Scams

fraud, scams, hoax & hackers!

The Wi-Fi Scam

Posted by Awareness

The Definition: The Wi-Fi Scam is scamming gone high-tech. Setting up in one of the now-common free, wireless access locations so frequently found in hotel lobbies, airports or coffee shops, our hustler-turned-techie steals credit card information from unsuspecting marks. Before he leaves the area, he has gone on an on-line shopping spree, and left a roomful of dupes with fraudulent credit card charges.

The Mark: It is becoming more and more common these days for laptop owners to use their computers on unsecured networks in public places. These Wi-Fi access points are quite accommodating and convenient, but unless your anti-scam program is running, you, too can be a victim of the Wi-Fi hustle.

The Scam: Hustling has been around as long as money, and the art of the scam has proven to be as adaptable as mankind itself. When technology advances, larceny advances with it.

So it is with the Wi-Fi Scam. Having pre-tested his system, the swindler enters a hotel lobby or airport waiting area and sets up his laptop. He has configured it so that his laptop can hijack the internet signal at the access point – because of its proximity to other users, he putting out a more powerful signal than the hotel, café or airport.

As the marks filter in and set up their computers, little do they know that when they attempt to log on, it will be the scammer’s network onto which they will be logging – not the hotels.

As part of the log-in process, the victims will be asked for sensitive credit card information. Since they are not dealing with the Wi-Fi network, but with a network in the scammer’s computer, everything they input will be read directly by the thief sitting in their midst.

What would you buy online of it was free? Plasma televisions? Stereo equipment? Easily-fenced notebook computers or I-Pods? Let your imagination run wild – because that’s what our hustler is doing. As quickly as he gains your sensitive credit card information, he just as quickly goes shopping – using just a few keystrokes to run up thousands of pounds of bills at your expense.

In a busy location, this scam can net the swindler dozens of credit card numbers in a short period of time, with virtually no chance of being discovered. The beauty of it is that the marks are not even aware that their funds are being diverted, as they would be if it were a lower-tech scam involving actual paper notes. The mark does not need to be fooled, or dipped, or convinced of anything. He simply must be sitting down to do a little computer business or web-surfing – quite a common thing these days. Quite common, yes, but as you can see, potentially quite dangerous.

The Lesson Learned: Quite simple, really. If you are offering sensitive information on line – trust no one! Be absolutely sure of the network you are on – especially if it is wireless. Check with the hotel when you first log in; have them confirm that what you are seeing is, indeed, their access point. And if it doesn’t look absolutely official and correct, never let sensitive information pass from your head to the keyboard – you could be a victim of a modern day version of the old highway robber: the “information-super-highway” robber.

  1. Paranoid Cryptographer Said,

    That’s BS. It doesn’t matter if there is encryption between you and the access point, since it would be public between the access point and the server you buy on anyway. What you need is secure transfer between you and the server – and that’s what HTTPS is for (you know, the golden URL bar with the little lock). The scammer can listen to the connection, but he can’t decrypt what you send – just thank him for kindly giving you a free Internet connection. If you’re not using HTTPS, then what you send is public no matter what it passes through.

  2. Annonomous Said,

    Dont listen to the comment. Its easily duped. They never had to decypher any https encryption. They only need to use a common wlan snarfing program and they have everything desired, current connections and keylog entrys even msn chats…

  3. shirano Said,

    what are the programs I need to do this scam?

  4. shirano Said,

    what are the programs called that I need to do the wifi scam?

  5. cris gates Said,

    lol its fake ive searched for this crap for time and my research proves its bogus dnt belve it or any1 hu sez it cn be dne please its bogus

Add A Comment

About Us

    About Scamplots

    First of all, all information, concepts & illustrations presented in this website are here to protect you.
    Who are we protecting you from? If you don't know the answer to this question then you shouldn't be reading this page at all.

    "If you know the enemy and know yourself, you need NOT fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle." - Sun Tzu.
    We will try to let you know as many things as possible about the enemy & the modern 'modus operandi' of crooks. However, getting to know yourself & learning to recognize newly-introduced scam/fraud patterns is your own responsibility.

    Why are we taking thing so seriously? Well, the truth is that as time passes and technology advances scams & frauds are getting more and more dangerous.

    Be Careful: If you misuse information provided in this website you might end up in jail. Again, all information in this website is here to protect you.

2008 © SCAMPLOTS.COM