Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Phishing Scams. Show all posts

SMS Toll Scam Tricks Victims Into Activating Phishing Links

 

SMS phishing scams targeting tollway users have been spreading across the U.S., with fraudsters impersonating tolling agencies to steal personal information. These scams typically involve sending text messages claiming the recipient has an unpaid toll balance. Victims are then directed to a fake payment portal, where scammers attempt to steal financial details. 

One recent case involved Texas-based audience producer Gwen Howerton, who unknowingly fell for this scam after driving a rental car on the Dallas North Tollway. Not being familiar with the correct toll payment process, she believed the overdue payment notice she received was genuine and followed the provided instructions. Her case highlights how easily people can be deceived by these well-crafted phishing messages. 

A distinguishing feature of these scams is that the text message prompts users to perform a specific action before accessing the fraudulent link. In many cases, recipients are asked to reply with “Y” or copy the link into their web browser manually. This tactic is designed to bypass Apple’s iMessage security measures, which automatically disable links from unknown senders. 

By replying, users unknowingly validate their phone numbers, confirming to scammers that the number is active. Even if they do not click the link, responding makes them targets for future scams and spam campaigns. Authorities urge the public to be cautious when receiving unexpected messages from unfamiliar numbers. If a text message contains a suspicious link, the best course of action is to ignore and delete it. Users should avoid replying or following any instructions within the message, as this could increase their risk of being targeted again. 

If there is any doubt about a toll payment, it is recommended to contact the toll agency directly using official contact details rather than those provided in the message. To combat these scams, individuals should report any fraudulent messages by forwarding them to 7726 (SPAM). The Federal Trade Commission (FTC) offers guidance on recognizing and responding to scam texts, while the FBI’s Internet Crime Complaint Center (IC3) has tracked the rise of these schemes. 

Last year, IC3 received over 2,000 complaints about toll payment scams and noted that the attacks were shifting from state to state. As SMS phishing scams continue to evolve, staying informed and cautious is crucial. 

By recognizing the warning signs and taking preventive measures, individuals can protect themselves from falling victim to these deceptive schemes.

Google Ads Phishing Scam Reaches New Extreme, Experts Warn of Ongoing Threat


Cybercriminals Target Google Ads Users in Sophisticated Phishing Attacks

Cybercriminals are intensifying their phishing campaigns against Google Ads users, employing advanced techniques to steal credentials and bypass two-factor authentication (2FA). This new wave of attacks is considered one of the most aggressive credential theft schemes, enabling hackers to gain unauthorized access to advertiser accounts and exploit them for fraudulent purposes.

According to cybersecurity firm Malwarebytes, attackers are creating highly convincing fake Google Ads login pages to deceive advertisers into entering their credentials. Once stolen, these login details allow hackers to fully control compromised accounts, running malicious ads or reselling access on cybercrime forums. Jérôme Segura, Senior Director of Research at Malwarebytes, described the campaign as a significant escalation in malvertising tactics, potentially affecting thousands of advertisers worldwide.

How the Attack Works

The attack process is alarmingly effective. Cybercriminals design fake Google Ads login pages that closely mimic official ones. When advertisers enter their credentials, the phishing kits deployed by attackers capture login details, session cookies, and even 2FA tokens. With this information, hackers can take over accounts instantly, running deceptive ads or selling access to these accounts on the dark web.

Additionally, attackers use techniques like cloaking to bypass Google’s ad policies. Cloaking involves showing different content to Google’s reviewers and unsuspecting users, allowing fraudulent ads to pass through Google's checks while leading victims to harmful websites.

Google’s Response and Recommendations

Google has acknowledged the issue and stated that measures are being taken to address the threat. “We have strict policies to prevent deceptive ads and actively remove bad actors from our platforms,” a Google spokesperson explained. The company is urging advertisers to take immediate steps if they suspect their accounts have been compromised. These steps include resetting passwords, reviewing account activity, and enabling enhanced security measures like security keys.

Cybersecurity experts, including Segura, recommend advertisers exercise caution when clicking on sponsored ads, even those that appear legitimate. Additional safety measures include:

  • Using ad blockers to limit exposure to malicious ads.
  • Regularly monitoring account activity for any unauthorized changes.
  • Being vigilant about the authenticity of login pages, especially for critical services like Google Ads.

Despite Google’s ongoing efforts to combat these attacks, the scale and sophistication of phishing campaigns continue to grow. This underscores the need for increased vigilance and robust cybersecurity practices to protect sensitive information and prevent accounts from being exploited by cybercriminals.

