About Us | Contact Us
View Cart

Mass Marketing Fraud: Old Scams, New Wineskins

By Vigilize | Wednesday, June 2, 2010 - Leave a Comment

A few decades ago, mass marketing fraud—the kind that exploits mass communication techniques like bulk mail or telemarketing—was relatively low-tech and mostly a regional crime problem targeting victims nearby.

These days, it’s a different story. Thanks to the Internet, criminals and crime groups can also target victims halfway around the world, blasting out spam e-mails by the millions and setting up phony but realistic websites to lure people in.

The FBI and its partners—particularly Immigration and Customs Enforcement, the Federal Trade Commission, U.S. Secret Service, and U.S. Postal Inspection Service—have been busting these fraudsters for years. But we realize that public awareness must be part of the solution—an educated consumer can stop these scams by not falling for them in the first place.

So today, law enforcement agencies in a number of countries—including the U.S.—are making a concerted effort to get the word out about these schemes.

What do you need to know? Mass marketing fraud generally tries to trick you into handing over your hard-earned money or personal information for the promise of future prizes, products, or services that never come. The Department of Justice blog and our mass marketing fraud brochure have more details, but here are some current scams making the rounds:

  • Individuals outside our country e-mail U.S. law firms for legal work but then overpay their retainer fees via check and ask that the remaining funds be wired back overseas. (The victims discover later that the check is counterfeit.)
  • In online rental schemes, scammers forward a counterfeit check to the property owner for more than the amount of the rent and then ask for the difference to be wired back. They also duplicate postings from legitimate online real estate sites and when contacted over e-mail by interested renters, ask the interested party to send money.
  • Unsolicited e-mails supposedly from the FBI ask for money or personal information (ironically, it was the most common complaint made to the Internet Crime Complaint Center (IC3) last year).

You should also be suspicious if you are:

  • Asked for personal financial details like bank account information or credit card numbers over the phone or by e-mail;
  • Pressured to buy something or give information without time to think it through;
  • Specifically asked to pay by cash, check, money order, or commercial wire service transfer (which are harder for law enforcement to detect);
  • Told you’ve won a foreign lottery or sweepstakes you never entered;
  • Asked to help transfer funds out of a foreign country for a share of the money; or
  • Given a check or money order for more than the cost of an item you are selling (criminals ask you to wire them the difference, but the bank later tells you the check or money order is counterfeit).

Today’s efforts to raise public awareness in the U.S. are part of a multinational day of action against mass marketing fraud. Authorities in Australia, Canada, the Netherlands, and the United Kingdom are also doing their part in their respective countries to inform the public of these scams.

The bottom line of our message today: Educate yourself. And if you think you’ve been targeted, contact the FBI’s Internet Crime Complaint Center, the Federal Trade Commission, or local authorities.


Original Article from the Federal Bureau of Investigation: Mass Marketing Fraud: Old Scams, New Wineskins


same_strip_012513


Latest News
    Why It Rhymes With SEEM (And its Not the I Before E Rule) Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s the Gestalt. The idea that the whole is greater than the sum of it’s parts. That’s not something that is often brought […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a long running debate: how and when should security vulnerabilities be disclosed…and to […]
    Four Conditions … …For Why a Network Can be Anything But a Network! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I have to admit that infotex is being called into engineering meetings with larger organizations these days that are NOT community based banks.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    If Zero days need Zero clicks, are there any secure devices in the mix? Tanvee Dhir explores the Pegasus spyware. Another technical post, meant to inspire thought about IT Governance . . . . Introduction Over the past couple of weeks, we have seen multiple stories regarding a powerful piece of spyware called Pegasus sold […]
    Our Lead Non-Technical Auditor takes a look at the new AIO Guidance… Architecture, Infrastructure, and Operations (AIO) is the latest booklet released by the Federal Financial Institutions Examination Council (FFIEC) in their line of  IT Examination Handbooks. It is an update to their 2004 Operations booklet and, as the name implies, expands into the areas […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Many organizations still fail to consider the unique risks posed by cloud computing… An article review. Last month thousands of Western Digital MyCloud device owners learned about the risks of cloud-based solutions the hard way: their data had been wiped remotely due to a flaw in the internet-facing component of their external hard drives. While […]
    infotex does not use Kaseya… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As you may be aware there was a large ransomware attack recently that leveraged a remote management tool called Kaseya that is used by many […]