Feeds

Ukrainian eBay scam turns Down Syndrome man into cash machine

'How a mule made an ass of me'

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Exclusive In late September, Mark Hartman received an email from eBay's Trust and Safety department informing him that his bid on a high-end road bike had been canceled because the auction was suspected to be fraudulent. There was only one problem: He had already mailed a cashiers check for for more than $1,500 to a man 2,300 miles away.

"I had a sinking feeling after I got the email that if I didn't intercept [the check] in this person's hands I'd never see it again," said Hartman, who lives in Sammamish, Washington. "I'm the type of person who does not like to be duped."

Hartman soon realized he was on the losing end of a scam that plays out regularly at the online auction house. In it, eBay accounts with immaculate user feedback scores are hijacked by overseas con artists who figure out a way to crack the user's password. The scammers then fleece unsuspecting buyers with sham auctions for cars, exercise equipment and other pricey merchandise.

Frequently, there is little victims can do once they realize they've been cheated. After all, eBay takes no responsibility for most transactions unless they are paid using PayPal. What's more, the masterminds of the scam are usually situated in Eastern Europe or some other far-off location.

Hartman, however, experienced a rare bit of luck after quickly recognizing the scheme's weak spot: He had the name and address of the person who was to receive his payment. So he called the local postmaster and sheriff's department for Ben Wheeler, the East Texas hamlet where his cashier's check for $1,536.51 had been delivered. He explained he had sent the payment to a town resident and only later learned the sale was fraudulent. Within a few hours, he received the phone call he had been dying to get.

Portrait of Mark Hartman

Mark Hartman

"I'm in Joseph's house right now, and I have your check in my hand," Hartman recalls being told by a local sheriff's deputy. A few days later, Hartman had the cashier's check returned to him.

Joseph and the amazing techno-slavic dream scam

"Joseph" was the first name of the man Hartman believed was selling the carbon-black, 52-centimeter Specialized Roubaix bicycle and to whom Hartman had addressed the cashiers check. It turned out the man really did exist, and according to Lester Alexander, a captain with the Van Zandt County Sheriff's Office, he lived in a mobile home next to his parents. Alexander soon discovered Joseph had Down Syndrome, a genetic disorder that often results in diminished cognitive abilities.

"I knew right off this guy wasn't selling $1,500 bicycles," Alexander told The Register. "It was obvious there was something not quite right. The young man had no idea what he was supposedly selling and taking money for."

According to Alexander, Joseph (The Register is withholding his last name) came about his job by answering an ad offering home-based work. To apply, he had to provide detailed information about himself and copies of his drivers license and a recent phone bill. In addition to Hartman's cashier check, Joseph had recently received a personal check for $1,735 sent by a California-based woman in a sham sale of an exercise bike.

Emails sent to Joseph's account instructed him to deposit the funds into his personal checking account. He was then to send the payments minus a $70 commission to an address in Ukraine, Alexander said.

The Golden Mule

In the shadowy world of online fraud, people like Joseph are known as mules. They shoulder the load and risk of well-concealed con artists.

"They have a lot of redundancy built into it, and they don't have anybody making a lot of money," said Ken Dunham, a fraud buster at iSight Partners who has been doing mule investigations since 2004. "It's a perfect type of setup to make it difficult to hunt down the kingpins behind these laundering schemes."

Indeed, other people bitten by eBay fraud have been met with considerably less success when pursuing the mules who played a hand in scamming them. But that hasn't stopped them from trying.

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.