Synthetic Identity Fraud: A Growing Concern for Vulnerable Individuals

 

Criminals creating identities by piecing together stolen data sounds like a plot from a horror film. Unfortunately, "Frankenstein fraud," a form of synthetic identity theft, is an alarming reality. This crime involves using a Social Security number (SSN) and merging it with other stolen or fabricated details like names, addresses, or birth dates to form a new identity.

Synthetic identity theft, often termed Frankenstein fraud, involves crafting entirely new identities by blending real and fictitious information. 

According to fraud expert Frank McKenna, this practice affects up to 15 million consumers in the U.S., many of whom remain unaware. Vulnerable groups, such as children, the elderly, and the homeless, are prime targets due to their limited credit activity.

This crime costs billions annually — FiVerity reports $20 billion in losses in 2020 alone. Criminals meticulously construct fake identities using stolen SSNs, often purchased on the dark web, obtained through data breaches, or extracted via phishing scams. These fabricated profiles initially face credit denials but eventually become recognized by credit bureaus. Over time, fraudsters build creditworthiness using these false identities, only to abandon them after maxing out loans and credit lines.

The aftermath of this crime can be devastating. Victims — often unaware of the fraud — may face financial liabilities and damaged credit. Fraudsters’ actions leave lenders and real SSN owners to bear the consequences.

Protect Yourself Against Synthetic Identity Fraud

1. Freeze Credit Reports
Implementing a credit freeze with major bureaus prevents unauthorized access to your reports, safeguarding against new credit accounts. Consider freezing children’s and elderly relatives' credit as well.

2. Monitor Credit Regularly
Use tools like Capital One's CreditWise or AnnualCreditReport.com to detect suspicious activity or data breaches.

3. Avoid Phishing Scams
Stay vigilant against fraudulent messages from entities claiming to represent banks or government agencies. Verify the source directly.

4. Secure SSN Documents
Shred unnecessary documents containing your SSN, and secure digital copies.

4. Check Social Security Statements
Regularly review Social Security statements to detect unauthorized use of your SSN.

Moreover, synthetic identity fraud is a complex and evolving threat, but staying informed and taking proactive steps can significantly reduce your risk. By safeguarding your information and monitoring your credit, you can help protect yourself and your loved ones from becoming victims of this alarming crime.

This Phishing Trend is Exploiting YouTube URLs Through O365 Expiry Themes

 


A recent surge in phishing campaigns has revealed attackers leveraging cleverly obfuscated URLs and Microsoft 365 password expiry warnings to trick users into surrendering their credentials. Here's a breakdown of the latest findings:

The phishing emails consistently use subject lines formatted as: “ACTION Required - [Client] Server SecurityID:[random string]”.

The email body prompts recipients to reconfirm their passwords due to expiry, with clickable buttons labeled “Keep [USER EMAIL] Access Active.”

Tactics Employed

- Fake YouTube Links: Attackers embed links starting with seemingly legitimate URLs (e.g., youtube.com), followed by obfuscated characters like %20.

- URI Obfuscation: By including the @ symbol in URLs, attackers redirect users to malicious domains (e.g., globaltouchmassage[.]net), disguising them as trustworthy.

Key Indicators

  • URLs with excessive %20 (HTML space encoding)
  • The use of an @ symbol to split the URL:
  • Content before the @ is treated as irrelevant.
  • Content after the @ is the actual domain.
  • Redirectors and phishing kits such as Tycoon 2FA, Mamba 2FA, and EvilProxy are commonly used.
Browsers interpret URLs with @ symbols by treating everything before it as user credentials, redirecting to the domain after the @.

This tactic leverages legitimate services like YouTube to create a false sense of trust, increasing the likelihood of users clicking without inspecting the URL

To combat these threats, organizations should take a multi-pronged approach. Start by educating users to inspect URLs for anomalies such as %20 and @ symbols, and to be cautious of emails that demand immediate action on accounts or passwords. On the technical front, implement URL filtering and blocklists to prevent access to known malicious domains, and use sandbox tools to analyze suspicious links safely. Lastly, encourage employees to report any suspicious emails to the IT or security team immediately to ensure swift action and monitoring.

As phishing tactics grow more sophisticated, attackers exploit trust in legitimate platforms. Remain vigilant, verify links, and educate your workforce to stay protected.

Understanding the Threat of Fake Hacking: How to Stay Protected

  •  

In the dynamic and high-stakes field of cybersecurity, the word “hacking” often evokes thoughts of complex cyberattacks and data breaches. However, a lesser-known but equally concerning issue is the emergence of “fake hacking,” where individuals or groups falsely claim to have infiltrated computer systems.

