to check for fraudulent activity. From there, victims are passed to imposters posing as representatives of banks or government agencies who continue to escalate the deception until the victim transfers funds. Scammers may even use official-looking government documents or letterhead to reinforce the illusion of legitimacy.

    Beyond the financial theft, these scams often exploit social vulnerabilities. Victims are frequently told not to share details with family members or financial institutions, which creates secrecy and isolation. This manipulation makes it harder for others to intervene before the money is lost. At the same time, many of the funds stolen in these cases are routed overseas, placing them beyond the reach of U.S. law enforcement and making recovery nearly impossible. This cross-border nature of the crime underscores why prevention is far more effective than attempting to reclaim stolen assets after the fact.

    The FBI advises the public to remain cautious against unsolicited communications claiming to provide technical support or financial security. Government agencies do not ask citizens to move money to “safe” accounts, nor do they request payments through wire transfers, cryptocurrency, or prepaid cards.

    Anyone who has been targeted by such scams is encouraged to report the incident to the FBI’s Internet Crime Complaint Center at http://www.ic3.gov or contact their local FBI field office. Providing details such as the methods of contact, email addresses, websites, and financial account information involved can help investigators track and combat these operations.

    The FBI stresses that raising awareness is a critical part of preventing further victimization. By recognizing the warning signs and reporting suspicious activity, the public can play a role in reducing the financial harm caused by Phantom Hacker scams.

     
  • Geebo 8:00 am on August 27, 2025 Permalink | Reply
    Tags: , fake law firm, fake lawyer, impersonation scam, , ,   

    Crypto Fraudsters Masquerade as Lawyers 

    By Greg Collier

    The FBI has issued a new reminder warning people who have already fallen victim to scams that they may be targeted again. According to the agency, fraudsters often circle back to previous victims with fresh schemes designed to exploit them further.

    One of the most concerning variations involves scammers posing as representatives of fictitious law firms. These operations present themselves as “crypto recovery law firms,” claiming to work alongside government agencies or international organizations that in reality do not exist. Victims are often told they are listed in official databases of scam victims and are promised that the firm can help them recover stolen cryptocurrency.

    What makes this scheme particularly dangerous is the amount of information the fraudsters may have about past incidents. The scammers sometimes provide exact figures of losses, transaction details, and even the names of entities where money was sent. This can create the illusion of legitimacy, leading victims to believe that the outreach is genuine.

    The con typically progresses to requests for personal information or referrals to supposed foreign banks or attorneys. At that stage, victims are told that fees must be paid to prove ownership of funds before any recovery can be made. In reality, no legitimate government effort to assist scam victims requires such payments.

    This latest reminder also outlines practical ways for people to verify whether contact is genuine. Scam operations may refuse to appear on video, may use falsified legal credentials, or may impersonate real lawyers or law enforcement personnel. These impersonations endanger victims and harm the reputations of legitimate professionals.

    The FBI notes that these “double victimization” scams are particularly cruel because they exploit the emotional distress of people who have already lost money. Many victims are desperate to recover their losses, and that desperation can make them more vulnerable to false promises of restitution. By preying on hope and grief, scammers increase the likelihood that victims will comply with their demands.

    There is also a risk that scammers identify their targets through public disclosures online. People who openly post about their losses on social media may unintentionally expose themselves to renewed targeting. For that reason, it is safer not to share detailed accounts of being scammed in public forums where criminals are actively searching for vulnerable victims.

    Another place where scammers may search for targets is within online support groups for scam victims. While many of these groups exist to help people share experiences and learn from one another, they can be infiltrated by fraudsters posing as fellow victims who recommend illegitimate recovery services. This creates another layer of risk for people already seeking help and highlights the importance of verifying any advice or services offered in these spaces.

    The FBI advises anyone who believes they may have been targeted by these recovery scams to report the attempt to their local field office.

     
  • Geebo 8:00 am on August 26, 2025 Permalink | Reply
    Tags: , free upgrade, impersonation scam, ,   

    The Costly Trap of ‘Free’ Phone Upgrades 

    The Costly Trap of ‘Free’ Phone Upgrades

    By Greg Collier

    What may sound like a generous offer of a free phone upgrade can sometimes be the opening move in a costly scam. A recent case in Atlanta highlights how convincing these schemes can be and how easily consumers can be drawn in when scammers present themselves as representatives of well-known companies.

