Feeds

WikiLeaky phone scam targets unwary in US

You peeked! Now pay up

Build a business case: developing custom apps

A new voicemail phishing scam uses the threat of non-existent fines for visiting WikiLeaks to prise money out of panicked marks.

Prospective marks are robo-dialled by an automated system that states their computer and IP address "had been noted as having visited the Wikileaks site, and that there were grave consequences for this, including a $250,000 or $25,000 fine, perhaps imprisonment".

Potentially panicked victims are given a number to phone to discuss payment options, if they're daft enough to be taken in by the ruse.

The scam, which involves the use of spoofed phone numbers, takes advantages of VoIP systems to minimise the cost of calls to crooks, who are probably using stolen access to corporate PBX systems in the first place.

A woman who received the scam voicemail phishing (vishing) call reported the incident to the Central and Eastern Kentucky Better Business Bureau, which issued an alert warning of the ruse and quoting sensible general advise on avoiding phone-based frauds in general, from US consumer watchdog the FTC.

Robert Schroeder, northwest regional director of the Federal Trade Commission, said: “Consumers who get phone calls from strangers need to keep their guard up, especially when the caller makes threats based on bogus accusations – that the consumer has failed to pay an old debt, or has committed some kind of crime, and has to pay up immediately.

"Insist on a written statement of what you owe. Don’t pay it if it’s fake. Don’t provide your bank account, credit card, or social security number. And report the threat to the FTC and your state attorney general - and, if it’s a threat of personal harm, call the police.”

Threats over supposedly illicit activity online have previously been used in scams targeting file-sharers or porn surfers, and seek to panic marks into paying up in order to avoid supposedly dire consequences. Much the same approach has now been applied to target surfers visiting Wikileaks - which is, of course, perfectly legal, and without consequences for ordinary US citizens.

However, as the BBB advisory explains, if you are military personnel, this type of call could seem very real or hold more significance: the US Pentagon openly banned military personnel from visiting Wikileaks for security reasons.

Wikileaks created a huge media frenzy towards the end of 2010 with its release of leaked US diplomatic cables. The appearance of scams based on this incident illustrate that any sufficiently big news event these days is likely to become the theme of cons. ®

Next gen security for virtualised datacentres

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?