Tagged: Scams Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:00 am on December 24, 2025 Permalink | Reply
    Tags: , , , patient brokering, Scams   

    Why “Free” Rehab Should Raise Red Flags 

    By Greg Collier

    Even if you have never been to Philadelphia, you may have heard of Kensington, a neighborhood that has become nationally known for its visible and deeply entrenched drug crisis. Images and reports from the area have circulated widely in recent years, often used to illustrate the severity of the opioid epidemic in the United States.

    According to a recent investigation by the Philadelphia Inquirer, Kensington has also become a target for a troubling scheme tied to the addiction treatment industry. Recruiters have allegedly approached people struggling with substance abuse and offered what sounded like a lifeline: free travel, free housing, and free treatment at out-of-state rehabilitation facilities. The offers are framed as an opportunity for a fresh start, far from the environment where addiction took hold.

    However, the investigation found that these promises often did not match reality. Individuals were reportedly flown across the country, enrolled in private health insurance plans they did not fully understand, and placed into treatment settings that failed to deliver the level of medical care they expected. Critics described the practice as a form of patient brokering, in which people seeking help are treated as financial assets rather than patients in need of care.

    As disturbing as this situation is, it is not unique to Philadelphia. Similar allegations involving addiction treatment recruitment, insurance manipulation, and misleading promises have been reported in multiple states. Federal prosecutions and state investigations have shown that these practices can surface anywhere vulnerable people intersect with loosely regulated parts of the healthcare system.

    Substance abuse is among the most devastating challenges a person or family can face. It affects physical health, mental health, finances, and relationships, often all at once. Families watching a loved one struggle are frequently desperate for solutions, and people experiencing addiction themselves may be willing to accept almost any offer that sounds like help. No one in that position deserves to be exploited or misled.

    Protecting Yourself and Your Loved Ones

    While not every treatment referral is a scam, there are steps people can take to reduce the risk of being taken advantage of:

    Be cautious of “too good to be true” offers
    Promises of free luxury treatment, immediate placement, airfare, and housing with no clear explanation of funding should raise concerns.

    Ask who is paying and how
    Legitimate treatment providers should be transparent about costs, insurance coverage, and who is responsible for premiums and medical bills.

    Verify facilities independently
    Before agreeing to treatment, try to confirm a facility’s licensing status, medical staffing, and complaint history through state health departments or trusted healthcare professionals.

    Avoid pressure tactics
    Urgent deadlines, repeated calls, or discouragement from asking questions are common red flags in healthcare-related scams.

    Seek local, trusted guidance
    Local hospitals, nonprofit treatment referral services, or established recovery organizations can often provide safer, more reliable pathways to care.

    Involve a trusted third party
    When possible, have a family member, social worker, or healthcare advocate review paperwork and insurance enrollment before anything is signed.

    Final Thoughts

    The addiction crisis has created enormous demand for treatment, and where there is demand, there is potential for abuse. Investigations like this one highlight the need for stronger oversight, better enforcement, and greater public awareness. Most importantly, they serve as a reminder that people seeking recovery are patients first and not opportunities to be exploited.

     
  • Geebo 9:00 am on December 23, 2025 Permalink | Reply
    Tags: , , , , Scams,   

    AI-Generated “IRS” Phone Calls Are Back and Smarter Than Ever 

    By Greg Collier

    Scammers are once again exploiting fear around taxes, but this time they’re using artificial intelligence to sound more convincing than ever.

    A recent consumer report describes a new wave of AI-generated phone calls impersonating tax officials, designed to scare people into handing over sensitive personal information.

    This is not a robocall problem. It’s a credibility problem.

    What’s Going On

    One example of the scam involves a voicemail that begins:

    “Hello, this is George from the tax resolution unit…”

    The caller claims the recipient’s tax file has been flagged due to either an unpaid balance or missing returns following the 2025 extension deadline, then urges the recipient to press one to speak with a “tax officer.”

    Nothing about this call is legitimate.

    Scam Breakdown

    This scam relies on three core tactics:

    Authority by implication
    The caller strongly implies a connection to the Internal Revenue Service without ever explicitly stating it. This is deliberate. It creates fear while avoiding clear claims that could be easily disproven.

    Fear and urgency
    Phrases like “flagged file,” “missing returns,” and “deadline” are carefully chosen to provoke panic and push recipients into acting before thinking.

    AI voice generation
    The call is likely created or enhanced using AI, allowing scammers to produce natural-sounding voices at scale and deploy the same message nationwide with minimal effort.