Fake hacking occurs when attackers pretend to breach a network or device without actually doing so. While these actions may not always cause long-term technical damage, they can lead to serious consequences such as extortion and reputational harm. “Fake hacking is particularly insidious because it leverages people’s fear and uncertainty about cybersecurity,” explains William Petherbridge, Manager of Systems Engineering at the cybersecurity firm Fortinet. “Attackers are essentially tricking victims into believing their systems have been compromised in order to extract money or other concessions.”

A common tool used in fake hacking is the “hacker typer,” a website that mimics the look of a system being hacked, displaying lines of code scrolling rapidly across the screen. Other deceptive tactics include emails falsely claiming ransomware infections or pop-ups warning of non-existent malware.

“The goal of the fake hacker is to create a sense of panic and urgency in order to pressure the victim into paying a ‘ransom’ or purchasing some kind of ‘protection’ service,” says Petherbridge. “And unfortunately, if the target isn’t vigilant, they can fall for these tricks quite easily.”

To differentiate between legitimate and fake hacking threats, Petherbridge highlights key warning signs:
  • Money Demands: Requests for relatively small amounts of money, often in cryptocurrency, are a strong indication of fake hacking.
  • Unchanged Systems: Genuine breaches usually involve noticeable changes, such as altered files, new accounts, or unusual network activity. If everything appears normal, the hack is likely fabricated.
  • Disorganized Communication: Fake hackers often lack the sophistication of genuine attackers, with poorly structured emails, inconsistent demands, and an absence of technical details.
To combat fake hacking, Petherbridge advises verifying any claims before taking action and consulting cybersecurity professionals, including former hackers, who can identify fabricated threats. Employee training to recognize these red flags is also crucial.

“The most important step is to never panic or rush into a decision when faced with a purported hacking incident,” Petherbridge emphasizes. “Take the time to carefully assess the situation, double-check the facts, and respond accordingly. Falling for a fake hack can be just as damaging as a real one.”

The rise of fake hacking highlights the complexity and evolving nature of cybersecurity. While these attacks lack the technical sophistication of genuine breaches, they can cause significant harm through financial loss, reputational damage, and eroded trust.

By recognizing the signs of fake hacking and implementing strong security protocols, individuals and organizations can safeguard themselves from these deceptive threats. Vigilance, education, and a calm, calculated response remain the best defenses.

Colorado Faces Growing Financial Losses from AI-Powered Scams in 2024

 

Colorado is on track to suffer even greater financial losses from scams by the end of 2024 compared to the nearly $100 million stolen in 2023. According to the Colorado Attorney General's Office, the rapid integration of artificial intelligence (AI) into everyday life may be driving this increase.

Gone are the days when misspelled words, unprofessional websites, and suspicious email domains were telltale signs of scams. With AI, criminals now replicate the voices of loved ones to stage fake emergencies, tricking victims into sharing money or sensitive information. "Artificial intelligence takes existing scam opportunities and puts them on steroids," said Colorado Attorney General Phil Weiser.

In 2023, the FBI Denver Field Office reported that scammers stole $187 million from nearly 11,500 residents in Colorado—an increase of $9 million compared to 2022. Investment fraud ($50 million), business email compromise ($57 million), and tech support scams ($23 million) were the top schemes contributing to these losses.

Weiser's office received a record-breaking 20,390 fraud complaints in 2023, up from 19,519 in 2019, reflecting a growing trend. Colorado now ranks seventh nationwide for scam complaints per capita. Many of these cases were reported through StopFraudColorado.com, a platform providing fraud education and reporting tools.

One alarming scam, known as the "grandparent scam," highlights how scammers use AI to imitate a grandchild's voice. The victim is told their grandchild is in jail abroad and needs money urgently. "One of the scary parts is many people have a hard time understanding the difference between deepfakes and reality," Weiser said. He advises skepticism: "Don't trust those calls. Hang up and verify the information with the appropriate source."

Younger internet users and older adults are particularly vulnerable. Weiser added, "AI is not new, but the widespread use of tools like ChatGPT has taken adoption to a new level."

Austin Hastings, assistant vice president at Alpine Bank, noted that scammers adapt their strategies once people stop falling for certain tricks. Recent scams involve AI-generated phishing emails and websites that convincingly mimic legitimate organizations.

To combat scams, Alpine Bank suggests:

  • Avoid clicking on unexpected links. Use verified websites or saved URLs.
  • Never share financial information or passwords over email or phone.
  • Beware of too-good-to-be-true deals and stick to trusted retailers.
  • Monitor bank accounts regularly for suspicious charges.
  • Report fraudulent activity to authorities promptly.
  • The Colorado Privacy Act, enacted in 2021, provides residents with tools to protect their data, such as opting out of targeted advertising and requiring entities to safeguard personal information.

