Smishing and Vishing And Other Cyber Scams to Watch Out for This Holiday

Credit Card

You receive a text message or an automated phone call on your cell phone saying there’s a problem with your bank account. You’re given a phone number to call or a website to log into and asked to provide personal identifiable information—like a bank account number, PIN, or credit card number—to fix the problem.

But beware:  It could be a “smishing” or “vishing” scam…and criminals on the other end of the phone or website could be attempting to collect your personal information in order to help themselves to your money. While most cyber scams target your computer, smishing and vishing scams target your mobile phone, and they’re becoming a growing threat as a growing number of Americans own mobile phones. (Vishing scams also target land-line phones.)

“Smishing”—a combination of SMS texting and phishing—and “Vishing”—voice and phishing—are two of the scams the FBI’s Internet Crime Complaint Center (IC3) is warning consumers about as we head into the holiday shopping season. These scams are also a reminder that cyber crimes aren’t just for computers anymore.

IC3 Tips to Protect Yourself
From Cyber Scams
– Don’t respond to text messages or automated voice messages from unknown or blocked numbers on your mobile phone.

– Treat your mobile phone like you would your computer…don’t download anything unless you trust the source.

– When buying online, use a legitimate payment service and always use a credit card because charges can be disputed if you don’t receive what you ordered or find unauthorized charges on your card.

– Check each seller’s rating and feedback along with the dates the feedback was posted. Be wary of a seller with a 100 percent positive feedback score, with a low number of feedback postings, or with all feedback posted around the same date.

– Don’t respond to unsolicited e-mails (or texts or phone calls, for that matter) requesting personal information, and never click on links or attachments contained within unsolicited e-mails. If you want to go to a merchant’s website, type their URL directly into your browser’s address bar.

Here’s how smishing and vishing scams work:  criminals set up an automated dialing system to text or call people in a particular region or area code (or sometimes they use stolen customer phone numbers from banks or credit unions). The victims receive messages like: “There’s a problem with your account,” or “Your ATM card needs to be reactivated,” and are directed to a phone number or website asking for personal information. Armed with that information, criminals can steal from victims’ bank accounts, charge purchases on their charge cards, create a phony ATM card, etc.

Sometimes, if a victim logs onto one of the phony websites with a smartphone, they could also end up downloading malicious software that could give criminals access to anything on the phone. With the growth of mobile banking and the ability to conduct financial transactions online, smishing and vishing attacks may become even more attractive and lucrative for cyber criminals.

Here are a couple of recent smishing case examples:

  • Account holders at one particular credit union, after receiving a text about an account problem, called the phone number in the text, gave out their personal information, and had money withdrawn from their bank accounts within 10 minutes of their calls.
  • Customers at a bank received a text saying they needed to reactivate their ATM card. Some called the phone number in the text and were prompted to provide their ATM card number, PIN, and expiration date. Thousands of fraudulent withdrawals followed.

Other holiday cyber scams to watch out for, according to IC3, include:

  • Phishing schemes using e-mails that direct victims to spoofed merchant websites misleading them into providing personal information.
  • Online auction and classified ad fraud, where Internet criminals post products they don’t have but charge the consumer’s credit card anyway and pocket the money.
  • Delivery fraud, where online criminals posing as legitimate delivery services offer reduced or free shipping labels for a fee. When the customer tries to ship a package using a phony label, the legitimate delivery service flags it and requests payment from the customer.

TOP-SECRET – Buying a Car Online? Read This First

You can buy almost anything over the Internet—including clothes, a pizza, music, a hotel room, even a car. And while most transactions are conducted lawfully and securely, there are instances when criminals insert themselves into the marketplace, hoping to trick potential victims into falling for one of their scams.

Today, the FBI’s Internet Crime Complaint Center (IC3) issued an alert about a specific type of cyber scam that targets consumers looking to buy vehicles online.

How the scam works. While there are variations, here’s a basic description: consumers find a vehicle they like—often at a below-market price—on a legitimate website. The buyer contacts the seller, usually through an e-mail address in the ad, to indicate their interest. The seller responds via e-mail, often with a hard-luck story about why they want to sell the vehicle and at such a good price.