    The scam begins with a call claiming to come from a customer loyalty department. The target is offered a free upgrade, often involving a phone, smartwatch, or tablet. The caller already has access to some personal details, which creates a false sense of legitimacy. To proceed, the victim is asked to provide a code sent to their device. Handing over this code is what gives the scammer access to the account.

    Once inside, the scammer can order devices, open additional lines, and manipulate shipping instructions to ensure the equipment ends up in their possession. A common tactic is to tell the victim that the wrong item was sent, then request the return of the device using a label connected to the fraudster rather than the company. This cycle may repeat until suspicions grow.

    By the time many consumers discover what has happened, their accounts have already been altered without their consent. Some find themselves responsible for unauthorized lines and unexpected charges. Addressing these issues can be difficult, as companies often interpret the shared code as proof that the customer authorized the changes.

    Telecommunications fraud has become a lucrative sector for scammers because phones are high-value items that are easy to resell. Exploiting upgrade programs allows criminals to divert expensive devices into secondary markets within days. Industry reports estimate that mobile carriers lose billions annually to this type of fraud, losses that can indirectly affect all customers.

    The scam is effective because it exploits a security system designed to protect customers. Verification codes are meant to safeguard accounts, but when scammers convince individuals to read those codes aloud, the entire layer of protection collapses. This allows fraudsters to bypass technical barriers without ever needing to break into company servers or crack encryption systems.

    In this Atlanta case, the company ultimately removed fraudulent lines after being contacted by local media. A statement acknowledged the sophistication of the scam and encouraged consumers to review fraud prevention resources and report suspicious activity immediately.

    Even if a call appears to come from a familiar company, it is best to avoid providing verification codes or personal information to anyone who initiates the contact. Legitimate representatives will not ask customers to share those codes. Letting calls go to voicemail and reaching out directly through official customer service numbers remains one of the most reliable ways to confirm whether an offer is real.

     
  • Geebo 8:00 am on August 25, 2025 Permalink | Reply
    Tags: , , impersonation scam,   

    Scammers Hijack Printer, Steal $17K 

    By Greg Collier

    Authorities in Orange County, North Carolina, say a woman recently lost more than $17,000 in what investigators describe as part of a wide-reaching scam that has defrauded victims in the state.

    This case began when the victim attempted to log in to her bank account and was met with technical issues. Believing she had reached her bank, she called a number saved in her phone and was connected to individuals posing as financial representatives. She was told her accounts were frozen due to a suspicious charge and was transferred multiple times, eventually being instructed to download programs to her computer. The scammers manipulated her accounts to make it appear as though a large sum had been incorrectly deposited, then pressured her to withdraw cash to resolve the situation.

    The deception escalated when fraudulent letters, complete with a recognizable bank logo, began printing directly from her home printer. The letters warned her not to discuss the matter with her local branch, claiming there were tax complications tied to an online payment service. Under continued pressure during a phone call that lasted hours, she withdrew $17,500 from her account.

    At the bank, an employee asked her directly if she was being pressured into the withdrawal. She denied it, unaware she was being scammed, and signed a document stating she was taking the money out voluntarily. That step, while part of the bank’s effort to ensure customer protection, could also complicate any attempt she makes to recover her losses. By signing a waiver, she effectively confirmed to the bank that the withdrawal was her own decision, creating a potential defense for the institution should she pursue a reimbursement claim.

    She later handed the money directly to a man who arrived at her home, believing she was returning funds to resolve the supposed error. Investigators later confirmed that the individual who collected the money is facing multiple charges, including obtaining property under false pretenses and felony conspiracy.

    The financial consequences for the victim were severe, as the stolen funds came in part from an insurance policy she intended to use for medical expenses. Investigators have advised her that recovery of the money is unlikely given the speed with which the funds were moved.

    A representative from Bank of America stated that the bank is investigating the matter but could not provide further comment until the internal review is complete.

    Under U.S. banking regulations, customers are typically protected if their funds are taken through unauthorized electronic access. However, when a victim is manipulated into moving money themselves, banks often classify it as an authorized transaction. That distinction can leave victims without recourse, particularly when they have signed documents affirming the withdrawal was voluntary, even if they were under the influence of a scam at the time.

     
  • Geebo 8:00 am on August 19, 2025 Permalink | Reply
    Tags: Apple Cash, , , impersonation scam, , , transfer it to protect it   

    Scammers Push “Transfer It to Protect It” Cons 

    Scammers Push “Transfer It to Protect It” Cons

    By Greg Collier

    A troubling trend in financial fraud has been steadily growing in recent years. Known as “transfer it to protect it” scams, or more commonly as the “moving money scam,” these schemes involve criminals posing as trusted entities to convince people that their money is at risk and must be moved immediately for safekeeping. The Federal Trade Commission reports that losses tied to this scam have risen dramatically, particularly among older adults.

    Data from the FTC shows a more than a fourfold increase between 2020 and 2024 in reports from people who lost $10,000 or more after being targeted by impersonators of banks, businesses, or government agencies. Older adults are disproportionately affected, with many victims losing well over $100,000. Combined losses among those reporting six-figure losses reached $445 million in 2024, compared with $55 million in 2020.

    The methods are varied but share the same goal. Some victims receive alarming phone calls warning that their accounts have been compromised. Others encounter fake pop-up alerts on their computers or emails from senders claiming to represent their bank. Once the victim is unsettled, the fraudster pushes them to move money quickly. Common instructions involve sending funds through Bitcoin ATMs, wiring money to a so-called secure account, or even transferring money through services like Apple Cash. The FTC notes that government agencies and legitimate businesses do not request payment or money transfers in these ways.

    Younger consumers are not immune either. Reports include cases of individuals in their late teens and early twenties being manipulated into sending money through similar tactics. The scammers’ stories are always urgent and intimidating, designed to rush the victim into handing over control of their savings.

    The FTC’s latest data shows how victims are persuaded to move money: about one-third of older adults who reported losing $10,000 or more in 2024 said they transferred funds using cryptocurrency. Others reported using bank transfers or handing over cash. Once money is deposited into cryptocurrency ATMs or moved into fraudulent accounts, it is rarely recoverable.

    Another key factor in the success of the moving money scam is the psychology behind it. Scammers rely on fear and urgency to push victims into acting without thinking. They often keep people on the line for extended conversations to prevent them from double-checking information or reaching out for advice. In some cases, victims are even warned not to tell family or friends about what is happening, under the false pretense of protecting an investigation. This deliberate isolation makes the scam particularly dangerous, because it exploits both financial vulnerability and human trust.

    Officials warn that some scammers even go as far as impersonating the FTC itself or other federal agencies, adding credibility to their demands. These calls sometimes escalate to threats of frozen assets or arrest warrants, pressuring victims to comply.

    The best protection is skepticism toward unsolicited messages that urge immediate action with your finances. Instead of engaging, consumers are encouraged to verify account activity directly through their bank or credit card provider. Hanging up the phone and avoiding suspicious links are safer paths than reacting to the urgent claims of someone who may be impersonating a trusted source.

     
  • Geebo 8:00 am on August 1, 2025 Permalink | Reply
    Tags: , , impersonation scam, PPP Loans,   

    PPP Scam Targets Texas Bank Accounts 

    By Greg Collier

    It has been five years since the onset of the COVID-19 pandemic, but the ripple effects continue to impact Americans. One troubling development is a scam that has resurfaced across the country, now affecting communities in Texas. Individuals who received Paycheck Protection Program (PPP) loans are being contacted by scammers posing as their bank, asking for sensitive financial information.

    These fraudulent calls have recently begun targeting residents in the Abilene area. The scammers are not operating at random. Instead, they appear to be using publicly available information released by the Small Business Administration. The list includes names, loan amounts, and financial institutions involved in distributing PPP funds. Criminals are taking this data and impersonating bank representatives in an effort to gain access to recipients’ online banking systems.

    Once contact is made, victims are pressured to hand over account details such as passwords or authentication codes. These details are then used to initiate unauthorized transactions and siphon funds. Although the scam is tailored to PPP recipients, the broader tactic of impersonating a bank and spoofing phone numbers to appear legitimate is not new. Spoofed calls can make it seem like they are coming from a trusted local number or even the recipient’s own bank.

    The situation highlights the importance of verifying who you are speaking to before sharing any personal or financial information. Financial institutions will not request passwords or secure access codes over the phone. Customers who receive such requests are encouraged to end the call and contact their bank directly using a verified phone number listed on the institution’s official website or documents.

    Local financial institutions are not taking the matter lightly. Some banks have started collaborating with trade organizations to push for the removal of sensitive PPP data from public access. This step aims to reduce the likelihood of criminals using that information to manipulate and defraud recipients.

    For individuals who may have already fallen victim to this scam, there are steps that can be taken to recover. Under federal law known as Regulation E, consumers have 60 days from the date of their bank statement to report unauthorized electronic transfers. If reported in time, banks are required to investigate and may be obligated to reverse the fraudulent transactions. Victims can also report the incident to the Small Business Administration’s Office of Inspector General or file a complaint through the Consumer Financial Protection Bureau’s IdentityTheft.gov portal, which offers resources and action plans for dealing with financial fraud and identity theft.

    In the meantime, those who believe they have received a scam call or have been victimized are encouraged to use resources like the BBB Scam Tracker website. Sharing experiences can help others stay informed and may aid in shutting down fraudulent activity more quickly.

    Although the PPP program was designed to offer relief during a national emergency, it has unfortunately become a tool for exploitation. As long as that data remains public, scammers will continue to find ways to use it against the very people it was intended to help.

     
  • Geebo 8:00 am on July 30, 2025 Permalink | Reply
    Tags: , impersonation scam, , , ,   

    Fake IRS Letters Target Military Families 

    Fake IRS Letters Target Military Families

    By Greg Collier

    Military families in metro Atlanta are being warned about a tax-related scam that appears to target the loved ones of active-duty service members deployed overseas. The scheme involves fraudulent letters claiming to be from the Internal Revenue Service. These letters demand payment for supposed back taxes and threaten the loss of property if the amount is not paid.

    The letters look official and often arrive via certified mail, which adds to their deceptive appearance. Families, already under emotional stress while their loved ones are deployed, may feel pressured to act quickly without verifying the source. This creates an ideal environment for scammers who rely on fear and confusion to extract money or personal information.

    Some families have reported difficulty confirming whether the tax debt is legitimate, especially with the added complication of time zone differences and limited communication during deployment. In at least one case, repeated calls to the IRS were required to confirm that no taxes were owed. Such scams can create unnecessary financial anxiety and emotional stress for those trying to support deployed relatives from afar.

    Organizations that monitor scams affecting military personnel say these individuals are often more vulnerable due to the nature of their service. Deployed members may not have regular access to email or financial accounts, and physical mail may go unchecked for long periods. This makes it easier for fraudulent claims to go unnoticed or unchallenged until significant damage is done.

    The most common types of scams targeting this group are impostor scams and identity theft. Fraudsters often pose as government agencies or financial institutions to gain trust and pressure victims into taking immediate action. Military families are encouraged to be skeptical of unsolicited communications demanding money and to verify all claims directly through official government channels.

    To confirm whether a tax debt is legitimate, individuals can check directly with the IRS by using the official IRS website or by calling the phone number listed on IRS.gov. The agency does not demand immediate payment using methods such as gift cards, wire transfers, or cryptocurrency, and it typically initiates contact through prior notices before escalating collection efforts.

    It may also be helpful for families to be aware of protections available under the Servicemembers Civil Relief Act. This law provides financial and legal safeguards to active-duty service members, including protections against certain debt collection actions. Understanding these rights can be an important step in identifying and resisting fraudulent threats.

    As scams continue to evolve, staying informed remains a critical line of defense. Families should consider placing fraud alerts on financial accounts and monitoring credit activity, especially during periods of deployment. Prompt reporting of suspicious activity to the proper authorities can also help prevent further harm and assist in identifying patterns that lead to enforcement action.

     
  • Geebo 8:00 am on July 29, 2025 Permalink | Reply
    Tags: , impersonation scam, , , State Code 15C-16.003,   

    Fake DMV Texts Cite Bogus Laws 

    By Greg Collier

    A phishing scam that has been circulating in multiple states is continuing to evolve, with a new variation citing a fictitious state code to lend credibility to fraudulent messages. The scam targets drivers by sending official-looking texts that claim the recipient owes traffic fines or faces legal penalties, such as license suspension or damage to their credit score.

    The latest version of the scam has appeared in Illinois, California, Minnesota, New Jersey, and Tennessee. In each instance, recipients receive alarming messages that appear to come from a state motor vehicle agency. The messages often claim that an outstanding traffic ticket needs to be paid immediately or that the ticket will be referred to a toll agency for an additional fee. A recent variation includes a fabricated code, such as “State Code 15C-16.003,” to make the warning seem more legitimate. This code has no basis in any actual state law.

    These text messages usually contain a link that, when clicked, leads to a fake website designed to steal personal or financial information. In some cases, the scam also involves spoofed phone numbers that appear to come from law enforcement agencies or government offices. These tactics are intended to pressure recipients into taking immediate action without verifying the source.

    State agencies across the country have issued warnings to residents, clarifying that they do not send text messages demanding payment or threatening legal action. Official notices regarding traffic violations or unpaid fines are typically sent by mail. Payments are usually made through secure state websites, not through third-party links sent via text.

    To avoid falling victim to this scam, drivers are advised not to respond to unexpected text messages, especially those that include suspicious links or legal threats. Instead, they should verify the legitimacy of any message by contacting their state’s department of motor vehicles or public safety office directly. Residents who believe they have received a fraudulent message are encouraged to report it to the Federal Trade Commission or their state’s consumer protection office.

    This scam has persisted for months and continues to adapt. The inclusion of a fictitious legal code is the latest effort to deceive and pressure recipients. Remaining cautious and informed is essential to protecting personal information and avoiding financial loss.

     
  • Geebo 8:01 am on July 25, 2025 Permalink | Reply
    Tags: airlines, , impersonation scam, , ,   

    Scammers Lurk After Travel Rants 

    By Greg Collier

    A new scam is targeting travelers who take to social media to vent frustrations about delayed or disrupted trips. What begins as a routine post tagging an airline or airport can quickly turn into a phishing attempt from imposters posing as customer service representatives.

    One recent incident occurred after a family endured extensive travel delays returning from Mexico. A flight that was expected to take just one hour turned into a 24-hour ordeal involving hours on the tarmac and an unexpected fifteen-hour drive home. After sharing the experience on social media and tagging the involved airline and airport, the traveler’s inbox was flooded with messages that appeared to come from official customer support accounts. However, the senders were scammers attempting to collect personal information such as full names, addresses, phone numbers, and flight details.

    These fraudulent messages often come from newly created accounts that mimic real customer service pages. They may use company logos and names to appear legitimate but typically lack a verified status, have few posts, and limited engagement. In contrast, authentic corporate accounts usually have a long history, substantial followings, and verified badges.

    Travelers who wish to lodge a complaint or seek a resolution should avoid replying to social media messages that arrive unsolicited. Instead, they should reach out directly through the official website or app of the airline or travel provider. Many companies now offer live chat functions or dedicated customer support sections within their platforms.

    To avoid falling victim to this type of scam, it is important to remain cautious when receiving unexpected messages after posting a complaint. Verifying the account’s history, follower count, and contact method can help determine whether the message is genuine. Travelers should never share sensitive personal details with accounts they have not independently verified.

    In this particular case, travel insurance helped the affected family recover some of their expenses. While airing frustrations online is common, it is essential to be careful about who might be watching and waiting to take advantage.

     
  • Geebo 8:00 am on July 16, 2025 Permalink | Reply
    Tags: , , , impersonation scam,   

    Fake AMBER Alert Kits Are a Scam 

    By Greg Collier

    Authorities in Orlando, Florida, are warning residents about a troubling scam that falsely claims to be associated with the AMBER Alert program. Scammers have been contacting families both by phone and in person, claiming that parents must register their children for an AMBER Alert kit. In reality, no such registration or payment is required for a child to be eligible for an AMBER Alert.

    The genuine AMBER Alert system is a public safety tool activated only when law enforcement confirms that a child has been abducted and specific criteria are met. Once issued, alerts are distributed through a wide-reaching network that includes radio, television, highway signs, mobile phones, and digital platforms. The system is designed to mobilize communities quickly, not to require any kind of pre-registration or participation in a kit program.

    Scammers are preying on parental fears and using this false narrative to gain trust. In some cases, they have been reported as highly persistent and even appear to possess personal information about the families they target. These tactics are not only designed to extract sensitive data but may also be used to gain physical access to people’s homes under false pretenses.

    The underlying goal of these scams is not just theft of personal data for immediate use. Scammers are particularly interested in obtaining children’s personal information because it can be used to open new lines of credit. Since children are unlikely to check their credit reports, fraudulent accounts may remain undetected for years, sometimes only discovered once the child becomes an adult and applies for credit for the first time.

    Residents are urged to stay cautious and not to share any personal information with individuals claiming to offer or sell AMBER Alert kits. Anyone approached in this way should contact local law enforcement to report the incident. Public awareness is one of the most effective tools in shutting down these deceptive and invasive schemes.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel