Feeds

Claimed $400m Google buyout is fake, ICOA boss warns

SEC called after hoax press release sends shares spiking

High performance access to file storage

It was a lousy start to the post-Thanksgiving weekend for the management of US hotspot provider ICOA after the company fell victim to what looks like a classic pump-and-dump stock scam.

On Monday morning a press release was posted on PRweb announcing that Google was splashing out $400m to buy the firm, which operates 1,500 Wi-Fi hotspots across the US, including in high-value areas such as marinas and universities.

The story caused heavy trading in the firm's shares, but CFO Erwin Vahlsinghas confirmed to The Register that the story isn't true.

"It's a false release," he told us. "The SEC has been notified."

ICOA is firmly in the penny share category, with shares trading on the OTC Pink sheets for fractions of a cent. Nevertheless, the press release more than quadrupled the share price, and at its peak over 500 million shares were traded, indicating that someone made off with at least $200,000 in profit.

That the badly spelled two-paragraph press release announcing the deal caused such a flutter can't just be blamed on minds being slowed by the nation's turkey coma. The acquisition does make a certain amount of sense, given that Google has been active in expanding internet access and ICOA has been talking about buy-out negotiations for a while now.

ICOA stock price bump

Buy, buy, buy! No sell, sell, sell!

The case also shows the difference in economics that the internet has made to this kind of scam. When pumping and dumping shares was first tried out, it was a risky and expensive business – there were phone banks of people to hire to sell the stock, who needed housing and paying off. Nowadays all you need is a press release and a few million spam emails, and twitchy stock traders will do the rest.

Google isn't saying anything on the matter so far, but sources in the company confirmed the deal wasn't on and ICOA wasn't even on its radar. Whether the SEC investigation yields any culprits remains to be seen. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.