In the e-mail, the seller asks the buyer to move the transaction to the website of another online company….for security reasons….and then offers a buyer protection plan in the name of a major Internet company (e.g., eBay). Through the new website, the buyer receives an invoice and is instructed to wire the funds for the vehicle to an account somewhere. In a new twist, sometimes the criminals pose as company representatives in a live chat to answer questions from buyers.

Once the funds are wired, the buyer may be asked by the seller to fax a receipt to show that the transaction has taken place. And then the seller and buyer agree upon a time for the delivery of the vehicle.

What actually happens: The ad the consumer sees is either completely phony or was hijacked from another website. The buyer is asked to move from a legitimate website to a spoofed website, where it’s easier for the criminal to conduct business. The buyer protection plan offered as part of the deal is bogus. And the buyer is asked to fax the seller proof of the transaction so the crooks know when the funds are available for stealing.

And by the time buyers realize they’ve been scammed, the criminals—and the money—are long gone.

Red flags for consumers:

  • Cars are advertised at too-good-to-be true prices;
  • Sellers want to move transactions from the original website to another site;
  • Sellers claim that a buyer protection program offered by a major Internet company covers an auto transaction conducted outside that company’s website;
  • Sellers refuse to meet in person or allow potential buyers to inspect the car ahead of time;
  • Sellers who say they want to sell the car because they’re in the U.S. military about to be deployed, are moving, the car belonged to someone who recently died, or a similar story;
  • Sellers who ask for funds to be wired ahead of time.

Number of complaints. From 2008 through 2010, IC3 has received nearly 14,000 complaints from consumers who have been victimized, or at least targeted, by these scams. Of the victims who actually lost money, the total dollar amount is staggering: nearly $44.5 million.

If you think you’ve been victimized by an online auto scam, file a complaint with IC3. Once complaints are received and analyzed, IC3 forwards them as appropriate to a local, state, or federal law enforcement agency.

TOP-SECRET- FBI — Tracking a Web of Criminals – Federal Bureau of Investigation

Wouldn’t it be nice if you could see where that scam e-mail came from? If you could plot a scammer’s location on a map, along with their victims? And then go after them?

The FBI Cyber Division’s Internet Crime Complaint Center, a partnership with the nonprofit National White Collar Crime Center, is doing just that. In any given month IC3’s website gets about 20,000 complaints. Agents and analysts wade through them to find patterns and trends, and then go after the scammers by sending the investigative leads to law enforcement agencies or FBI field offices.

Supervisory Special Agent Charles Pavelites, IC3: Anyone who’s been a victim of crime on the Internet can file a complaint with us. We don’t have thresholds for individual complaints. We like to get as much information as possible, and get as much information as possible out to law enforcement in hopes of spurring investigations.

Narrator: The FBI Cyber Division investigates the whole spectrum of Internet crimes, from auction fraud to international threats targeting the U.S. infrastructure.

Assistant Director Shawn Henry, FBI Cyber Division: It’s really important for people to understand how significant the threat is from the cyber attack vector to the U.S. economy and the U.S. infrastructure. There are many foreigners, organized crime groups, that are looking to target the U.S. financial infrastructure, because the business of the United States is done on the Internet.

Narrator: The Internet Crime Complaint Center’s database holds more than 1.3 million complaints. They can sift through the complaints to target specific frauds, or get an overall picture of current online crime trends.

Pavelites: This would be all kinds of cyber fraud, all kinds of schemes. And, these are just dots, but they represent the information that go with them that we can use to determine trends, determine loss amounts, to determine where we should be focusing our efforts in the fight against cyber crime.

Narrator: To avoid scammers’ traps, follow your instincts: don’t click on links or open attachments in unsolicited e-mail, and guard your personal information.

Henry: So the consumer really has to ensure that they’ve got active virus scanning in place, the most recent virus signatures up to date. They’ve got to have a firewall that monitors the connections between their computer and other computers. And they really have to monitor that and be on top of what the threats are and ensure that they’re protecting themselves to the greatest extent possible.

FBI – Be Aware of Recent Cyber Crime Scams

Internet Crime Complaint Center’s (IC3)

Scam Alerts

This report, which is based upon information from law enforcement and complaints
submitted to the IC3, details recent cyber crime trends and new twists to previously-existing
cyber scams.

“Mass Joinder Lawsuits” Promising Home Mortgage Relief

The IC3 has received several complaints from individuals who reported they received
a letter stating they were a potential plaintiff in a “Mass Joinder” lawsuit being
filed by a law firm located in California, against their mortgage companies. Consumers
stated they were requested to pay non-refundable, upfront fees of $2,000 to $5,000.
The law firm made a wide variety of claims and sales pitches and offered legal and
litigation services, with the goal of taking money from the victim.

Lawyers seeking plaintiffs to join a class for a class action lawsuit do not seek
up front commission from their class clients. Class action lawyers are typically
paid on a contingency basis. In a contingency fee arrangement, an attorney receives
approximately 40% of any judgment or settlement amount obtained on the client’s
behalf.

Warnings have been posted on-line regarding “Mass Joinder” by the California Department
of Real Estate; the Better Business Bureau; as well as consumers who have been scammed
and posted their experiences, insights, and warnings.

On-line Auction Site PlayStation Bundle Ad Scam

The IC3 has received several complaints from individuals who reported they received
an unsolicited e-mail stating their ad for a Sony Playstation 3 Metal Gear Solid
4 PS3 80 GB Bundle has been posted and a confirmation number was enclosed for the posting.
In each instance the victim claimed they did not place an ad on an on-line auction
site for the Sony Playstation Bundle. Some victims stated they did not even have
an on-line auction account.

Warnings have been posted on-line to beware of auction site phishing e-mail scams
and specifically mention the above-mentioned scam. One warning indicated the scam
was first reported in January 2009.

Fraud Trends Affecting The eCommerce Community

Ethoca recently provided the IC3 information pertaining to the increase in fraud
attempts incurred by on-line merchants. Ethoca was founded under the concept of
safely sharing transaction data to fight on-line credit card fraud. The company
serves as a data sharing platform for merchants to stop on-line fraud and is partnered
with the National Cyber Forensics and Training Alliance (NCFTA).
The data received by Ethoca remains private and is only used for fraud prevention.
The following information is based on Ethoca’s data collection and information sharing
process.

Advisory On Military Addresses

On 07/11/2011, the hacker group Anonymous posted 90,000 e-mail addresses and passwords.
As a result of this posting, merchants have reported some orders containing military
e-mail addresses have been identified as fraudulent. Until this time, military e-mail
addresses typically meant an order was less likely to be fraudulent. The increase
in fraud orders has happened within the last 30 days.

E-mail Address Tumbling

E-mail address tumbling has been around for awhile and fraudsters have used it for
many years. On the other side, good consumers utilize address tagging to identify
orders.

The purpose of e-mail tagging is to allow consumers to have one e-mail address for
every purpose. The attractive feature of e-mail tagging is it allows the consumer
to vary their e-mail address to help differentiate when placing orders, shopping,
working, schooling, etc., but automatically forwards to the primary e-mail address.
This feature on Gmail works in two ways, either with a period or a plus sign. The
period works by allowing the consumer to take an e-mail address, JohnDoe@gmail.com,
and add as many periods as the consumer wants to the e-mail address, JohnDoe…..@gmail.com,
J.o.h.n.D.o.e@gmail.com, etc.

The feature most often used is the + feature, which allows a user to add additional
tags to their e-mail address to easily identify how someone obtained their name.
Using the above example, when shopping on-line, a consumer can tag their e-mail
as JohnDoe+081811OnlineRetailerName@gmail.com. This allows the user to know they
shopped on-line with a merchant on that specific day.

These features can be used in combination with rules to route e-mails into different
boxes, keeping inbox e-mail volume down, and helping users be more efficient.

Fraudsters have figured out this tip and use what has been termed e-mail address
tumbling, so the fraudster does not have to create unique user accounts for their
many fraud attempts. So far these features have only been found to work with Gmail
accounts.