Scams

fraud, scams, hoax & hackers!

Archive for the ‘high tech crime’ Category

The ATM Skimmer Scam

Posted by Awareness

The Definition: The ATM Scam is costing citizens of the U.K. £75 million per year – it is a high-tech hustle wherein the scammers attach a device over the slot of an ATM machine. This device will read all the information from the magnetic strip on the back of your card, and record for future use by the thieves. It still allows the genuine ATM reader to accept your information and dispense money, so the mark has no clue that he has just been the victim of an electronic rip-off.

The Mark: Nobody is immune, and no individual is more or less susceptible than another – with the exception of those visiting this site, that is. Armed with the lessons that shining a bright light on this hustle will teach you, you have a much better chance of avoiding this swindle.

The Scam: Our thieves have for the moment morphed into a “geek squad,” putting their technical talents to work fabricating a magnetic-strip reader. This will be fitted to a slot that will overlay the actual slot on an ATM machine. When it is in place, only careful examination will reveal that it is not an original part of the machine, but a nefarious add-on designed to steal sensitive information. The device is called a “skimmer.” Also built into this fabricated piece is a pin-hole camera, which will capture your PIN as you punch it into the keyboard.

Our scammer finds a likely cash point location, and when alone, casually performs what looks like a normal ATM transaction. But what he has really done is the equivalent of a highwayman setting up an ambush on a country road – he has installed a device that will ambush the precious information on your ATM card’s magnetic strip.

Read the rest of this entry »

The bluetooth hack

Posted by Awareness

The Definition: The Bluetooth Hack. You may have never heard of the term “blue-jacking”, and you certainly hope you are never its victim. When your phone is blue-jacked, a scammer can take control of your mobile and use it to make himself quite a handsome payday, indeed.

The Mark: Any owner of a Bluetooth enabled mobile phone – if he has forgotten to disable the Bluetooth when he is not using it. As is typical, a mark is someone who is too lazy, or too careless, or too just-plain uninformed. Visitors to this site have no such excuse.

The Scam: The piece of equipment that is key to pulling off this scam is a mobile pocket PC, set up to hunt for a blue-tooth connection. Due to a flaw in many Bluetooth enabled mobile phones, a remote mobile looking for a signal can actually pick up the signal of another nearby mobile. This defect is the only crack in the armor our modern-day cons need to exploit your phone, and your wallet.

Our scammer works in any crowded public place, seemingly intent on his pocket PC, but in reality searching for a signal to blue-jack. When he finds one, he has two jobs: one is to stay in range so he can control the hijacked phone; the other is to use his PC to make a call on the hijacked line. This is where the hustler stuffs his pockets.

Prior to instituting the scam, our con men have set up a premium-rate telephone line, which will charge those who call the line £1.50 per minute of call time. So all our hustler has to do, whilst in range of the mark’s phone, is dial up the premium-rate line using the mark’s connection and keep that connection going as long as possible. Every minute that goes by makes him a little richer.

Read the rest of this entry »

The Wi-Fi Scam

Posted by Awareness

The Definition: The Wi-Fi Scam is scamming gone high-tech. Setting up in one of the now-common free, wireless access locations so frequently found in hotel lobbies, airports or coffee shops, our hustler-turned-techie steals credit card information from unsuspecting marks. Before he leaves the area, he has gone on an on-line shopping spree, and left a roomful of dupes with fraudulent credit card charges.

The Mark: It is becoming more and more common these days for laptop owners to use their computers on unsecured networks in public places. These Wi-Fi access points are quite accommodating and convenient, but unless your anti-scam program is running, you, too can be a victim of the Wi-Fi hustle.

The Scam: Hustling has been around as long as money, and the art of the scam has proven to be as adaptable as mankind itself. When technology advances, larceny advances with it.

So it is with the Wi-Fi Scam. Having pre-tested his system, the swindler enters a hotel lobby or airport waiting area and sets up his laptop. He has configured it so that his laptop can hijack the internet signal at the access point – because of its proximity to other users, he putting out a more powerful signal than the hotel, café or airport.

As the marks filter in and set up their computers, little do they know that when they attempt to log on, it will be the scammer’s network onto which they will be logging – not the hotels.

Read the rest of this entry »

Tutorial – How to avoid key-loggers

Posted by Awareness

Tutorial – How to avoid key-loggers

Definition: What is a key-logger? A key-logger is a device (physical device, hardware) or a computer program (software). The aim of this device/program is to log all keystrokes that are generated from a keyboard. The keystrokes are secretly logged without the PC user knowing that whatever he types can be viewed by someone else. Usually, the person who has installed the key-logger can retrieve the log by pressing a combination of keys simultaneously and/or by providing a secret password. In some cases, the key-logger is also able to transmit the log remotely using email, Bluetooth signals or other methods.

Read the rest of this entry »

The real Hustle – The Keylogger scam

Posted by Awareness

The Key-logger scam

A few words about the scam: Living in an age of technology, the methods of con artists are becoming more and more sophisticated and complex; day by day. Modern businesses are experiencing a growing wave of high-tech cyber crime both from insiders and organized high-tech crime gangs. A popular cyber-crime is the use of key-loggers to secretly retrieve crucial/confidential information from the victim’s computer.

Fact: In April, 2005 a gang targeted a Japanese bank in London. Using their high tech skills, they planned to steal 220.000.000 pounds by infiltrating the bank dressed as cleaning staff and using computer information bugging devices (key-loggers) to get crucial/confidential information out of the bank and then make use of.

Definition: What is a key-logger? A key-logger is a device (physical device, hardware) or a computer program (software). The aim of this device/program is to log all keystrokes that are generated from a keyboard. The keystrokes are secretly logged without the PC user knowing that whatever he types can be viewed by someone else. Usually, the person who has installed the key-logger can retrieve the log by pressing a combination of keys simultaneously and/or by providing a secret password. In some cases, the key-logger is also able to transmit the log remotely using email, Bluetooth signals or other methods.

About the key-logger scam: A typical scenario of a key-logger scam is as follows: Members of the crime gang infiltrate a corporate building dressed as cleaning staff. They either swap the normal keyboards with ones that have a hardware key-logger embedded in them or, if possible, they install software key-loggers on as many computers as possible. When the employees of the corporation arrive at their office to work, everything appears to be normal. At this point, they would start working and provide all their login details on their computers without knowing that keyloggers are installed on their machines. Apart from crucial corporate information, the corporate employees could also become victims of theft. If the crime gang is targeting the bank accounts of the employees, then, using some social engineering methods, the hustlers can ‘rush’ the corporate employees into logging-in to their bank accounts; of course, this is all the scammers need in order to get hold of the confidential login information for the various bank accounts that the employees might posses.

Read the rest of this entry »

About Us

    About Scamplots

    First of all, all information, concepts & illustrations presented in this website are here to protect you.
    Who are we protecting you from? If you don't know the answer to this question then you shouldn't be reading this page at all.

    "If you know the enemy and know yourself, you need NOT fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle." - Sun Tzu.
    We will try to let you know as many things as possible about the enemy & the modern 'modus operandi' of crooks. However, getting to know yourself & learning to recognize newly-introduced scam/fraud patterns is your own responsibility.

    Why are we taking thing so seriously? Well, the truth is that as time passes and technology advances scams & frauds are getting more and more dangerous.

    Be Careful: If you misuse information provided in this website you might end up in jail. Again, all information in this website is here to protect you.

2008 © SCAMPLOTS.COM