Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Money Mule Email Scam Hits U.S. > NetSparsh - Viral Content you Love & Share

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and an international company is offering you a dream job ? you can be an agent for them ? a financial intermediary ? receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.

There's no investment, no money required. They are just looking for people with a good reputation that they can trust with their money.

The company needs a local agent because US banking laws restrict the accounts that a foreign company has, unless they have a U.S. citizen as a registered agent of the company.

It sounds really good. After all, the company is overseas and it needs a U.S. Agent to receive payments and all you have to do is wire-transfer the money to the company account overseas, less your commission.

There seems to be no way to lose, since you won't be putting out any of YOUR money and YOU have control over all incoming and outgoing payments.

You can't lose, can you?

Unfortunately you can. Take this job and you become a "money mule" ? an unwitting participant in a scheme to defraud others. Here's how it works: The company may or may not have a good looking website with what sounds like a legitimate name, "Techhydraulik" and says it's based in Germany.

Sounds like it is a technology company having something to do with hydraulics, doesn't it?

However, it is really an Internet front for Bad Guys who need to be able to transfer money out of the United States from people that they have defrauded through "Phishing."

Phishing is the practice of setting up fake bank sites that look just like the real bank site (for example, Wells Fargo) and sending emails to millions of people saying that there is an irregularity in their Wells Fargo account and to "click on the link to confirm your information or your account will be closed".

When you click on the link and fill out the fields for your account number, username and passwords, it sends the information to the Bad Guys who empty your account. Believe it or not, tens of thousands of people fall for this each year.

The Bad Guys then send the payment to their agent (you), and you wire-transfer the money, less your commission, to their overseas account.

Several weeks or months later, perhaps, there is a knock at your door and the FBI wants to know why you are receiving stolen funds. You explain that the funds are not stolen, they are payments for equipment purchased by people from Techhydraulik, and you are their legitimate agent.

You may not be held criminally liable since you were an unknowing dupe, but you may certainly be liable for repayment of all of the money that passed through your hands.

And of course, the real perpetrators have long ago closed that overseas account and disappeared.

How can you protect yourself?

Go to www.betterwhois.com and look up the information about the company's website. You'll be able to see when the .com was registered.

Typically, the names are registered just a few days before the email is sent out, because the individual websites are generally only up for a few days or weeks, to make it hard for authorities to trace. For example, techhydraulik.com was registered on August 2nd and the fraudulent email was sent out on August 15. Chances are the website will be gone shortly.

The techhydraulik.com website is hosted by computers in Russia where laws are lax and recovery is unlikely. It's also possible that if you did visit the techhydraulik site, your computer would be infested with password stealers, key loggers and spyware.

The Internet is a wonderful tool. It is also a place where you need to protect yourself from becoming a victim.

Sign up for the free "The Blinking Cursor News" to stay on top of the latest scams and shams on the Internet.

© Steve Freedman, Archer Strategic Alliances 2005 All Rights Reserved

http://helpprotectmycomputer.com

In The News:


Forbes

After Equifax, New Security Considerations Emerge
Forbes
And adding insult to injury, why should consumers be stuck with $4.1 billion in credit freeze fees even as company executives engaged in what looks to be insider trading? While we wait for Equifax to provide closure, conversations with security ...

and more »

Wall Street Journal

Police: Suspect shouted 'Hail Hitler' before shooting incident after Spencer event
ABC News
The office said in a tweet that he had brought a gun onto the campus after being hired by a media organization as security. David Notte, 34, was charged with resisting an officer without violence. Security measures were in place throughout Gainesville.
Security Is Bolstered for Speech by White Nationalist Richard SpencerWall Street Journal
UF security concerns grow for Richard Spencer speechTallahassee.com
University estimates $600K for security for Richard Spencer's speechThe Hill

all 830 news articles »

Motherboard

How I Socially Engineer Myself Into High Security Facilities
Motherboard
Sophie is a physical penetration tester and information security consultant. She specializes in social engineering security assessments including physical, voice (vishing) and text (phishing). She consults in remediation and prevention of security ...


Foreign Policy (blog)

Rational Security on The ER: The “Decertified” Edition
Foreign Policy (blog)
On this week's episode of Rational Security on The E.R., President Trump says Iran is not living up to the “spirit” of the deal to curtail its nuclear program. Russian trolls and propagandists speak out. And an American woman and her family are freed ...


Coca-Cola: Security With A Touch Of Growth
Seeking Alpha
The Coca-Cola Company has existed in its current form since 1892 and will continue creating shareholder value for many years into the future. A change in leadership and the repeal of the Chicago soda tax are both positives signals for this company that ...

and more »

AroundtheO

Widespread security threat affects all WiFi-enabled devices
AroundtheO
The multitude of devices that connect to wireless networks are vulnerable to a new kind of attack, information security researchers announced Oct. 16. The newly discovered "KRACK" vulnerability opens the possibility for cybercriminals to steal a wide ...

and more »

BBC News

Militants kill Egyptian security forces in desert shoot out
BBC News
More than 50 Egyptian security forces have died during a clash with Islamist militants in the Western Desert. The militants opened fire on the group - a mix of police and armed forces - during a raid on their hideout near the Bahariya oasis, south-west ...
At least 30 police die in clash in Egypt's Western desert: security sourcesReuters

all 44 news articles »

Newsweek

Exclusive: Ivanka Trump's Security Clearance Must Be Reviewed ...
Newsweek
Senator Ben Cardin is the first sitting senator to join a chorus of congressional Democrats calling to have the first daughter's security clearance reviewed and ...
Senator urges review of Ivanka Trump's security clearance | TheHillThe Hill
Democratic senator calls for review of Ivanka Trump's security ...Washington Examiner

all 3 news articles »

CBS Chicago

Monterrey Security Now Under State Review
CBS Chicago
“There was a Monterrey security officer that was wearing an ankle bracelet because he was making terroristic threats to the FBI,” said Greg Cook of the Minnesota Board of Private Detectives. Monterrey has used its political clout to land contracts at ...

and more »

ZDNet

Leaked: Facebook security boss says its corporate network is run ...
ZDNet
Facebook's security chief has told employees that the social media giant needs to improve its internal security practices to be more akin to a defense contractor, ...
Facebook security chief Alex Stamos leaked audiotape - CNBC.comCNBC
Facebook is struggling to meet the burden of securing itself, security ...Ars Technica

all 3 news articles »
Google News

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More