"It's a dangerous world out there, and AI is making it more dangerous," Weiser warned. "Please protect yourself and those you love."

How to Protect Yourself Against Phishing Extortion Scams Involving Personal Data

 

Imagine receiving an email with a photo of your house, address, and a threatening message that seems ripped from a horror movie. Unfortunately, this is the reality of modern phishing scams, where attackers use personal information to intimidate victims into paying money, often in cryptocurrency like Bitcoin. One victim, Jamie Beckland, chief product officer at APIContext, received a message claiming to have embarrassing video footage of him, demanding payment to keep it private. 

While such emails appear terrifying, there are ways to verify and protect yourself. Many images in these scams, such as photos of homes, are copied from Google Maps or other online sources, so confirming this can quickly expose the scam. To check if an image is pulled from the internet, compare it to Google Maps street views. Additionally, always scrutinize email addresses for legitimacy. Cybersecurity expert Al Iverson from Valimail advises checking for any small variations in the sender’s email domain and examining SPF, DKIM, and DMARC authentication results to determine if the email domain is real. 

Be cautious if a message appears to come from your own email address, as it’s often just a spoofed sender. Links in phishing emails can lead to dangerous sites. Founder of Loop8, Zarik Megerdichian, recommends extreme caution and encourages reporting such scams to the Federal Trade Commission (FTC). Monitoring your financial accounts, disputing unauthorized charges, and updating or canceling compromised payment methods are other essential steps. To reduce vulnerability, it’s wise to change your passwords, set up a VPN, and isolate your network. Yashin Manraj, CEO of Pvotal Technologies, suggests transferring critical accounts to a new email, informing your family about the scam, and reporting it to law enforcement, such as the FBI, if necessary. 

One of the best defenses against these types of scams is to control your data proactively. Only share essential information with businesses, and avoid giving excessive details to online services. Megerdichian emphasizes the importance of asking whether every piece of data is truly necessary, as oversharing can open the door to future scams. 

With these strategies, individuals can better protect themselves from extortion phishing scams. It’s crucial to stay vigilant and avoid interacting with suspicious emails, as this will help shield you from falling victim to increasingly sophisticated cyber threats.

Cyber Attack Disrupts Housing Services Across Greater Manchester


A scathing cyber attack has disrupted housing services in three Greater Manchester boroughs, leaving thousands of residents at risk of a phishing scam. The breach, which affected the software company Locata, has caused the temporary closure of housing websites for Manchester, Salford, and Bolton councils, and resulted in fraudulent emails being sent to users, urging them to provide sensitive personal information.

Widespread Disruption from Cyber Incidents

The cyber attack first emerged last week, targeting Locata’s software, which is widely used by local councils to manage housing applications and services. Over the weekend, the attack escalated, causing disruptions to the public-facing housing websites operated by Manchester, Salford, and Bolton councils. Users of these services were targeted with phishing emails that appeared legitimate, asking them to "activate your tenancy options" by clicking on a link and submitting their personal details. This scam has potentially compromised the security of many individuals.

Locata’s Response and Council Actions

Locata, the company responsible for providing housing software to several councils, acknowledged the security breach on July 29. In a public statement, the company expressed regret for the incident and assured the public that they were working urgently with cybersecurity experts to investigate and contain the breach. Locata informed the affected local authorities and emphasised their commitment to resolving the issue as quickly as possible.

In response, Manchester City Council confirmed that the breach led to scam emails being sent to some Manchester Move applicants. The council acted promptly by taking the affected website offline to prevent further breaches and initiated an investigation with the Information Commissioner’s Office. They advised residents to exercise caution, avoid interacting with suspicious emails, and refrain from clicking on unverified links.

Impact on Bolton and Salford Residents

Bolton Council also reported that the cyber attack had affected its housing service, Homes for Bolton, leading to a similar phishing scam. The council has urged residents to stay alert and provided guidance on steps to take if they had mistakenly interacted with the fraudulent emails, including following advice from the UK’s National Cyber Security Centre.

Salford City Council was among the first to experience the breach, which led to the temporary suspension of the Salford Home Search website. To protect residents, the council advised users to monitor their financial accounts closely, report any suspicious activity, change passwords, and contact Action Fraud if they experienced financial losses.

The investigation into the cyber attack is ongoing, with Locata working closely with affected local authorities to restore services securely. Authorities have urged the public to follow cybersecurity best practices, remain alert against phishing scams, and take necessary precautions to safeguard their personal information.

The growing risks associated with cyber threats and the importance of strong cybersecurity measures for both organisations and individuals cannot be overstated