    This identical message has been reported by consumers across the country to the Better Business Bureau Scam Tracker.

    Red Flags

    Several warning signs stand out immediately:

    • The caller never addresses the recipient by name
    • A nonexistent “tax resolution unit” is referenced
    • The caller never explicitly claims to be from the IRS
    • Immediate action is demanded through keypad prompts
    • Consequences or refunds are implied without documentation

    Most importantly:

    The IRS does not contact individuals by phone about missing returns, balances, or refunds. Initial contact is always made by official mail.

    Why This Scam Works

    AI has lowered the barrier for impersonation.

    Scammers no longer need obvious robocalls or poorly written scripts. AI-generated voices can sound calm, professional, and authoritative—exactly what people expect from a government agency.

    Once someone responds, the goal is simple: obtain Social Security numbers, banking details, or direct payments under the threat of legal action or the promise of a refund that does not exist.

    What to Do If You Receive This Call

    • Do not press any buttons
    • Hang up immediately
    • Do not return the call
    • Report the incident to consumer protection agencies and the IRS impersonation reporting page

    If you are genuinely concerned about your tax status, check your account directly through official IRS channels or consult a licensed tax professional. Never rely on a phone number left in a voicemail.

    Final Thoughts

    AI has not just made scams more efficient; it has made them more believable.

    If a tax-related call:

    • Comes out of the blue
    • Creates urgency
    • Demands immediate action

    It is almost certainly a scam.

    The IRS does not operate this way. Scammers do.

    Further Reading

     
  • Geebo 9:00 am on December 22, 2025 Permalink | Reply
    Tags: , , , , Scams   

    This Holiday “Good Cause” Might Be a Credit Card Test Scam 

    By Greg Collier

    With so many purchases flying by during the holiday season, it’s easy to overlook a small charge here or there on your credit card statement, especially if it looks like a donation.

    That’s exactly what scammers are counting on.

    If you spot a charity charge you don’t remember authorizing, it may not be holiday generosity you forgot about. It may be a credit card testing scam, and the small charge is just the beginning.

    What’s Going On

    During December, nearly 30% of all charitable giving takes place. Between gifts, travel, and end-of-year expenses, most people aren’t scrutinizing every $2–$20 charge.

    Scammers know this.

    Instead of immediately draining an account, they often start small, quietly checking whether stolen credit card numbers still work before going bigger.

    How the Scam Works

    Here’s the typical pattern:

    1. Your credit card information is stolen
      • Through a data breach
      • A sketchy online purchase
      • A phishing scam
      • Or malware on a device
    2. Scammers “test” the card
      • They make small donations—often just a few dollars
      • Charity sites are ideal because tiny donations are common and rarely questioned
    3. The charge goes through
      • This confirms the card is active
      • The scammer now knows the number is usable
    4. Larger fraud follows
      • Big purchases
      • Cash advances
      • Or repeated unauthorized charges

    By the time you notice, hundreds—or thousands—of dollars may already be gone.

    Real-World Examples

    One report described a person approached by two men claiming to raise money for a child needing medical care. The donor was told they’d be charged $20.

    The actual charge? $2,400.

    Another victim reported that after shopping on a questionable discount site, their debit card was hit with a string of fraudulent charges:

    • $2
    • $12
    • $29
    • $67—listed as a “charity” charge

    Those early charges were the warning signs. The final one confirmed the card was still valid.

    Why This Scam Is Easy to Miss

    • Charges are small
    • The description looks legitimate
    • It happens during the busiest spending month of the year
    • People assume it’s a donation they forgot making

    By the time the fraud is obvious, the damage is already done.

    Red Flags

    • Charity charges you don’t recognize
    • Multiple small charges in a short period
    • Donations made after shopping on unfamiliar websites
    • Requests for payment via:
      • Gift cards
      • Wire transfers
      • Peer-to-peer apps
    • Pressure to “donate now” without verification

    If something feels off, it probably is.

    How to Protect Yourself

    Check your statements regularly
    Don’t wait until the end of the month. Scan your charges frequently, especially in December.

    Report suspicious charges immediately
    Contact your card issuer’s fraud department right away. Waiting only helps the scammer.

    Replace compromised cards
    Once fraud is suspected:

    • Cancel the card
    • Get a new number
    • Change your PIN

    Be cautious online

    • Avoid suspicious discount sites
    • Don’t click donation links from unsolicited messages
    • Keep devices updated with anti-malware software
    • Look for secure sites (https and lock icon—but remember, those alone aren’t guarantees)

    Use credit cards, not debit cards
    Credit cards generally offer stronger fraud protections and faster recovery for unauthorized charges.

