RSS

Tag Archives: Online Fraud

“UPS Courier Service”

WARNING – EMAIL SCAM / UPS PHISHING ATTACK

scam_fraud

Account Suspended: Update Your Information
From: “UPS Courier Service” <activationserver@ups.com>

Dear Customer:

UPS Courier Service!

This message is to confirm that your online access have been suspended due to billing error.
We will review the activity on your account with you and upon verification, we will remove any retrictions placed on your account
We hope you enjoy the ease and convenience you’ll get with the ability to manage your UPS accounts from almost anywhere you are.

To access and activate your account, simply click the link below.

https://www.ups.com/us/activation ← ATTN: This is a spoofed link and NOT a legit UPS website.

The entire activation should take only 5 minutes of your time. Please complete the activation by now
Sincerely,

Thank you for being a valued customer

UPS,

Return-Path: tfcadmin@u16050260.onlinehome-server.com
X-YahooFilteredBulk: 74.208.74.16
Received-SPF: none (domain of u16050260.onlinehome-server.com does not designate permitted sender hosts)
X-Originating-IP: [74.208.74.16]
Authentication-Results: mta1534.mail.bf1.yahoo.com from=ups.com; domainkeys=neutral (no sig); from=ups.com; dkim=neutral (no sig)
Received: from 127.0.0.1 (EHLO u16050260.onlinehome-server.com) (74.208.74.16) by mta1534.mail.bf1.yahoo.com with SMTP; Thu, 09 May 2013 01:29:45 +0000
Received: by u16050260.onlinehome-server.com (Postfix, from userid 10013) id CEB65D099; Mon, 6 May 2013 21:24:17 -0400 (EDT)
From: UPS Courier Service activationserver@ups.com
Subject: Account Suspended: Update Your Information
Message-ID: <3dfa45d367d9e24c2e74d18b1d205288@thefcove.com>
X-Mailer: PHPMailer (phpmailer.sourceforge.net) [version ]

Advertisements
 

Tags: , , , , , ,

“Luz Reyes” “Donella Weingartner”

WARNING – RENTAL SCAM / ONLINE SCAMMER

rental-scam

Subject Line: Fwd: $625 / 2br – 1075ft&sup2; – Outstanding 2 bedroom 1 bathroom Rental (Loris)

From: luz.reyes24304@yahoo.com <luz.reyes24304@yahoo.com>
Date: Tue, Mar 26, 2013 at 1:03 PM
Subject: $625 / 2br – 1075ft&sup2; – Outstanding 2 bedroom 1 bathroom
Rental (Loris)
To: <emailuser@gmail.com>

Hey Daisy,
Did you get my last email?
The property is a bedroom bath with garage and washer/dryer. Pets are
allowed with a $100 cleaning charge.
The requirements to lease our property are as follows:
1. Photo ID
2. First months rent and optional fee for pets
3. Lease Agreement, I’ll bring it to the viewing
(It is month to month, 6 month or a 1 year lease)
4. Background check for each applicant
The service we use is Tenant Verified, here is a link.
This is an affordable way for me to screen applicants based on prior
tenant history and employment information. If you have a felony or bad
tenant history, I am flexible and I’ll work with you.
Let me know when you have your background check. It’s in a .pdf, you
can print it and bring to the viewing or email it to me. I am looking
for real tenants not window shoppers or tire kickers, right now I have
3 rental properties and a full time job.
What is the best contact number for you? Are you available tomorrow?
Enjoy your Tuesday!
Luz Reyes

_________________

From: donellaweingartner@yahoo.com <donellaweingartner@yahoo.com>
Date: Mon, Mar 25, 2013 at 11:08 AM
Subject: $625 / 2br – 1075ft&sup2; – Outstanding 2 bedroom 1 bathroom
Rental (Loris)
To: “emailuser@gmail.com”

Hey Daisy,
The property is a bedroom bath with garage and full size washer and
dryer. Dogs and cats are allowed with a $100 cleaning fee.
Requirements to rent our property are as follows:
1. PhotoID
2. 1st months rent and optional fee for pets
3. Rental Agreement, I’ll bring it to the viewing
(Options are month-to-month, 6 month or a 1 year lease)
4. Background check for each applicant
The provider we use is Tenant Verified: link.
This is an affordable way for me to screen applicants based on
previous rental history and employment information. If you have a
criminal record or bad tenant history, I am flexible and I’ll work
with you.
Let me know when you’ve completed your background check. It’s in a
.pdf, you can print it and bring to the viewing or email it to me. I
am looking for real tenants not window shoppers or tire kickers, right
now I have 3 rental properties and a full time job.
What is the best contact number for you? Are you available tomorrow?
Enjoy your Monday!
Donella Weingartner

 

Donella Weingartner also uses the name Donella Pomponi and Barrister Bernard OBI

 
Leave a comment

Posted by on 03/28/2013 in Craigslist Scam

 

Tags: , , , , , , , ,

“United Bank of Africa” aka “Rev. James Long”

WARNING – NIGERIAN SCAM / ONLINE BANKING SCAM

money-trap

Subject Line: NOTIFICATION FROM UBA BANK ONLINE BANK FUND TRANSFER

Sequel to the difficulties you have past through in all attempts you have made to receive this fund through Bank Wire Transfer, Couriers , Western Union And Money Gram Transfers the United Nation Fund Organization has agreed with the Federal Ministry Of Finance In Conjunction with the United Bank Of Africa to complete the transfer to you through online banking

In this way their will be no hitches in transferring this fund as you will be transferring your total fund of $5.5 Million Usd online

This is the UBA Bank Website ( http://www.ubagroupbank.net.tf ) when you open the website on your computer click on Internet Banking and then click New Customer then fill the requested information and submit then the bank will create and provide you the account number and your password to enable you transfer your total fund of $5.5 million usd

For further Enquires contact the bank at

Tel: +229 68 80 89 60

Contact Person: Rev. James Long

Email: info@ubagroupbank.net.tf / ubabank@ubagroupbank.net.tf

Regards
United Bank Of Africa
Benin Republic

Return-Path: <00.web893794@att.net>
X-YahooFilteredBulk: 66.94.237.212
Received-SPF: none (domain of att.net does not designate permitted sender hosts)
X-Originating-IP: [66.94.237.212]
Authentication-Results: mta1055.mail.ne1.yahoo.com from=superposta.com; domainkeys=fail (bad syntax); from=att.net; dkim=pass (ok)
Received: from 127.0.0.1 (EHLO nm11.access.bullet.mail.mud.yahoo.com) (66.94.237.212) by mta1055.mail.ne1.yahoo.com with SMTP; Mon, 18 Mar 2013 10:36:40 +0000
Received: from [66.94.237.196] by nm11.access.bullet.mail.mud.yahoo.com with NNFMP
Received: from [66.94.237.105] by tm7.access.bullet.mail.mud.yahoo.com with NNFMP
Received: from [127.0.0.1] by omp1010.access.mail.mud.yahoo.com with NNFMP; 18 Mar 2013 10:36:39 -0000
X-Yahoo-Newman-Id: 744319.67621.bm@omp1010.access.mail.mud.yahoo.com
Received: from [173.13.200.181] by web181502.mail.ne1.yahoo.com via HTTP; Mon, 18 Mar 2013 03:36:38 PDT
X-Mailer: YahooMailClassic/15.1.5 YahooMailWebService/0.8.138.524
Message-ID: <1363602998.31446.YahooMailClassic@web181502.mail.ne1.yahoo.com>
From: United Bank Of Africa <goodyservices@superposta.com>
Reply-To: ubabank@ubagroupbank.net.tf
Subject: NOTIFICATION FROM UBA BANK ONLINE BANK FUND TRANSFER

+22968808960 United Bank Of Africa Rev James Long

goodyservices@superposta.com
info@ubagroupbank.net.tf
ubabank@ubagroupbank.net.tf
00.web893794@att.net

 
Leave a comment

Posted by on 03/20/2013 in Lottery Scam

 

Tags: , , , , , , , , ,

“Gary Smith”

WARNING – EMAIL SCAM / PHONY LOAN OFFER

online-loan-scam

Subject Line: [ No Subject ]

Do You Need A Loan? If Yes Fill The Form Below
Name:
Amount:
Duration:
Mobile:
Country:

Return-Path: <abcfinancefirm@gmail.com>
Received-SPF: pass (domain of gmail.com designates 209.85.128.193 as permitted sender)
X-Originating-IP: [209.85.128.193]
Authentication-Results: mta1011.mail.ne1.yahoo.com from=gmail.com; domainkeys=neutral (no sig); from=gmail.com; dkim=pass (ok)
Received: from 127.0.0.1 (EHLO mail-ve0-f193.google.com) (209.85.128.193) by mta1011.mail.ne1.yahoo.com
Received: by mail-ve0-f193.google.com with SMTP id 15so59550vea.0
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:reply-to:date:message-id:subject:from:to :content-type; bh=tjkC4Cn8Xdj0mdl/LbkLnu9xowMzaMvna8UpPsd4t7g=; b=gb7hx3ymCCI82Nw2lqe7BQ2/73GfCKBErZZIQddx7JWY2yrAuu1emP5DMHszdSuVgZ nQZfUgwPLkjQy3FVkxL2yekJSJe3mXmmXGjR3jBQC9aBvmHOj/qFqT8EwqY7HXXJUhEB xnBAXlFLkFTsTCIsv0w2Om87kQmX+w3PeFFejLPHbSSjvFpK8aJOMCudUqe1kBnCULbO acB8aauvIeAV0OqPYjY9hT/07iFhlpaexCPRuOM6tpROlhBmkVx8YEN3emtkbp37Bapc WXcaPZg82NRcsp9fQ2TotaeeVT4HCbcMxT7E9W/WFv7N519mMrgMshKylvaf14r3Xb5I mCww==
X-Received: by 10.58.44.194 with SMTP id g2mr1546810vem.1.1363686526577; Tue, 19 Mar 2013 02:48:46 -0700 (PDT)
Received: by 10.52.170.52 with HTTP; Tue, 19 Mar 2013 02:48:46 -0700 (PDT)
Reply-To: garysmithloaninvestment@gmail.com
From: gary smith <abcfinancefirm@gmail.com>

gary smith abcfinancefirm@gmail.com
Abc Finance Firm
Reply-Address: garysmithloaninvestment@gmail.com Gary Smith Loan Investment

 
Leave a comment

Posted by on 03/20/2013 in Other

 

Tags: , , , , , , , ,

As Online Users Become More Adapt To Internet Scams; Scammers Find New Tactics To Exploit

Greetings to you, my friend.
I know this will come as a surprise to you, because you do not know me. My name is Abdul Al-Shallah and I am the son of a deposed government official in Nigeria.

Sound familiar? It’s a boilerplate opening for one of the most common scams in the known world — the Nigerian scam, also known as the “419 scam” or the advance fee scheme. The elements are always the same: someone (preferably royalty or some sort of official) has come into a lot of money, but needs another person outside of the country to use their money for a bribe (or to pay legal fees among other means) to spring the money free. The result is also predictable, with a wire transfer to a con artist’s account and a fake check that confirms a scam has taken place.

imagesThis scam is a hallmark of the Internet, but it’s actually much older than that — the advance fee scheme in its modern incarnation dates back to the early 1980s, and various forms can be traced back to before the 20th century. The reason that it sticks around, unsurprisingly, is because it never ceases to swindle millions of dollars from duped victims. The scheme, and many others like it continue to flood inboxes daily, often hitting the Spam folder before you ever lay eyes on it, waiting for a more trusting person to make a trip to the Western Union.

But that’s not to say that Internet scammers are resting on their laurels and leaving their dirty work to these classic methods. As Internet users become more sophisticated (and laugh at the advances of the forlorn Nigerian prince or similarly befallen individual), the chances of finding a willing innocent victim slowly dwindles. Like any other industry, scammers are looking for smarter, more efficient ways to reach their big payouts and to keep their “businesses” running smoothly, so they are forced to adapt and reach new extremes to get their money.

Now, security experts are seeing disturbing trends among scammers that make the old schemes appear to be child’s play. Appealing to the emotional pull of a victim is now just part of the scheme, which now includes familiarity dupes and long-term schemes to raid a bank account. These cons are more targeted, more ruthless and can take out even large corporations and entire governmental programs. There’s a new evolution in Internet con artistry, and it’s putting everyone at risk.

Check out the four new and scary ways con artists are getting their money on the Internet, and real-life examples of how they work by clicking The Next Web – Four New Ways Online Scammers Are Taking Your Money.

 
Leave a comment

Posted by on 03/17/2013 in Uncategorized

 

Tags: , , , , , , ,

“Erik Frank”

scamtrapWARNING – WORK AT HOME JOB SCAM


Subject Line: Hello!

Hello Sir/Madam,
We are looking for new employees for our home-base jobs project. So it happens
that we think you might be a great addition to our team. We are looking for
competitive, honest, hard-working people. As well we reward skilled employees,
with the opportunity of working either part-time, or full time, a highly paid
salary, and daily comissions. If you want to take the job, please reply to this
e-mail ASAP.

Return-Path: google.employment_department@gmal.com
X-YahooFilteredBulk: 209.86.89.63
X-Originating-IP: [209.86.89.63]
Authentication-Results: mta1070.mail.gq1.yahoo.com from=gmal.com; domainkeys=neutral (no sig); from=gmal.com; dkim=neutral (no sig)
Received: from 127.0.0.1 (EHLO elasmtp-junco.atl.sa.earthlink.net) (209.86.89.63) by mta1070.mail.gq1.yahoo.com with SMTP; Tue, 05 Mar 2013 10:23:43 -0800
Received: from [208.120.180.25] (helo=User) by elasmtp-junco.atl.sa.earthlink.net with esmtpa (Exim 4.67) (envelope-from <google.employment_department@gmal.com>) id 1UCwWa-00084R-6l;
Reply-To: <google.employment_department@hotmail.com>
From: ErikFrank <google.employment_department@gmal.com>
Subject: Hello!
Message-ID: <E1UCwWa-00084R-6l@elasmtp-junco.atl.sa.earthlink.net>
X-Originating-IP: 208.120.180.25
Erik Frank google.employment_department@hotmail.com
google.employment_department@gmail.com

 
 

Tags: , , , , , ,

 
%d bloggers like this: