Risk
10/3/2008
02:48 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Government Cracks Down On Online Disaster Scammers

One case brought by the Hurricane Katrina Task force last November resulted in sentences of more than eight and nine years for two brothers who operated a fraudulent Web site.

More than 900 people who aimed to defraud disaster victims and their would-be benefactors have been swept up in a storm of litigation.

On Wednesday, the Hurricane Katrina Task Force, set up in September 2005 to fight disaster-related fraud, said that it had filed federal charges against 907 individuals in 43 federal judicial districts since its inception.

"Whenever a natural disaster strikes, there will always be unscrupulous people willing to take advantage of victim assistance and rebuilding efforts," said Matthew Friedrich, acting assistant attorney general for the Justice Department's Criminal Division and chair of the task force, in a statement. "Those who would try to profit from the misfortunes of disaster victims should know that the Department of Justice, federal investigative agencies, and inspectors general will continue their aggressive pursuit of disaster fraud."

One case brought by the Hurricane Katrina Task force last November resulted in sentences of more than eight and nine years for two brothers who operated a Web site that fraudulently claimed to be collecting money for Hurricane Katrina victims on behalf of the Salvation Army. According to the Department of Justice, the two brothers registered "Salvationarmyonline.org" on Sept. 3, 2005, less than a week after Hurricane Katrina swept through New Orleans. Their Web site directed visitors to donate through PayPal, and the brothers collected more than $48,000 for victims of Hurricane Katrina, and later Hurricane Rita, before authorities shut the scam down.

Cyber squatting -- the registration of domain names lawfully associated with other entities -- rose 38% in the second quarter of 2008, compared with the same period last year, according to MarkMonitor, a company that monitors brand abuse.

In July, the Internet Crime Complaint Center (IC3), a joint project operated by the FBI and the National White Collar Crime Center, warned that spate of disasters in May and June -- tornadoes, wildfires, and flood -- was likely to bring out scammers.

"Tragic incidents, such as 9/11, Hurricanes Katrina and Rita, and the recent earthquake in China, have prompted individuals with criminal intent to solicit contributions purportedly for a charitable organization and/or a good cause," IC3 said.

IC3 advises not responding to spam e-mail or clicking on links in unsolicited messages, not opening attached files from unknown senders, contributing directly to known organizations rather than through third parties claiming to represent such organizations, attempting to verify the legitimacy of charitable organizations, and refusing to supply sensitive personal or financial information to anyone soliciting donations.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I decided to treat the kiddos to a TV dinner tonight.
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.