    Final Thoughts

    That “tiny donation” you don’t remember making may not be kindness—it may be a test run.

    Scammers rely on distraction, goodwill, and holiday chaos to slip under the radar. A few dollars today can turn into a financial headache tomorrow.

    This season, generosity is good—but vigilance is better.

    Further Reading

     
  • Geebo 9:00 am on December 19, 2025 Permalink | Reply
    Tags: , , , , Scams,   

    How Scammers Are Using AI “Proof of Life” to Extort Families 

    AI Voice Fuels Virtual Kidnap Plot

    By Greg Collier

    This is not the old “your loved one has been kidnapped” scam.

    Federal authorities are warning about a new evolution of virtual kidnapping, one that uses altered photos, manipulated videos, and AI-assisted media pulled straight from social media to create convincing “proof of life” and trigger immediate panic.

    According to the FBI, criminals are now fabricating images and videos that make it appear as though a family member or friend has been abducted, injured, or being held hostage—complete with urgent ransom demands and threats of violence.

    And unlike earlier versions of the scam, this one doesn’t rely on imagination alone. It relies on visual evidence.

    What’s New About This Scam

    Traditional virtual kidnapping scams depended on fear, confusion, and vague threats. The victim was pressured to act quickly before thinking things through.

    This new version adds something far more dangerous: manufactured realism.

    Scammers now:

    • Pull photos and videos from social media profiles
    • Alter them using AI tools or digital manipulation
    • Send them as “proof of life” during ransom demands
    • Use timed or disappearing messages to limit scrutiny

    The result is a moment where logic collapses under shock. Victims aren’t just told their loved one is in danger; they’re shown what looks like evidence.

    How the Scam Typically Unfolds

    The FBI says the pattern is disturbingly consistent:

    A text message arrives claiming a loved one has been kidnapped. The message demands immediate payment for their release. Violence is threatened if the victim delays or contacts authorities.

    Then comes the hook.

    The scammer sends a photo or video that appears to show the kidnapped person. In many cases, it looks real enough to override rational doubt, at least at first glance.

    Only later, if the victim has time to examine it closely, do the cracks appear.

    The Red Flags Inside the “Proof”

    According to federal investigators, the fabricated media often contains subtle but important errors, including:

    • Missing or incorrect tattoos
    • Absent scars or identifying marks
    • Incorrect body proportions
    • Inconsistencies with known photos
    • Visual details that don’t quite line up

    Scammers frequently counter this by using timed messages, giving victims only seconds to view the image before it disappears—just long enough to scare, not long enough to analyze.

    Why This Scam Works So Well

    This scam is effective because it exploits three things at once:

    1. Public social media footprints: Criminals no longer need insider access. Public photos are enough.
    2. AI-assisted manipulation: Creating fake but believable images is faster and cheaper than ever.
    3. Urgency engineering: Fear plus time pressure shuts down critical thinking.

    Once panic sets in, scammers push victims toward immediate payment—often before they attempt the most important step of all.

    Verification.

    How to Protect Yourself and Your Family

    The FBI recommends several concrete steps to reduce risk:

    • Be cautious about what you post publicly, especially travel details and personal identifiers
    • Avoid sharing personal information with strangers while traveling
    • Establish a family code word that only trusted loved ones would know
    • Be wary of urgent threats designed to rush your decision-making
    • Screenshot or record any images or videos sent as “proof”
    • Always attempt to directly contact the loved one before paying any ransom

    That last step is critical. Many victims discover the truth within minutes—if they pause long enough to check.

    If You’re Targeted

    If you believe you’ve encountered a virtual kidnapping scam, the FBI urges victims to report it to the Internet Crime Complaint Center (IC3). Preserve all messages, images, phone numbers, and payment requests.

    Even if no money was sent, reporting helps investigators track patterns and warn others.

    Final Thoughts

    This isn’t just another scam; it’s a technological escalation.

    Virtual kidnapping is no longer purely psychological. It’s visual. It’s manipulated. And it’s designed to exploit the trust we place in images and video.

    The safest response is not panic, but pause.

    Because in this new version of the scam, what looks real may be anything but.

    Further Reading

     
  • Geebo 9:00 am on December 18, 2025 Permalink | Reply
    Tags: , free wifi, Scams, ,   

    Holiday Travel Warning: The “Evil Twin” Wi-Fi Scam Explained 

    Holiday Travel Warning: The “Evil Twin” Wi-Fi Scam Explained

    By Greg Collier

    As millions of people travel for the holidays, airports, hotels, coffee shops, and convention centers are packed with travelers looking for one thing the moment they sit down: free Wi-Fi.

    That demand creates the perfect opening for a lesser-known but highly effective cyber scam known as the “evil twin” Wi-Fi attack—and travelers are among the most common victims.

    This scam doesn’t rely on fake prizes, urgent phone calls, or phishing emails. Instead, it quietly exploits trust, convenience, and public networks.

    What Is an “Evil Twin” Wi-Fi Network?

    An evil twin is a fake Wi-Fi network that looks legitimate but is actually controlled by a scammer.

    It’s called an “evil twin” because it is designed to closely mimic a real network you already trust.

    Examples include:

    • Airport_Free_WiFi
    • Hotel Guest Network
    • Starbucks_WiFi
    • ConventionCenter_Public

    To a traveler in a hurry, these names look normal, and that’s exactly the point.

    Once connected, the attacker can:

    • Monitor your internet traffic
    • Capture login credentials
    • Intercept emails or messages
    • Redirect you to fake login pages
    • Install malware in some cases

    You don’t need to click a suspicious link. Simply connecting can be enough.

    Why Travelers Are Prime Targets

    Holiday travelers are uniquely vulnerable to this scam for several reasons:

    • Constant movement between unfamiliar locations
    • High reliance on public Wi-Fi to avoid roaming charges
    • Urgency to check flights, reservations, rideshares, or work email
    • Distraction and fatigue, especially during delays

    Airports and hotels are particularly attractive to scammers because:

    • They host large volumes of short-term users
    • People expect multiple similarly named networks
    • Security announcements about Wi-Fi are rare or unclear

    How the Scam Typically Works

    1. A scammer sets up a portable Wi-Fi hotspot using a laptop or small device.
    2. They name it to closely resemble a legitimate network nearby.
    3. The fake network often has a stronger signal, making it appear first on your device.
    4. When you connect, one of two things happens:
      • You are silently monitored while browsing
      • You’re redirected to a fake “sign-in” page asking for email, social media, or even payment details

    In many cases, victims never realize anything went wrong until accounts are compromised later.

    What Information Can Be Stolen?

    Depending on the setup, an evil twin network can expose:

    • Email usernames and passwords
    • Social media logins
    • Online banking credentials
    • Corporate VPN access
    • Travel rewards accounts
    • Session cookies that allow account takeover without a password

    Even encrypted websites (HTTPS) don’t fully protect against every version of this attack, especially if users ignore browser warnings or log into insecure pages.

    Red Flags

    While evil twin networks are designed to look legitimate, warning signs may include:

    • Multiple Wi-Fi networks with nearly identical names
    • A login page that looks generic or unbranded
    • Requests for unnecessary personal information
    • A network that suddenly disconnects and reconnects repeatedly
    • Browser warnings about security certificates

    If anything feels off, disconnect immediately.

    How Travelers Can Protect Themselves

    A few simple precautions can dramatically reduce risk:

    • Avoid public Wi-Fi for sensitive activities like banking or work logins
    • Confirm the exact network name with airport signage or hotel staff
    • Turn off auto-connect for open Wi-Fi networks
    • Use a trusted VPN when connecting on the road
    • Enable two-factor authentication on important accounts
    • Forget networks after use so your device doesn’t reconnect automatically

    When in doubt, using your phone’s cellular hotspot is often safer than unknown public Wi-Fi.

    Final Thoughts

    The evil twin Wi-Fi scam highlights an uncomfortable reality. Not all scams announce themselves.

    Some of the most effective modern fraud relies on blending into everyday infrastructure, airports, hotels, cafés, and other public spaces we assume are safe.

    As travel increases during the holiday season, awareness becomes the most effective defense.

    If you wouldn’t hand your phone unlocked to a stranger in an airport, don’t hand over your internet traffic either.

    Free Wi-Fi is convenient, but when it comes to unknown networks, convenience can be costly.

    Staying connected shouldn’t mean staying exposed.

    Further Reading

     
  • Geebo 9:00 am on December 17, 2025 Permalink | Reply
    Tags: , , , Scams,   

    Scam Alert: Fake “Mega Millions Special Drawing” Impersonation 

    By Greg Collier

    Mega Millions officials are warning players about a new lottery scam in which criminals are impersonating the brand online and promoting a fake “special drawing.” Using the game’s familiar logo, colors, and language, these scams are designed to look legitimate while steering victims toward fraudulent websites, phone numbers, or direct messages.

    The warning underscores a broader pattern of lottery-related fraud in which well-known brands are used to create a false sense of authenticity and urgency.

    What’s Happening

    According to Mega Millions, scammers are circulating online content that claims to offer:

    • Entry into a special or exclusive Mega Millions drawing
    • Notification of a prize win despite the recipient never purchasing a ticket
    • Instructions to “verify” or “claim” winnings through links or phone calls

    The lead director of Mega Millions said these schemes rely on visual familiarity and persuasive language to appear credible. Despite their variations, they all share a common goal: obtaining money or personal information from unsuspecting consumers.

    How the Scam Typically Works

    These impersonation scams often follow a predictable structure:

    1. Use of official branding: Logos and graphics resembling Mega Millions materials are copied to appear authentic.
    2. Unsolicited prize claims or promotions: Targets are told they have won or been selected for a special drawing they did not enter.
    3. Requests for action: Victims are directed to click links, respond to messages, or call phone numbers to confirm details.
    4. Financial or data demands: The scam escalates with requests for fees, taxes, or sensitive personal and banking information.

    Once money or personal data is provided, it is typically unrecoverable.

    Red Flags

    Mega Millions advises consumers to be alert for the following red flags:

    • Claims that you won a lottery you never played
    • Social media posts advertising “special drawings” or surprise promotions
    • Requests to click unfamiliar links or call unknown numbers
    • Instructions to send money in order to collect winnings
    • Messages with poor grammar or spelling
    • Phone calls or texts from unfamiliar or unexpected area codes

    Quick Tip: Legitimate lotteries never require winners to pay to receive a prize.

    How to Protect Yourself

    To reduce the risk of falling victim to lottery scams, Mega Millions recommends:

    • Verifying promotions only through official lottery websites
    • Avoiding links, phone numbers, or messages from unsolicited contacts
    • Never sharing sensitive personal or financial information
    • Hanging up on and blocking suspected scammers

    Consumers who believe they have encountered a scam may contact the Federal Trade Commission at (877) 382-4357 or report the incident to local law enforcement.

    Final Thoughts

    If you did not purchase a ticket or enter a drawing, there is no legitimate prize to claim. Authentic lotteries do not operate through unsolicited messages, social media direct outreach, or upfront payment requests.

    Scams that misuse trusted brands rely on familiarity to lower skepticism. Staying cautious, verifying information through official sources, and refusing unsolicited requests are the most effective ways to protect yourself and others from lottery fraud.

    Further Reading

     
  • Geebo 9:00 am on December 16, 2025 Permalink | Reply
    Tags: , contactless payment, , ghost tapping, Scams   

    “Ghost Tapping” Scams: How Tap-to-Pay Can Turn Into Tap-to-Steal 

    By Greg Collier

    Tap-to-pay cards and mobile wallets are everywhere now. They’re fast, convenient, and generally secure.

    But scammers are finding ways to abuse that convenience, and the Better Business Bureau is now warning about a growing scam they call “ghost tapping.”

    This isn’t a hack. It’s a confidence trick that relies on distraction, social pressure, and people assuming tap-to-pay is always safe.

    What’s Going On

    According to the BBB, scammers are targeting people who use tap-to-pay cards or mobile wallets in crowded or distracting environments.

    The idea is simple. Scammers get you to tap quickly without clearly seeing the amount and walk away with far more money than you expected to pay.

    Several victims have already reported losing hundreds or even thousands of dollars.

    How the “Ghost Tapping” Scam Works

    Scammers typically rely on social engineering, not technology.

    Common tactics include:

    • Getting physically close in public places
    • Pretending to be a legitimate vendor
    • Running fake charity or fundraising pitches
    • Rushing the transaction so you don’t stop to think

    One reported case involved a man going door-to-door selling chocolate, claiming the money supported special-needs students. He told residents he could only accept tap-to-pay.

    Once the victim tapped their card or phone, the scammer allegedly charged large amounts without clearly showing the total.

    Reported losses included:

    • One woman’s mother losing $537.
    • Another victim lost $1,100.

    By the time the charge was noticed, the scammer was long gone.

    Why This Works

    Tap-to-pay trains people to move fast.

    Scammers exploit that by:

    • Creating urgency
    • Avoiding receipts
    • Keeping screens angled away
    • Using emotional hooks like charity appeals
    • Operating where people are distracted (festivals, markets, busy sidewalks)

    The technology isn’t broken, but human attention is.

    Red Flags

    The BBB says you should be suspicious if:

    • You’re asked to tap without seeing the total
    • No receipt is offered
    • The seller insists on tap-to-pay only
    • You receive small “test” charges on your account
    • You notice strange charges after being in crowded areas

    If someone won’t slow down or show you the amount clearly, that’s your cue to stop.

    How to Protect Yourself

    The BBB recommends several practical steps:

    • Use an RFID-blocking wallet or sleeve
    • Always confirm the payment amount before tapping
    • Set up transaction alerts with your bank
    • Regularly review your statements
    • Limit tap-to-pay use in high-risk or crowded areas

    Convenience should never override verification.

    What to Do If You’re a Victim

    If you think you’ve been hit by a ghost-tapping scam:

    1. Contact your bank or card issuer immediately
    2. Freeze or cancel the affected card
    3. Dispute the charges
    4. Report the scam to the BBB’s Scam Tracker

    The faster you act, the better your chances of limiting the damage.

    Final Thoughts

    Tap-to-pay is generally safe, but it’s not magic.

    Scammers don’t need to break encryption if they can rush you, distract you, or manipulate your trust.

    If you didn’t clearly see the amount, didn’t get a receipt, or felt pressured to tap quickly, assume the worst and check your account immediately.

    When it comes to tap-to-pay, slow beats stolen.

    Further Reading

     
  • Geebo 9:00 am on December 15, 2025 Permalink | Reply
    Tags: , Scams, , ,   

    When “Hollywood” Texts You Out of Nowhere 

    By Greg Collier

    You’re minding your business, and your phone buzzes.

    “Hey! I’m a talent scout. Are you available tomorrow for a virtual open call for Ted Lasso?”

    And for half a second, your brain does the whole wait… is this my moment?

    That’s the hook.

    According to an FTC consumer alert, this “virtual casting call” text is showing up as a new-ish phishing/sales-scam hybrid: unsolicited message → fake audition → pressure tactics → you paying money or handing over bank info.

    What’s going on

    The script is pretty consistent:

    1. You get an unexpected text from a supposed “talent scout” or casting person, often name-dropping big, recognizable titles (the FTC uses examples like “The Devil Wears Prada 2” and “Ted Lasso”).
    2. They ask if you’re available immediately (“tomorrow” is a favorite) for a “virtual open call” you never signed up for.
    3. If you respond, you wind up in a video “audition” that’s actually a sales pitch for junk: overpriced/bogus headshots, fake acting classes, “portfolio packages,” etc.
    4. The “plot twist” is always the same: you must pay something first or provide bank/payment information “to secure your spot.”

    Red flags

    If you see any of these, treat it like you just spotted the boom mic in frame:

    • Unsolicited contact (especially a text) offering a “casting call” you didn’t pursue.
    • Artificial urgency: “tomorrow,” “last chance,” “limited slots,” “secure your spot.”
    • Money before anything else: fees for headshots, “test shoots,” registration, background checks, “membership,” or “booking deposits.”
    • Bank info talk early: anything nudging you toward routing/account numbers, debit card details, or payment links before there’s a legitimate agreement.
    • A “virtual audition” that turns into sales pressure, not casting.

    How to protect yourself

    • Don’t respond. Not “stop,” not “who is this,” not anything. Engagement tells them your number is live.
    • Research the names. Search the “casting call” or the “casting director” name plus words like scam / review / complaint.
    • Never pay to get paid. Legitimate agencies get paid from the work—after the client pays—rather than charging you to “unlock” a job.
    • Report the text. Forward suspicious texts to 7726 (SPAM) or use your phone’s “report junk” feature, then delete it.
    • Report it to the FTC at ReportFraud.ftc.gov

    Quick Tip: If a legitimate opportunity shows up, it can survive verification. A real casting process won’t collapse because you asked for a real company email, a verifiable listing, or time to confirm details. A scam can’t survive daylight. That’s why it lives in surprise texts, urgency, and payment demands.

    Final Thoughts

    If “Hollywood” finds you via a random text and wants money or bank info before you can even “audition,” you’re not being discovered.

    You’re being harvested.

    Further Reading

     
  • Geebo 9:00 am on December 12, 2025 Permalink | Reply
    Tags: , , , , Scams   

    The Gift Card Drain Scam: How Thieves Empty Holiday Balances Before You Even Use Them 

    The Gift Card Drain Scam: How Thieves Empty Holiday Balances Before You Even Use Them

    By Greg Collier

    It’s December, which means two things are guaranteed:
    (1) America is collectively stress-shopping.
    (2) Scammers are licking their chops because nothing moves faster than a holiday gift card.

    This year’s big scam making the rounds? Gift card draining, a fraud so simple and so widespread that major retailers are quietly scrambling behind the scenes. And yes, your unopened card is at risk before you even wrap it.

    Below we’ll discuss how the scam works, what the red flags look like, and how to avoid being the unlucky person giving someone a $0 stocking stuffer.

    What’s Going On

    Criminals are draining the balances of gift cards before the legitimate buyer even activates them.

    They do it by physically tampering with cards on the rack, copying the numbers, resealing the packaging, and then waiting for you to pick up the sabotaged card and load money onto it. The moment it’s activated at the register, thieves pounce with automated scripts that vacuum the balance.

    Some variants don’t even require touching the card. Scammers buy bot-scraped card numbers on platforms like Telegram and continuously test combinations against retailer websites or compromise the retailer’s own app. No matter the method, the result is the same. You think you bought a gift. The scammer thinks you made a donation.

    How the Scam Works

    1. The Physical Swap

    • Scammers hit major retailers that stock racks of gift cards (Target, Walmart, Best Buy, grocery chains).
    • They peel open or slice the packaging, record the card number and security code, then reseal it with glue or shrink wrap.
    • You buy it, activate it, and within seconds the balance is transferred or spent online.

    2. The Barcode Replacement Trick

    • Thieves print fake barcodes and stick them over the real ones.
    • When you buy it, you think you’re loading money onto the card you picked, but the cash goes straight to the scammer’s card instead.

    3. Automated Draining Bots

    • After numbers are stolen, they’re fed into scripts that check activation status every few seconds.
    • As soon as your card goes live, the bot fires off a purchase at the linked retailer (usually digital goods so they can flip them instantly).

    4. Account Compromise Variant

    • If you store gift cards in a retailer account (looking at you, app-based Starbucks, Target, and Amazon users), scammers use credential-stuffing attacks to hijack your login.
    • Once inside, draining balances takes seconds, often before you even get a push notification.

    Why It Spikes During the Holidays

    • Volume: Retailers move tens of millions of gift cards in December. More cards = more camouflage.
    • Rushed shoppers: People grab cards quickly without inspecting the packaging.
    • Delayed discovery: The recipient typically doesn’t check the balance until Christmas, weeks after the theft, killing any chance of reimbursement.
    • Bots scale effortlessly: Fraud rings can test, drain, and flip thousands of cards in minutes.

    Scammers love anonymity, and nothing is more anonymous than a prepaid product with no buyer identity and no protection.

    Red Flags

    • Packaging looks resealed, wrinkled, or has extra glue.
    • Scratch-off panel already scratched or replaced.
    • Barcode sticker layered on top of another barcode.
    • Numbers visible through tampered cardboard.
    • The cashier has trouble scanning it.
    • The balance reads $0 the first time the recipient checks it.

    If your “gift” is suddenly worthless, that’s the scam hitting its final stage.

    Quick Tip: If you see a gift card on an open rack that already has its silver scratch-off panel revealed, put it down like it’s radioactive. That card isn’t a gift; it’s a trap set for the next unwitting shopper.

    How to Protect Yourself

    When Buying:

    • Choose cards stored behind the register, not from open racks.
    • Inspect packaging—anything loose, torn, or resealed is a no-go.
    • Pick cards with different designs behind them; scammers often tamper with batches at once.
    • Avoid cards with visible PINs or scratched panels.

    When Gifting:

    • Keep the receipt—it proves activation and helps if you need reimbursement.
    • Have the recipient check the balance immediately, not weeks later.
    • Register the card online if possible; some retailers let you lock or freeze the balance.

    When Storing Gift Cards in Retail Apps:

    • Use unique passwords and multi-factor authentication.
    • Watch for notifications about transfers or purchases you didn’t make.
    • Delete old saved cards or disable auto-reload if you don’t need it.

    Final Thoughts

    Gift card draining works because it weaponizes three things retailers can’t fix with a patch:

    1. Human holiday rush
    2. Physical access to merchandise
    3. Consumers who don’t check balances until it’s too late

    Scammers know this and exploit it at scale.

    So if you’re buying gift cards this season, slow down, inspect your cards, keep your receipts, and assume that anything in an open rack might already have been touched by someone with a glue bottle and a Telegram bot.

    Happy holidays, and may your gift cards remain yours.

    Further Reading

     
  • Geebo 9:00 am on December 11, 2025 Permalink | Reply
    Tags: , , , Scams   

    The $150 Couch That Never Existed: How Marketplace Scammers Are Targeting Holiday Shoppers 

    The $150 Couch That Never Existed: How Marketplace Scammers Are Targeting Holiday Shoppers

    By Greg Collier

    Every holiday season sparks a frenzy of buying and selling—and scammers know exactly how to slip into that chaos.

    A Cozy Deal You Wanted… and a Lie You Never Saw Coming:

    You’re scrolling through your favorite buy-and-sell app when you spot it: a clean, modern sectional at a steal of a price. It looks perfect. It’s available now. And the seller is friendly, helpful, and ready to deliver. What could go wrong?

    Plenty, as one Missouri buyer found out the hard way.

    She paid a deposit. The seller promised delivery. The messages were polite, reassuring, and downright helpful. Then the delivery time came… and went. And the “seller” vanished. The couch never existed.

    It’s a textbook example of a growing holiday scam, one built not on AI images or fake charities this time, but on trust, pressure, and buyers who want to believe a good deal really is a good deal.

    What’s Going On:

    • A desirable item appears on a marketplace app, priced low enough to feel urgent but not suspiciously cheap.
    • The seller offers delivery—solving the buyer’s transportation problem and seeming generous.
    • A deposit is requested. Usually $50–$150. “Just to hold it.” “Just to confirm delivery.”
    • The buyer pays. The communication stays friendly to keep doubts at bay.
    • The scheduled meetup arrives… and no one shows.
    • Reverse image searches reveal the photos came from somewhere else entirely.
    • The seller’s profile? Brand new. No history. No real identity.
    • By then, the money has already vanished.

    Scammers rely on the fact that many buyers, especially during the holidays, are eager to secure items quickly and will pay a small deposit without thinking twice.

    Why It Works:

    • Convenience manipulation: The offer to deliver makes the scam feel helpful, not predatory.
    • Trust-building: Scammers respond politely, promptly, and sympathetically. They mimic “good seller energy.”
    • Deposit psychology: A small upfront payment doesn’t feel risky, especially if the item seems in high demand.
    • Profile gaps go unnoticed: Many shoppers don’t check seller histories or reverse-image search photos.
    • Seasonal urgency: People want to finish holiday shopping fast, and scammers know it.

    This is how honest people get fooled, not because they’re careless, but because scammers are shockingly good at pretending to be human.

    Red Flags:

    • Profiles with little or no history: no posts, no reviews, no community presence.
    • Requests for deposits before meeting, regardless of the amount.
    • Offers to solve your problem (“I can deliver!”) that seem almost too convenient.
    • Photos that look polished or generic—reverse image search exposes them instantly.
    • Sellers who avoid video calls or refuse to show the item in real time.

    Quick Tip: If you haven’t physically seen the item, touched it, tested it, or met the seller, you shouldn’t send a cent. Deposits are a scammer’s favorite door into your wallet.

    What You Can Do:

    • Only exchange money in person once you have the item in front of you.
    • Examine seller profiles for history, reviews, and real activity.
    • Reverse-image search every suspiciously good photo—one click can save you hundreds.
    • Ask sellers to send a real-time photo or short video of the item.
    • If something feels off, trust your instincts and walk away.

    If You’ve Been Targeted:

    • Contact your bank or payment app immediately—some platforms can freeze or reverse transfers.
    • Report the fraud to your state’s Attorney General’s office, the Better Business Bureau, and the marketplace platform.
    • Warn your local community groups so the same scammer doesn’t hit someone else.
    • Keep screenshots, receipts, and timestamps—these help investigators trace patterns.

    Final Thoughts:

    Marketplace scams aren’t always glamorous or high-tech. Sometimes they’re built on nothing more than a fake couch, a friendly message, and a well-timed request for a deposit. But the damage feels just as real.

    In the rush of the holiday season, the smartest move you can make is slowing down. Real deals don’t demand deposits from strangers. Real sellers meet you in person. Real items exist in the real world, not just in stolen photos.

    Pause. Check. Verify. That’s how you keep the Grinches from stealing your money this year.

    Further Reading:

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel