Tagged: impersonation scam Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on July 16, 2025 Permalink | Reply
    Tags: , , , impersonation scam,   

    Fake AMBER Alert Kits Are a Scam 

    By Greg Collier

    Authorities in Orlando, Florida, are warning residents about a troubling scam that falsely claims to be associated with the AMBER Alert program. Scammers have been contacting families both by phone and in person, claiming that parents must register their children for an AMBER Alert kit. In reality, no such registration or payment is required for a child to be eligible for an AMBER Alert.

    The genuine AMBER Alert system is a public safety tool activated only when law enforcement confirms that a child has been abducted and specific criteria are met. Once issued, alerts are distributed through a wide-reaching network that includes radio, television, highway signs, mobile phones, and digital platforms. The system is designed to mobilize communities quickly, not to require any kind of pre-registration or participation in a kit program.

    Scammers are preying on parental fears and using this false narrative to gain trust. In some cases, they have been reported as highly persistent and even appear to possess personal information about the families they target. These tactics are not only designed to extract sensitive data but may also be used to gain physical access to people’s homes under false pretenses.

    The underlying goal of these scams is not just theft of personal data for immediate use. Scammers are particularly interested in obtaining children’s personal information because it can be used to open new lines of credit. Since children are unlikely to check their credit reports, fraudulent accounts may remain undetected for years, sometimes only discovered once the child becomes an adult and applies for credit for the first time.

    Residents are urged to stay cautious and not to share any personal information with individuals claiming to offer or sell AMBER Alert kits. Anyone approached in this way should contact local law enforcement to report the incident. Public awareness is one of the most effective tools in shutting down these deceptive and invasive schemes.

     
  • Geebo 8:00 am on July 15, 2025 Permalink | Reply
    Tags: , impersonation scam, ,   

    Gold Bar Scam Is Still a Risk 

    By Greg Collier

    Although reports of the gold bar scam have become less frequent in recent months, this does not mean the scam has vanished. On the contrary, these types of schemes continue to claim new victims across the country, often targeting older adults and those unfamiliar with the tactics scammers use to manipulate their targets.

    A recent case out of Lancaster County, Pennsylvania, highlights the ongoing danger. A man from New York allegedly stole over half a million dollars in gold bars from a local resident after convincing the victim their finances were under threat. The scam began with remote access to the victim’s computer, followed by claims that their bank accounts were at risk. The scammers pressured the victim to convert their savings into gold and then hand it over to individuals posing as federal employees. The gold, of course, was never protected; it was stolen.

    The reason gold remains a key element in these schemes is simple. Gold is valuable, portable, and difficult to trace once in the hands of a criminal. It can be melted down, sold overseas, or moved through shadowy markets without leaving a digital footprint. For scammers, gold offers an attractive alternative to traditional wire fraud and digital theft.

    Despite law enforcement efforts and public warnings, scammers continue to use fear and urgency to push victims into making hasty financial decisions. These schemes often involve impersonating trusted institutions, such as government agencies or financial services. The underlying message is always the same. Your money is in danger, and the only way to save it is to move it, typically into a form that the scammers can easily steal.

    Anyone who tells you to “move” your money for safekeeping, especially into gold, is not trying to protect you. They are trying to steal from you. No legitimate agency or institution will ever ask you to buy gold, withdraw large sums of cash, or hand over your assets to a stranger who shows up at your door.

    The key to avoiding these scams lies in staying calm, verifying information through official channels, and never acting on financial instructions from unsolicited calls or messages. The gold bar scam may not dominate the headlines like it once did, but it remains a very real and evolving threat.

     
  • Geebo 12:02 pm on July 11, 2025 Permalink | Reply
    Tags: , , , , impersonation scam, , ,   

    Scammers Target Texas Flood Victims 

    By Greg Collier

    The recent floods in Central Texas have left behind a trail of destruction and heartbreak. With more than 100 lives lost, including several children at a summer camp, communities are now faced with the long and difficult road to recovery. As families grieve and begin rebuilding, authorities are urging residents to be vigilant against opportunistic scams that often follow in the wake of natural disasters.

    One major concern involves individuals posing as contractors offering to repair flood-damaged homes. These scammers frequently approach victims by phone, email, mail, or even door-to-door. They may demand payment upfront and then disappear without completing any work. Others may perform substandard repairs or use unlicensed labor, leaving homeowners in worse shape than before. Officials have also warned that during a disaster declaration, price gouging laws are in effect, and vendors are not permitted to charge excessive prices for basic goods and services.

    Another area of concern involves fraud related to FEMA. While the agency’s current role in disaster relief may be subject to change, fraudsters have historically used its name to gain access to victims’ personal information. Scammers may call, email, or visit flood victims pretending to be FEMA officials. They often ask for Social Security numbers, banking details, or other sensitive information under the guise of offering aid. It is important to remember that filing a FEMA claim is always free. Anyone who asks for payment to file or expedite a FEMA application is not legitimate.

    Charity scams are also a growing threat. After any disaster, fraudulent organizations often emerge, claiming to raise money for relief efforts. These fake charities may use emotional appeals and professional-looking websites to appear legitimate. In some cases, scammers have targeted the families of victims directly, falsely claiming to have information about missing loved ones in order to extort money. Others may solicit donations through crowdfunding platforms without any real connection to those affected by the disaster.

    Authorities have emphasized the importance of verifying the legitimacy of any organization before donating. If a group is not a registered nonprofit with tax-exempt status, donations may not be deductible and could ultimately end up in the hands of bad actors. Consumers are advised to rely on well-established resources such as the Better Business Bureau, GuideStar, and Charity Navigator to confirm whether an organization is a recognized nonprofit. These platforms provide public records, ratings, and financial details to help donors make informed decisions.

    In a time of widespread loss, generosity can make a meaningful difference. But staying informed and cautious can help ensure that support reaches those who truly need it and prevents further harm in the aftermath of an already devastating event.

     
  • Geebo 8:00 am on June 19, 2025 Permalink | Reply
    Tags: , , impersonation scam, ,   

    Scammers Clone Celebrity Voices 

    Scammers Clone Celebrity Voices

    By Greg Collier

    A growing number of scams now involve the use of artificial intelligence to impersonate well-known individuals, including local news personalities and potentially even national celebrities. A recent example in Cincinnati highlights the sophistication of these tactics, as scammers used AI-generated audio to mimic the voice of a local TV meteorologist.

    The scheme involves the creation of fake social media accounts, complete with copied profile photos and fabricated usernames that closely resemble legitimate ones. These impersonators send friend requests to unsuspecting individuals and later initiate private conversations in which they use voice messages to convince the target of their identity. The scammers then ask for large sums of money, exploiting the trust built through this artificial familiarity.

    What makes this scam particularly effective is the use of AI voice cloning. With only a few seconds of publicly available audio, such as from a news broadcast or social media post, malicious actors can create a nearly perfect replica of a person’s voice. This technology is readily accessible through free or inexpensive software tools available online.

    While this incident involved a local media figure, the same approach can be used to mimic actors, musicians, and other public figures. It can also extend to impersonations of family members, as seen in other frauds where a cloned voice is used to trick victims into believing a loved one is in distress.

    Social media companies and cybersecurity experts continue to warn the public about these emerging threats. Verifying the legitimacy of messages or profiles, particularly when they involve requests for money, is critical. Fake accounts often use slight misspellings, have minimal engagement, or were created recently. In many cases, a quick search can reveal the existence of the real account, helping to identify the fraudulent one.

    The rise of AI-powered impersonation poses significant challenges to online safety. It underscores the importance of skepticism, especially when requests come through unofficial or unexpected channels. Awareness and caution remain the first lines of defense against this evolving form of digital deception.

     
  • Geebo 8:00 am on June 16, 2025 Permalink | Reply
    Tags: , impersonation scam,   

    Scammers Target Families in Mourning 

    A deeply troubling scam has emerged in Georgetown County, South Carolina, where criminals are preying on grieving families by impersonating funeral home staff. This fraudulent scheme involves callers contacting individuals who have recently lost a loved one, demanding immediate payment for fabricated funeral expenses. Law enforcement officials are now warning the public about the scam’s growing presence.

    The scheme is designed to exploit people in a moment of emotional vulnerability. Scammers are reportedly calling family members of the deceased, claiming to be from local funeral homes, and insisting that a payment is overdue. The calls often come shortly after a death has occurred, when families are still in shock and final arrangements are fresh in their minds. The scammers typically urge the victim to pay over the phone using a credit or debit card, often with aggressive or time-sensitive language.

    Authorities have confirmed that several families in the area have already fallen victim to the ruse. In some cases, victims had already paid for funeral services in full, but the emotional toll of grief and confusion left them susceptible to the convincing and urgent-sounding phone calls. Legitimate funeral homes in the area are reporting that they have never seen anything like this before and are now working with law enforcement to alert the public.

    To avoid falling victim to this type of scam, it is important to remain cautious when receiving unexpected calls involving money, especially during times of personal loss. Funeral homes do not typically demand payment over the phone without prior documentation or a formal billing process. If a call feels suspicious, individuals are advised to hang up and contact the funeral home directly using a verified number. Any payment concerns should be addressed in person or through official, traceable communication channels.

    Criminals will exploit any opportunity, even the death of a loved one. Families are urged to remain cautious and report any suspicious activity to their local authorities. Taking a moment to verify a claim could be the difference between protecting one’s financial security and falling victim to a cruel and calculated deception.

     
  • Geebo 8:00 am on June 10, 2025 Permalink | Reply
    Tags: , , impersonation scam,   

    Scam Exploits Grant Program Promises 

    By Greg Collier

    A scam reported in Greenville, South Carolina, is drawing attention for its use of fake Community Development Block Grant offers to steal money from unsuspecting victims. The scam appears to rely on impersonation through social media and persuasive tactics that exploit the trust people place in government programs and familiar online contacts.

    The fraud begins when a scammer contacts a potential victim on a platform like Instagram while pretending to be an old friend or acquaintance. The impersonator shares what appears to be good news about a government grant program offering large amounts of money to individuals over the age of 50. They claim the funds do not need to be repaid and suggest reaching out to a so-called grant agent. Once contact is made, the victim is told they qualify for an unusually high payout but must first pay a fee for validation or delivery, typically using Apple gift cards.

    After initial compliance, the scammers escalate the deception by introducing further obstacles, such as fake delivery arrangements and fabricated tax debts. Each new demand involves more money and continues until the victim becomes suspicious or runs out of resources. In this case, the scam led to a financial loss of $1,200 before the victim realized the truth and reported it to law enforcement.

    Officials from the South Carolina Department of Commerce, which oversees legitimate Community Development Block Grant funding in the state, have made clear that no individual is required to pay money upfront to receive such assistance. Legitimate grant programs do not involve personal agents, third-party couriers, or gift card transactions.

    Though this scam was reported in South Carolina, the tactics used are not limited by geography. Similar schemes have surfaced in other states, often adapting to target local programs and demographics. Social media continues to be a key tool for these scams, as impersonation of friends and family members makes it easier to build trust quickly.

    To avoid falling for such scams, it is important to verify any claims of government assistance directly through official websites or agencies. If contacted by someone promising large sums of money in exchange for fees or gift cards, stop and investigate before responding. Confirm identities independently and never rely solely on social media messages for verification. Reporting suspicious activity to local authorities and consumer protection agencies can help prevent others from falling victim to the same scheme.

    As these scams evolve and become more sophisticated, public awareness and skepticism remain the strongest defenses against financial exploitation.

     
  • Geebo 8:00 am on May 29, 2025 Permalink | Reply
    Tags: , impersonation scam, , ,   

    Fake DMV Texts Are the New Nationwide Scam 

    By Greg Collier

    A new phishing scam is spreading across the country, targeting drivers with fraudulent text messages that appear to come from official motor vehicle departments. These messages claim the recipient has unpaid traffic fines and threaten license suspension or other penalties unless immediate action is taken. In reality, these texts are not from any legitimate agency and are designed to steal personal and financial information.

    In Georgia, the messages reference a nonexistent Department of Motor Vehicles and warn about suspended driving privileges unless payment is made. Officials in that state have clarified that there is no state DMV and that real agencies, like the Department of Driver Services, do not use text messages for these purposes.

    In Illinois, the scam texts include specific legal codes, threatening prosecution and credit score damage. The messages cite fake administrative laws and demand payment through a fraudulent link. State officials have warned that such texts are not a legitimate form of communication for any action involving traffic violations or license status.

    Louisiana drivers have received similar texts claiming they owe fines. The state’s Office of Motor Vehicles confirmed these messages are not legitimate and has issued warnings advising residents not to click on any links. Officials say these scams are part of a broader phishing campaign that could also lead to malware infections or identity theft.

    This wave of fake DMV text messages appears to be the latest version of the toll scam texts that circulated widely earlier this year. In those cases, scammers pretended to represent toll agencies and used a similar strategy of creating urgency to push recipients into making fake payments. The transition to impersonating motor vehicle departments suggests that scammers are adapting their tactics to stay ahead of public awareness.

    These scams exploit common anxieties about driving privileges, legal consequences, and unpaid fines. By mimicking the language and tone of government agencies, the messages aim to pressure individuals into quick action before they have time to verify the source. In each case, the fraudulent messages include links to sites that harvest sensitive data or install harmful software.

    As this scam continues to appear in multiple states, it highlights the importance of being cautious with any unsolicited message, especially those requesting immediate payment or personal information. Motor vehicle agencies generally communicate through secure channels and do not use text messages to issue threats or collect fines. Drivers are encouraged to verify any suspicious message by contacting their local agency directly.

     
  • Geebo 8:00 am on May 28, 2025 Permalink | Reply
    Tags: impersonation scam, , , ,   

    Scammers Are Sliding Into LinkedIn 

    LinkedIn is often considered one of the safer corners of social media, a place where professionals share career milestones, expand their networks, and connect with future colleagues. But even platforms aimed at career growth are not immune to deception. As one recent incident illustrates, scammers are watching just as closely as potential employers.

    A newly hired employee at a North Carolina television station had shared a standard career update on LinkedIn to mark the beginning of a new role. It was a common post, the kind many professionals make to celebrate career changes. But shortly after connecting with colleagues, the employee received a suspicious text message. The sender claimed to be a manager at the new job, asking if she was available. The message came from an unfamiliar number. Rather than responding right away, she verified the sender through official work channels. That quick check confirmed her instincts that the message was a scam.

    This incident is part of a broader trend of social engineering schemes that target people through LinkedIn and similar platforms. Security experts have long warned that scammers often impersonate employers, recruiters, or co-workers. While some of these messages are after money or personal information, others aim to pull unsuspecting users into criminal activity without their knowledge. Fake job offers, especially ones promising remote work for easy pay, can sometimes serve as fronts for money laundering operations. Scammers may ask victims to transfer funds, purchase gift cards, or engage in other seemingly legitimate tasks, all designed to disguise the origin of illicit gains.

    The growing capabilities of artificial intelligence and deepfake technology are only making these scams harder to detect. Fraudsters can now use fabricated audio and video content to mimic real people and sound convincingly professional. As technology advances, even savvy internet users may struggle to identify what is real and what has been manipulated.

    It’s important to remember that even platforms built for professional engagement are not immune from manipulation. LinkedIn’s focus on career development can create a false sense of security, but scammers thrive in these environments because they know people often let their guard down. Users should be cautious about what they share publicly and consider reviewing their privacy settings. Reducing the visibility of personal details can be one way to limit exposure.

    There are also tools available to help manage your digital footprint. Some online services allow users to request the removal of personally identifiable information from search results. Taking advantage of these features may reduce the risk of being targeted.

    If anything seems off, whether it’s a job offer that feels too good to be true or a message from someone you don’t recognize, verify through a trusted channel before engaging. In today’s digital landscape, vigilance remains one of the most reliable defenses.

     
  • Geebo 8:00 am on May 16, 2025 Permalink | Reply
    Tags: , impersonation scam, ,   

    Fake Process Servers Exploit Legal Fears 

    Fake Process Servers Exploit Legal Fears

    By Greg Collier

    A process server has a simple but important job. Their role is to deliver legal documents, such as court summonses or subpoenas, to individuals involved in a legal proceeding. This delivery must follow legal procedures to ensure the recipient is properly notified. Real process servers do not make threats, demand personal information, or call ahead with demands.

    The Better Business Bureau has issued a warning about a growing scam involving fake process servers. Scammers are contacting people by phone and falsely claiming to be process servers attempting to deliver legal papers. In many cases, the callers allege there is a lien against the victim’s home or that legal action is being taken for unpaid medical bills. The intent is to create panic, pushing the person to give up sensitive information.

    In some instances, these callers go beyond the initial target. They may contact relatives or friends, claiming those individuals could face consequences if they do not help reach the original target. These tactics are designed to amplify fear and force quick action. However, no actual legal documents are involved. The goal is identity theft or financial fraud.

    There are ways to identify a real process server from a scammer. A legitimate process server does not ask for Social Security numbers or banking information. They typically do not call ahead with warnings, nor do they try to verify private details over the phone. Most importantly, they serve papers in person and do not threaten arrest for noncompliance. Anyone concerned about potential lawsuits or liens can search court records directly through official court websites.

    Recognizing these signs can help prevent falling victim to this scam. As with many forms of fraud, the key is to stay calm, verify independently, and never give away personal information under pressure.

     
  • Geebo 8:00 am on May 8, 2025 Permalink | Reply
    Tags: , , impersonation scam, , ,   

    Google Spoof Scam Exposes Flaws 

    By Greg Collier

    Phishing has evolved far beyond clumsy scams riddled with typos and generic threats. It now wears the mask of legitimacy, often cloaked in branding and technical language convincing enough to fool even savvy users. A recent example of this growing trend involves an especially deceptive attack using Google’s own infrastructure as a weapon.

    Cybercriminals have been exploiting Google Sites and other services to distribute phishing emails that appear to originate from Google’s own domain. In this case, a message disguised as a legal request from law enforcement was sent to users, complete with references to subpoenas and the need to review case materials. The message urged the recipient to click on a link to a Google support page, which in reality led to a page designed to harvest login credentials.

    The trap is insidious. The phishing page is hosted on a subdomain of Google.com, lending a false sense of trust to unsuspecting users. Because the site is built with Google Sites, it carries the appearance of a legitimate Google interface. The attackers further muddy the waters by ensuring the phishing email lands in the same thread as previous legitimate security alerts, increasing the likelihood that users will trust it.

    The deeper issue lies in how Google has allowed this vulnerability to persist. The legacy version of Google Sites, still accessible today, permits anyone to publish content on a Google.com subdomain. This opens the door to abuses like malicious scripts and fake credential portals. Google has been warned about this gap in security, yet the core issues remain unresolved. While some reactive measures have been taken, the architecture still leaves room for repeat abuse.

    This raises a broader concern about corporate responsibility in digital security. Google has positioned itself as a cornerstone of online identity and infrastructure, and with that status comes the obligation to protect its users proactively. Allowing these phishing schemes to exploit the trust associated with the Google name creates not just a security risk, but an erosion of that trust.

    Google’s statement suggests users enable two-factor authentication and passkeys as a defense. While this is sound advice, it shifts the burden onto individuals to compensate for shortcomings in the platform’s safeguards. The more sustainable solution would be for Google to close the loopholes that allow bad actors to operate under its umbrella in the first place.

    As phishing continues to mimic trusted entities more convincingly, users must remain cautious. But the companies whose tools are being weaponized also bear responsibility. Until tech giants like Google take these exploits seriously and move swiftly to harden their platforms, the digital wolves will keep getting in, dressed in ever more convincing sheep’s clothing.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel