Tagged: impersonation scam Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on October 6, 2025 Permalink | Reply
    Tags: , , impersonation scam, medicaid, , ,   

    Shutdown Fuels Federal Impostors 

    Shutdown Fuels Federal Impostors

    By Greg Collier

    With the federal government shutdown creating uncertainty across the country, consumers are being urged to stay alert for scams that exploit the disruption. Officials in North Carolina recently issued a warning after seeing signs that criminals are using the shutdown to impersonate federal agencies and obtain personal or financial information. The concern is not limited to one state, since the agencies being mimicked operate nationwide and shutdown-related confusion affects people in every region.

    Past shutdowns have shown that scammers quickly adjust their tactics to match the moment. During previous funding lapses, people reported fraudulent claims about suspended Social Security checks, frozen food assistance, or threats that Medicare coverage would end unless immediate action was taken. In some instances, callers falsely offered help to federal workers or contractors struggling with missed paychecks, using the shutdown as cover to push loans or collect personal data.

    These schemes commonly arrive by phone, text message, or email and rely on pressure and urgency rather than credibility. Scammers often use caller ID spoofing or fake email domains to make their messages appear to come from federal agencies. That technology can make it difficult for people to immediately recognize that the communication is fraudulent.

    Government officials are emphasizing that legitimate agencies will not make unsolicited requests for sensitive information or demand payment through gift cards, wire transfers, or similar methods. Any unexpected outreach from someone claiming to represent a federal program should be treated with caution. People are encouraged to end the communication and reach out directly to the agency using verified contact information if there is reason to confirm anything.

    In North Carolina, the Consumer Protection Division of the state Department of Justice is continuing to accept fraud complaints during the shutdown. Other states have similar channels for reporting suspicious activity. Remaining cautious, especially when receiving messages that appear urgent or threatening, is one of the most effective ways to prevent financial or identity theft while the shutdown continues to create opportunities for exploitation.

     
  • Geebo 8:00 am on September 30, 2025 Permalink | Reply
    Tags: impersonation scam, , , ,   

    Tax Refund Text Scam Spreads Nationwide 

    Tax Refund Text Scam Spreads Nationwide

    By Greg Collier

    What began as a problem in just two states has since spread more widely, as residents across the country continue to report fraudulent text messages designed to steal financial information. State tax agencies are issuing alerts warning that these scams are evolving in both scale and sophistication, now targeting households in New York, Pennsylvania, Minnesota, Connecticut, Michigan, New Jersey, and beyond.

    The messages often claim to come from state revenue departments and tell recipients that their refund request has been processed and approved. They then urge taxpayers to provide banking details, with some versions threatening permanent forfeiture of a refund if payment information is not submitted. Officials stress that legitimate state agencies do not request sensitive personal or financial information through unsolicited texts, emails, or phone calls.

    These fraudulent messages are structured to mimic the formal language of government communication. Some include references to tax statutes or deadlines, while others attempt to create urgency with warnings about penalties. Scammers rely on this sense of pressure to convince recipients to click links that lead to spoofed websites or to respond directly with private information. In some cases, even a simple reply can help scammers bypass basic security safeguards on some mobile devices.

    Cybersecurity experts point out that these campaigns have shifted from their earlier focus on banks and retailers to government institutions. By impersonating state tax departments, attackers exploit the authority of trusted institutions. The result is a scam that is more difficult for many taxpayers to dismiss outright.

    Tax agencies across multiple regions are advising residents to exercise caution. Suspicious messages should not be clicked or answered. Verification should be sought only through official state channels, such as tax department websites or phone lines. The broader pattern of these scams reflects the adaptability of cybercriminals and the need for continued public awareness, particularly during tax season when individuals are more likely to be anticipating legitimate communication from government offices.

     
  • Geebo 8:00 am on September 19, 2025 Permalink | Reply
    Tags: impersonation scam, , , ,   

    Lottery Winner Texts Are a Scam 

    By Greg Collier

    A new wave of fraudulent text messages has been reported in North Carolina and across the country, with scammers posing as generous lottery winners offering to share their supposed jackpot fortunes. The Federal Trade Commission warns that these messages are not legitimate and advises consumers to exercise caution when receiving such unexpected communications.

    One example circulating now claims that the recipient has been chosen at random to receive one million dollars in cash and a new car. The message explains that the selection was made by an automated system and provides a number to contact a so-called managing director with a special claimant code. When reporters attempted to follow the instructions, the call could not be completed, but the text line produced a swift response. Soon after, the sender requested detailed personal information, including name, address, marital status, occupation, age, income, and even a photograph.

    To test the claim further, reporters tried to initiate a video call, but the call went unanswered. Instead, another message arrived from a foreign number containing a picture of a duffel bag stuffed with cash. The elaborate performance only underscored the deceptive intent.

    According to the Better Business Bureau, the very nature of unsolicited text messages promising money is an immediate red flag. Experts emphasize that responding only confirms to scammers that a real person is at the other end, which encourages them to continue targeting the victim. The goal is almost always to obtain enough personal information to commit identity fraud or to manipulate the target into paying money under false pretenses.

    The Federal Trade Commission stresses the importance of deleting and reporting these texts rather than engaging. Responding can expose recipients to identity theft or malware, especially if links are clicked. Scammers are adept at creating a sense of urgency and legitimacy, but regulators urge people to verify any extraordinary claim through trusted channels rather than through the contact information provided in suspicious messages.

    This type of fraud is not rare. The FTC estimates that Americans lose tens of millions of dollars every year to prize and sweepstakes scams, with older adults among the most frequent targets. The tactics vary, but the pitch is nearly always the same. A promise of sudden wealth, accompanied by requests for personal details or money. A critical fact to keep in mind is that legitimate lottery organizations do not notify winners by text message or through social media, and they do not ask for photographs, income details, or banking information in order to release winnings.

    For anyone who has already replied to one of these messages, experts recommend taking immediate steps to protect personal security. This can include contacting your mobile carrier to block further messages, checking your credit report for unusual activity, and notifying your bank if financial details were shared. It may also be wise to change passwords associated with accounts that could be linked to the information provided. Even if no money was lost, reporting the interaction to the FTC and the BBB helps create a clearer picture of the scam’s reach and may prevent others from becoming victims.

    While these scams are persistent, their effectiveness lies in exploiting the universal hope of financial relief and good fortune. By mimicking the thrill of winning, criminals draw people into sharing information or parting with money. Recognizing the warning signs and taking quick protective measures can turn a potential loss into an important lesson. The safest response remains simple. Treat unexpected lottery offers not as opportunities, but as clear warnings to protect yourself and your information.

     
  • Geebo 8:00 am on September 17, 2025 Permalink | Reply
    Tags: impersonation scam, , , ,   

    States Warn of Tax Refund Text Scams 

    States Warn of Tax Refund Text Scams

    By Greg Collier

    State tax agencies are once again warning residents to be cautious about fraudulent text messages designed to steal personal and financial information. Following reports of fake texts in New Jersey earlier this year, the Michigan Department of Treasury has now issued its own alert after receiving complaints of similar activity.

    In New Jersey, scammers have been sending messages that claim to come from the Department of the Treasury’s Division of Taxation. The texts state that a refund request has been processed and approved but warn that if payment details are not submitted by a specified deadline, the refund will be permanently forfeited under the New Jersey Gross Income Tax Act. The Division of Taxation has confirmed that these messages are not legitimate and has explained that text communication is used only in limited circumstances when requested through its phone system. Officials emphasize that residents should avoid clicking links or replying to such texts, since doing so can lead to spoofed websites that mimic official branding and request sensitive financial details. Replying with a single character such as “Y” can also be an attempt by scammers to bypass cell phone security safeguards.

    The Michigan Department of Treasury has reported nearly identical tactics. Residents have received texts that falsely claim to be from the agency, with messages urging them to update payment information or risk forfeiting their refunds. The Treasury has made clear that it never sends unsolicited text messages to request sensitive information and that official correspondence with taxpayers is conducted through letters sent via the U.S. Postal Service. Officials urge residents to delete suspicious messages and to contact the department directly with any questions about refunds or tax obligations. The state’s Individual Income Tax Information Line can also be used to log these scams and verify tax information.

    Authorities in both states describe these fraudulent texts as another tool in the cybercriminal playbook. They rely on urgency and the appearance of official language to pressure recipients into surrendering personal data. Cybersecurity experts note that links embedded in such messages often lead to convincing but fraudulent websites designed to capture bank account or credit card details.

    These scams also take advantage of the psychology of tax season. Residents may already be anticipating communication about refunds or tax issues, and scammers exploit this expectation by imitating the formal language of government. References to state statutes or threats of forfeiture are designed to create an appearance of authority and urgency, making recipients more likely to respond without questioning the message’s authenticity.

    Smishing campaigns have historically focused on banks, shipping companies, and retailers, but government agencies have increasingly become the target. By impersonating tax departments or other state offices, scammers add a layer of credibility that makes their messages seem harder to dismiss. This evolution reflects a broader trend in cybercrime, where attackers adjust their tactics to exploit the most trusted institutions and the most stressful times of year.

    As tax agencies across different states continue to issue similar warnings, the pattern highlights the adaptability of smishing campaigns and the importance of public awareness. Residents who receive suspicious messages are advised to treat them with caution, verify claims directly with state agencies, and avoid engaging with any request for personal or financial information delivered by text.

     
  • Geebo 8:05 am on September 16, 2025 Permalink | Reply
    Tags: , Charlie Kirk, impersonation scam, , ,   

    Scammers Target Charlie Kirk Tragedy 

    By Greg Collier

    Authorities in Georgia are warning residents about a scam that has surfaced in the aftermath of the recent shooting of Charlie Kirk. Reports have circulated of fraudulent text messages being sent to cell phone users, claiming to be from Kirk’s wife, Erika, and urging people to donate in his honor. The messages are written in emotional language, suggesting that the movement Kirk built will grow stronger if people join in support, and they include a link for recipients to click.

    Law enforcement in both Effingham County and Habersham County has confirmed that the messages are not legitimate. Officials have stressed that scammers are attempting to exploit a national tragedy for financial gain. They cautioned that clicking on the links may expose victims to identity theft, malware, or fraudulent financial schemes. Instead of helping Kirk’s family or continuing his mission, the messages are designed to deceive and manipulate those who are grieving or sympathetic.

    Residents have been urged to delete the texts immediately and to report them to their carriers or local authorities. Officials also remind the public that legitimate fundraising efforts will never come through random text messages with suspicious links.

    This is not an isolated tactic. Scammers are always looking to make money out of any tragedy, whether by pretending to raise funds for victims, impersonating family members, or setting up fake charities. After natural disasters such as hurricanes or wildfires, fraudulent charity websites often appear within hours, and after the deaths of public figures, fake memorial fundraisers frequently surface. The scam tied to Kirk’s death follows the same predictable pattern, using grief and confusion as tools to steal.

    Authorities say awareness is the strongest defense, and anyone who receives such a message should recognize it for what it is, a calculated attempt to profit from pain.

     
  • Geebo 8:00 am on September 10, 2025 Permalink | Reply
    Tags: , Electronic Fund Transfer Act, impersonation scam, , ,   

    Scammed and Abandoned by the Bank 

    Scammed and Abandoned by the Bank

    By Greg Collier

    In Austin, Texas, a local woman believed she was safeguarding her finances from fraudsters. Instead, she unknowingly delivered her money straight into their hands, losing $25,000 in the process. Despite her efforts to act responsibly, her bank has declined to make her whole.

    The fraud began with a text message that appeared to come directly from her financial institution. She took what seemed to be the prudent step of contacting the number on the back of her card, where no irregularities were reported. Soon after, she received a call from someone posing as a senior fraud investigator. This individual already had her personal information and convinced her that criminals were using her identity at a bank branch.

    The impersonator claimed to be working with federal authorities and persuaded her to withdraw money from her account to aid in an investigation. Over two days, she removed $25,000 in cash and deposited it elsewhere as instructed. By the time she and her partner checked her account, the money was gone.

    What has added insult to injury is the lack of assistance from her bank. The institution issued a general statement expressing sympathy and confirming it investigates all fraud reports, yet it has not restored the stolen funds. The customer and her partner argue that the bank could have done much more to protect them, but instead they are now left to battle the loss alone.

    Consumer protection laws such as the Electronic Fund Transfer Act are designed to safeguard account holders against unauthorized withdrawals. However, financial institutions often argue that when a customer is deceived into moving the funds themselves, the transaction no longer qualifies as unauthorized. This distinction leaves many victims of social engineering scams without recourse, highlighting a gap in existing regulations and raising questions about how well current policies address the realities of modern financial fraud.

    Consumer advocates say cases like this are becoming increasingly common. Advances in technology make scams more sophisticated, with fraudsters able to spoof caller IDs, mimic industry language, and even clone voices. The Better Business Bureau warns that once a person is tricked into moving money themselves, it is nearly impossible to recover. The Bureau estimates that in most cases, banks only return funds in a small fraction of incidents, since customers technically authorize the transfers.

    The Better Business Bureau stresses that unsolicited calls and texts should always be treated with suspicion and that victims should report incidents promptly to help authorities track down offenders.

    While law enforcement and advocacy groups warn of the dangers, the Austin case underscores a pressing reality. For ordinary customers, the greatest frustration may not only be the criminals who carry out the fraud but also the banks that appear unwilling to step in when their clients need protection the most.

     
  • Geebo 8:00 am on August 29, 2025 Permalink | Reply
    Tags: , , impersonation scam,   

    AI Phone Scam Preys on Parental Fear 

    By Greg Collier

    Scammers continue to evolve their tactics, and families in Idaho are now being targeted by a scheme designed to generate panic. Boise Police are alerting the public about phone calls in which fraudsters pretend to be medical professionals, claiming that a child has been injured. The calls often include background noise meant to simulate distress and may use artificial intelligence to enhance the deception.

    Authorities describe this as a variation of the family emergency scam, where criminals exploit parental fears to push victims into quick decisions. These callers may research their targets in advance, sometimes knowing a child’s name or school, which makes the claim appear more convincing. By creating a sense of urgency, they aim to pressure parents into sending money immediately.

    One factor that makes this scam particularly troubling is the role of technology. Criminals are increasingly using artificial intelligence to generate convincing voices, sometimes even imitating the sound of a family member. This capability makes it harder for victims to recognize the deception, especially in moments of panic. The sophistication of these tools allows scammers to bypass many of the traditional warning signs people were once told to look for.

    Investigators emphasize the importance of preparation and awareness as defenses against these manipulations. Families are encouraged to consider strategies such as creating unique identifiers that can verify a caller’s identity. Police also advise that pausing, questioning, and carefully assessing any suspicious call can prevent costly mistakes. The key factor in these scams is fear, and resisting that initial emotional reaction can often be enough to stop the fraud in its tracks.

    Authorities further recommend that anyone targeted by a suspicious call report the incident, even if no money was lost. Contacting local law enforcement and filing a complaint with the Federal Trade Commission provides investigators with valuable information and helps strengthen public awareness of ongoing threats.

    Boise Police are urging parents to remain vigilant and to treat any unexpected phone call about a family emergency with caution. By planning ahead, staying alert to new forms of deception, and reporting attempted fraud, families can reduce their risk of becoming the next victims.

     
  • Geebo 8:00 am on August 28, 2025 Permalink | Reply
    Tags: , impersonation scam, , , , technical support scam   

    FBI: Phantom Hacker Scam Drains Life Savings 

    By Greg Collier

    The FBI’s Internet Crime Complaint Center has issued a warning about a sharp increase in so-called “Phantom Hacker” scams that are targeting older Americans and causing many victims to lose their life savings. This scheme is a more advanced form of the traditional tech support scam, using multiple layers of deception to convince victims they must move their money in order to keep it safe.

    Reports indicate that scammers impersonate customer support representatives, financial institutions, and even U.S. government agencies. Victims are told their accounts have been compromised by foreign hackers and are pressured to transfer money into fraudulent accounts controlled by the scammers. Often, the stolen funds include retirement accounts and long-term savings.

    Between January and June 2023, the FBI’s Internet Crime Complaint Center received more than 19,000 reports related to tech support scams, representing losses of more than $542 million. Nearly half of these victims were over the age of 60, and those cases accounted for two-thirds of the total reported losses. As of August 2023, the amount lost to such scams was already 40 percent higher than the total losses reported in all of 2022.

    The operation of these scams often begins with a fraudulent technical support alert that instructs the victim to call a phone number. Once contact is made, scammers gain remote access to the victim’s computer and pressure them to open financial accounts, pretending to check for fraudulent activity. From there, victims are passed to imposters posing as representatives of banks or government agencies who continue to escalate the deception until the victim transfers funds. Scammers may even use official-looking government documents or letterhead to reinforce the illusion of legitimacy.

    Beyond the financial theft, these scams often exploit social vulnerabilities. Victims are frequently told not to share details with family members or financial institutions, which creates secrecy and isolation. This manipulation makes it harder for others to intervene before the money is lost. At the same time, many of the funds stolen in these cases are routed overseas, placing them beyond the reach of U.S. law enforcement and making recovery nearly impossible. This cross-border nature of the crime underscores why prevention is far more effective than attempting to reclaim stolen assets after the fact.

    The FBI advises the public to remain cautious against unsolicited communications claiming to provide technical support or financial security. Government agencies do not ask citizens to move money to “safe” accounts, nor do they request payments through wire transfers, cryptocurrency, or prepaid cards.

    Anyone who has been targeted by such scams is encouraged to report the incident to the FBI’s Internet Crime Complaint Center at http://www.ic3.gov or contact their local FBI field office. Providing details such as the methods of contact, email addresses, websites, and financial account information involved can help investigators track and combat these operations.

    The FBI stresses that raising awareness is a critical part of preventing further victimization. By recognizing the warning signs and reporting suspicious activity, the public can play a role in reducing the financial harm caused by Phantom Hacker scams.

     
  • Geebo 8:00 am on August 27, 2025 Permalink | Reply
    Tags: , fake law firm, fake lawyer, impersonation scam, , ,   

    Crypto Fraudsters Masquerade as Lawyers 

    By Greg Collier

    The FBI has issued a new reminder warning people who have already fallen victim to scams that they may be targeted again. According to the agency, fraudsters often circle back to previous victims with fresh schemes designed to exploit them further.

    One of the most concerning variations involves scammers posing as representatives of fictitious law firms. These operations present themselves as “crypto recovery law firms,” claiming to work alongside government agencies or international organizations that in reality do not exist. Victims are often told they are listed in official databases of scam victims and are promised that the firm can help them recover stolen cryptocurrency.

    What makes this scheme particularly dangerous is the amount of information the fraudsters may have about past incidents. The scammers sometimes provide exact figures of losses, transaction details, and even the names of entities where money was sent. This can create the illusion of legitimacy, leading victims to believe that the outreach is genuine.

    The con typically progresses to requests for personal information or referrals to supposed foreign banks or attorneys. At that stage, victims are told that fees must be paid to prove ownership of funds before any recovery can be made. In reality, no legitimate government effort to assist scam victims requires such payments.

    This latest reminder also outlines practical ways for people to verify whether contact is genuine. Scam operations may refuse to appear on video, may use falsified legal credentials, or may impersonate real lawyers or law enforcement personnel. These impersonations endanger victims and harm the reputations of legitimate professionals.

    The FBI notes that these “double victimization” scams are particularly cruel because they exploit the emotional distress of people who have already lost money. Many victims are desperate to recover their losses, and that desperation can make them more vulnerable to false promises of restitution. By preying on hope and grief, scammers increase the likelihood that victims will comply with their demands.

    There is also a risk that scammers identify their targets through public disclosures online. People who openly post about their losses on social media may unintentionally expose themselves to renewed targeting. For that reason, it is safer not to share detailed accounts of being scammed in public forums where criminals are actively searching for vulnerable victims.

    Another place where scammers may search for targets is within online support groups for scam victims. While many of these groups exist to help people share experiences and learn from one another, they can be infiltrated by fraudsters posing as fellow victims who recommend illegitimate recovery services. This creates another layer of risk for people already seeking help and highlights the importance of verifying any advice or services offered in these spaces.

    The FBI advises anyone who believes they may have been targeted by these recovery scams to report the attempt to their local field office.

     
  • Geebo 8:00 am on August 26, 2025 Permalink | Reply
    Tags: , free upgrade, impersonation scam, ,   

    The Costly Trap of ‘Free’ Phone Upgrades 

    The Costly Trap of ‘Free’ Phone Upgrades

    By Greg Collier

    What may sound like a generous offer of a free phone upgrade can sometimes be the opening move in a costly scam. A recent case in Atlanta highlights how convincing these schemes can be and how easily consumers can be drawn in when scammers present themselves as representatives of well-known companies.

    The scam begins with a call claiming to come from a customer loyalty department. The target is offered a free upgrade, often involving a phone, smartwatch, or tablet. The caller already has access to some personal details, which creates a false sense of legitimacy. To proceed, the victim is asked to provide a code sent to their device. Handing over this code is what gives the scammer access to the account.

    Once inside, the scammer can order devices, open additional lines, and manipulate shipping instructions to ensure the equipment ends up in their possession. A common tactic is to tell the victim that the wrong item was sent, then request the return of the device using a label connected to the fraudster rather than the company. This cycle may repeat until suspicions grow.

    By the time many consumers discover what has happened, their accounts have already been altered without their consent. Some find themselves responsible for unauthorized lines and unexpected charges. Addressing these issues can be difficult, as companies often interpret the shared code as proof that the customer authorized the changes.

    Telecommunications fraud has become a lucrative sector for scammers because phones are high-value items that are easy to resell. Exploiting upgrade programs allows criminals to divert expensive devices into secondary markets within days. Industry reports estimate that mobile carriers lose billions annually to this type of fraud, losses that can indirectly affect all customers.

    The scam is effective because it exploits a security system designed to protect customers. Verification codes are meant to safeguard accounts, but when scammers convince individuals to read those codes aloud, the entire layer of protection collapses. This allows fraudsters to bypass technical barriers without ever needing to break into company servers or crack encryption systems.

    In this Atlanta case, the company ultimately removed fraudulent lines after being contacted by local media. A statement acknowledged the sophistication of the scam and encouraged consumers to review fraud prevention resources and report suspicious activity immediately.

    Even if a call appears to come from a familiar company, it is best to avoid providing verification codes or personal information to anyone who initiates the contact. Legitimate representatives will not ask customers to share those codes. Letting calls go to voicemail and reaching out directly through official customer service numbers remains one of the most reliable ways to confirm whether an offer is real.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel