Security Information |
|
Money Mule Email Scam Hits U.S.
Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction. There's no investment, no money required. They are just looking for people with a good reputation that they can trust with their money. The company needs a local agent because US banking laws restrict the accounts that a foreign company has, unless they have a U.S. citizen as a registered agent of the company. It sounds really good. After all, the company is overseas and it needs a U.S. Agent to receive payments and all you have to do is wire-transfer the money to the company account overseas, less your commission. There seems to be no way to lose, since you won't be putting out any of YOUR money and YOU have control over all incoming and outgoing payments. You can't lose, can you? Unfortunately you can. Take this job and you become a "money mule" - an unwitting participant in a scheme to defraud others.Here's how it works: The company may or may not have a good looking website with what sounds like a legitimate name, "Techhydraulik" and says it's based in Germany. Sounds like it is a technology company having something to do with hydraulics, doesn't it? However, it is really an Internet front for Bad Guys who need to be able to transfer money out of the United States from people that they have defrauded through "Phishing." Phishing is the practice of setting up fake bank sites that look just like the real bank site (for example, Wells Fargo) and sending emails to millions of people saying that there is an irregularity in their Wells Fargo account and to "click on the link to confirm your information or your account will be closed". When you click on the link and fill out the fields for your account number, username and passwords, it sends the information to the Bad Guys who empty your account. Believe it or not, tens of thousands of people fall for this each year. The Bad Guys then send the payment to their agent (you), and you wire-transfer the money, less your commission, to their overseas account. Several weeks or months later, perhaps, there is a knock at your door and the FBI wants to know why you are receiving stolen funds. You explain that the funds are not stolen, they are payments for equipment purchased by people from Techhydraulik, and you are their legitimate agent. You may not be held criminally liable since you were an unknowing dupe, but you may certainly be liable for repayment of all of the money that passed through your hands. And of course, the real perpetrators have long ago closed that overseas account and disappeared. How can you protect yourself? Go to www.betterwhois.com and look up the information about the company's website. You'll be able to see when the .com was registered. Typically, the names are registered just a few days before the email is sent out, because the individual websites are generally only up for a few days or weeks, to make it hard for authorities to trace. For example, techhydraulik.com was registered on August 2nd and the fraudulent email was sent out on August 15. Chances are the website will be gone shortly. The techhydraulik.com website is hosted by computers in Russia where laws are lax and recovery is unlikely. It's also possible that if you did visit the techhydraulik site, your computer would be infested with password stealers, key loggers and spyware. The Internet is a wonderful tool. It is also a place where you need to protect yourself from becoming a victim. Sign up for the free "The Blinking Cursor News" to stay on top of the latest scams and shams on the Internet. © Steve Freedman, Archer Strategic Alliances 2005 All Rights Reserved http://helpprotectmycomputer.com
MORE RESOURCES: Opinion | Banning TikTok Wonât Solve Your Data-Security Problem The Wall Street Journal Heâs a Security Guard at the Met. Now His Work Is Showing There. The New York Times Why does Trump want Greenland and the Panama Canal so badly? One reason may surprise you - USA TODAY Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data ABC News To Ban TikTok, Supreme Court Would Rank âNational Securityâ Before First Amendment The Intercept Remarks at a UN Security Council Briefing on Nonproliferation and the Democratic Peopleâs Republic of Korea United States Mission to the United Nations Sweet Security Partners with Illustria to Offer Proactive Open-Source Supply Chain Risk Management GlobeNewswire Krebs on Security â In-depth security news and investigation Krebs on Security One week later: New Orleans debates security, memorial grows, more chemicals found FOX 8 Local First New in 2025: Counties Should Prepare Now for the Upcoming HIPAA Security Rule Update National Association of Counties Special ops forces seek to manage digital footprints, achieve âsecurity through obscurityâ DefenseScoop Pope to celebrate Jubilees for Communications, security forces Vatican News - English White House program to certify the security of IoT devices goes live Cybersecurity Dive U.S. citizen denied entry into Poland after security staff object to handwritten notes in passport ABC News Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations Stowaways on planes and inside landing gear raise worries about aviation security The Associated Press Brillion Achieves SOC 2 Type 2 Compliance, Reinforcing Commitment to Data Security and Privacy Business Wire Opinion | Bidenâs âsecurityâ concern about TikTok and U.S. Steel is doubly specious The Washington Post New Orleans Homeland Security criticized during terror attack probe WDSU New Orleans Border security is national security Foundation for Defense of Democracies âFaithful public servantâ: Alabama trooper on Gov. Kay Iveyâs security team dies of cancer AL.com The Rio Treaty's Security Pact and Unintended Consequences of Threatening Canada, Greenland, and Panama Just Security Tidal Cyber Acquires Zero-Shot Security to Enhance Threat Intelligence Mapping Capabilities Business Wire Swimlane Hero helps solve complex security operations problems Help Net Security Security guard catches DJ molesting 12-year-old boy at California mall, officials say Sacramento Bee Who is Acronisâ New Chief Information Security Officer? Cyber Magazine UN aviation agency confirms recruitment database security breach BleepingComputer Fort Smith Public Schools to integrate AI gun detection software in security cameras Northwest Arkansas Democrat-Gazette Orange Bowl pep rally security includes surveillance cams, law enforcement on the ground - CBS Miami Update on former Vigo County Security Annex demolition MyWabashValley.com Security Industry Association Welcomes New Perimeter Security Subcommittee Leaders Security Sales & Integration BreachLock Unveils Unified Security Testing Platform for PTaaS, ASM, Continuous Pentesting, and Red Teaming PR Newswire Alois Brunner, the Nazi âbutcherâ who trained Syrian security Al Jazeera English Marine Corps bases take increased security posture The Island News â Beaufort, SC When It Comes to Security, Europe Is Whistling Past the Graveyard World Politics Review Synology Launches ActiveProtect: Simplifying Enterprise Data Protection with Unmatched Security, and Scalability Business Wire Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data The Associated Press Security consultant denied profiteering in defamation case against CNN WMBB - mypanhandle.com Security and Sanctions in Post-Assad Syria The National Interest Online Eric Trager tapped for Mideast slot on Trumpâs National Security Council The Times of Israel 2025 Security Industry Predictions: Jon Adams, Vice President of Sales, DMP Security Sales & Integration Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Washington Township Police to launch security risk assessment program for businesses Bellefontaine Examiner New Orleans hires consultant to review security after Bourbon Street attack. See who has the job. NOLA.com What to expect from Polandâs EU presidency and its focus on âSecurity, Europe!â Atlantic Council New Orleans attack prompts tighter security in D.C. ahead of inauguration, Carter funeral The Chicago Cusader Newark Airport makes list of Top 10 craziest security catches New Jersey 101.5 FM Base steps up security measures following terrorist attacks Mountain Home News |
RELATED ARTICLES
A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Mall Protection The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined. Criminals are Fishing For Your Identity What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Spyware, This Time Its Personal! First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission.. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. |
home | site map |
© 2006 |