{"id":328,"date":"2015-06-03T13:32:32","date_gmt":"2015-06-03T21:32:32","guid":{"rendered":"http:\/\/www.checkworks.com\/blog\/?p=328"},"modified":"2015-07-22T13:58:13","modified_gmt":"2015-07-22T21:58:13","slug":"phishing-for-dollars-internet-scamsters-gone-wild","status":"publish","type":"post","link":"https:\/\/blog.checkworks.com\/index.php\/phishing-for-dollars-internet-scamsters-gone-wild\/","title":{"rendered":"Phishing for Dollars: Internet Scamsters Gone Wild"},"content":{"rendered":"<p><a href=\"https:\/\/www.checkworks.com\/blog\/wp-content\/uploads\/2015\/06\/bigstock-Stealing-Online-Information-61950752.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-329 size-large\" src=\"https:\/\/www.checkworks.com\/blog\/wp-content\/uploads\/2015\/06\/bigstock-Stealing-Online-Information-61950752-1024x683.jpg\" alt=\"Hacker typing on a laptop with binary code background\" width=\"625\" height=\"417\" srcset=\"https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/06\/bigstock-Stealing-Online-Information-61950752-1024x683.jpg 1024w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/06\/bigstock-Stealing-Online-Information-61950752-300x200.jpg 300w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/06\/bigstock-Stealing-Online-Information-61950752-624x416.jpg 624w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><\/p>\n<p class=\"western\"><b>By M.J. Plaster<\/b><\/p>\n<p class=\"western\">Phishing for dollars\u2014it\u2019s an old game that predates the Internet, but it\u2019s more lucrative today thanks to the speed of Internet travel. Internet scams are a <a href=\"http:\/\/mashable.com\/2012\/06\/17\/internet-scams-infographic\/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed:+Mashable+%28Mashable%29\">growth industry<\/a>, with innocent people losing $800,000,000 in one decade. The best way to beat the scamsters is to come to the game armed with knowledge, so let\u2019s get to it.<\/p>\n<h2 class=\"western\">Top Five Internet Scams<\/h2>\n<h3 class=\"western\">1. The 419 Scam<\/h3>\n<p class=\"western\">Named for the section of the Nigerian criminal code that deals with fraud, the 419 scam has more juice than the Energizer bunny. The details vary, but generally the email comes from an alleged Nigerian prince, princess, dignitary, etc., who wants to gift you several million dollars to help bring money into the U.S.<\/p>\n<p class=\"western\">The catch? You\u2019ll need to divulge banking information, make a \u2018small\u2019 payment and\/or make a trip to Africa on your dime to get the goods.<\/p>\n<p class=\"western\">The scam is so prevalent that several dedicated groups have gone on the offensive. <a href=\"http:\/\/www.wsj.com\/articles\/SB10000872396390443931404577548813973954518\"><i>The Wall Street Journal<\/i><\/a> reports that <a href=\"http:\/\/www.419eater.com\/\">scambaiters<\/a> turn the tables by baiting the scamsters and \u201ceating up their time\u201d to keep them away from na\u00efve victims. While the counteroffensives make for hilarious reading, the scambaiters were born without the fear gene, the same gene that prompts you to delete the Nigerian scam email without answering it.<\/p>\n<h3 class=\"western\">2. Phishing Expeditions<\/h3>\n<p class=\"western\">I almost fell for this one when I opened an email that appeared to be from Comcast. Without thinking, I started to respond and verify some information. All of a sudden, the odd sentence structure and misspelled words set off my radar alerting me that English was not the sender\u2019s native tongue. I realized it was a phishing expedition for identity information, and I trashed my response just in the nick of time.<\/p>\n<p class=\"western\">Today, the scamsters have reached new depths\u2014they send emails that say your bill is overdue and you\u2019re going to be arrested if you don\u2019t pay immediately with a gift or debit card that can\u2019t be tracked. Comcast cannot arrest you for a bill in arrears. Bank, utility, and IRS email scams follow the same pattern.<\/p>\n<h3 class=\"western\">3. Microsoft\/Software Company Scams<\/h3>\n<p class=\"western\">If you run Windows, you might not suspect anything if Microsoft were to contact you about a problem with your computer, right? Wrong! Unless you have some relationship with the company or an employee or have made prior contact with a support team member, you won\u2019t receive a legitimate email from <a href=\"http:\/\/www.microsoft.com\/security\/online-privacy\/msname.aspx\">Microsoft<\/a>.<\/p>\n<p class=\"western\">The scam email alerts you to some grave computer danger and contains an attachment\u2014a program to allow a \u2018Microsoft technicians\u2019 to take control of your computer and \u2018fix\u2019 it. Once installed, the scamsters steal every piece of information they can get their hands on.<\/p>\n<p class=\"western\">A slight twist of the scam involves a keylogger attachment that, when clicked, installs a program to record and report to the sender every keystroke you make\u2014bank account information, Social Security numbers, passwords, etc.<\/p>\n<p class=\"western\">These two scams can appear to come from any software company\u2014and not just through email. You might receive a popup while browsing the Internet with similar instructions and a link to malware.<\/p>\n<h3 class=\"western\">4. Work From Home Scams<\/h3>\n<p class=\"western\">Talk about an equal opportunity employer\u2014this scam targets everyone\u2014<a href=\"http:\/\/www.ic3.gov\/media\/2015\/150113-1.aspx\">college kids<\/a>, retirees, work-at-home moms and dads and the self-employed. The fraudsters use two methods\u2014push and pull: They will email you, or you will respond to an ad. Either way, the result is the same. There are two variations on the money chase:<\/p>\n<ul>\n<li><b>Direct deposit \u2013 <\/b>Once you turn over your bank information, it\u2019s out there. Unless you\u2019ve done your homework and you know you\u2019re working with a \u00a0credible organization, never give out your bank information. Insist on payment through PayPal or other third-party processor.\n<ul>\n<li><b>Paid by check \u2013 <\/b>You receive a check for more than you\u2019re supposed to receive, and you\u2019re directed to return the overage. Your bank \u201cpre-clears\u201d the check. When the bank discovers the check is a counterfeit, it comes after the person most likely to cough up the dough\u2014unfortunately that\u2019s you.<\/li>\n<\/ul>\n<h3 class=\"western\">5. Craigslist Buyer Scams<\/h3>\n<p class=\"western\">The <a href=\"http:\/\/www.pcworld.com\/article\/2603800\/just-five-gangs-in-nigeria-are-behind-most-craigslist-buyer-scams.html\">Craigslist buyer scam<\/a> is a spin on the \u201cWork From Home\u201d scam. The only difference is that you\u2019re the seller instead of the email recipient. The buyer sends a counterfeit check in an amount greater than the sale price and asks you to refund the difference.<\/p>\n<h2 class=\"western\">Staying Safe in a 24\/7-Connected World<\/h2>\n<ol>\n<li>Delete any message from yourself without opening it. It\u2019s called spoofing. Just like the crooks can spoof your phone number (that\u2019ll shock you the first time it happens), they can also spoof your email address.<\/li>\n<li>Never open an unexpected attachment. It could be a malicious program or child pornography\u2014good luck explaining that in court.<\/li>\n<li>If you receive an official-looking email, check the address [@company name] against the name of the company. Don\u2019t open it unless it matches.<\/li>\n<li>If there\u2019s a link in an email, hover your mouse over it before clicking it. If the URL isn\u2019t a site you recognize, don\u2019t open it.<\/li>\n<li>When you spot syntax errors and multiple misspellings (not to be confused with text-message speak from your kids), delete the email.<\/li>\n<li>When you receive an official-looking email without a proper salutation, delete it.<\/li>\n<li>Visit the <a href=\"https:\/\/www.consumer.ftc.gov\/scam-alerts\">Federal Trade Commission<\/a> when in doubt and\/or sign up to receive scam alerts by email.<\/li>\n<\/ol>\n<p class=\"western\">Identity theft can haunt you the rest of your life; so can losing your life\u2019s savings. From college kids to senior citizens, to small-business owners, we\u2019ve all got a bullseye on our backs. Help spread the word to everyone you know, especially to senior citizens. If you\u2019ve been caught in an Internet scam, and who hasn\u2019t, please share the details. For a moment of embarrassment, you could save someone from a lifetime of misery.<\/p>\n<p class=\"western\">\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By M.J. Plaster Phishing for dollars\u2014it\u2019s an old game that predates the Internet, but it\u2019s more lucrative today thanks to the speed of Internet travel. Internet scams are a growth industry, with innocent people losing $800,000,000 in one decade. The best way to beat the scamsters is to come to the game armed with knowledge, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/328"}],"collection":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":2,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/328\/revisions\/433"}],"wp:attachment":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}