Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/28/2016
10:50 AM
50%
50%

US Charges Several In India Call Center Scam

Authorities file charges against 61 in a phone fraud that cheated 15,000 out of $250 million via identity theft and impersonation.

A massive phone scam, which cheated around 15,000 people out of over $250 million, has been busted by US and Indian authorities and 61, including 20 in the US, are charged with the crime, reports The Washington Post. The scheme involved fake calls from call centers in India with the accused posing as officials from the Internal Revenue Service or immigration services and threatening victims with arrest and penalties if not paid outstanding tax dues.

According to the US Justice Department, scammers in India worked in tandem with co-conspirators in the US to steal personal details of victims from Facebook and other online sources and make the calls which had US government caller ID. The money forced out of their victims was used to buy prepaid debit cards or sent outside the US illegally.

The defendants, arrested on charges including identity theft and wire fraud, also cheated victims out of so-called deposit money in promise for a loan or grant.

Leslie Caldwell of the Justice Department said official agencies would never call to seek dues. “If you get one of these calls,” she said, “it is not the U.S. government calling you.”

For more, read here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
10/30/2016 | 12:41:23 PM
No, YOU prove YOUR identity.
Reminds me of when I got a phone call from someone purporting to be my health-insurance carrier asking me to "verify" my information -- including address, SSN, etc..

Considering they telephoned me, and considering that the number they were calling from was not a telephone number known to me to be associated w/ my carrier, I refused.  The huffy person on the other end of the line appeared put out.

I then called my insurance company on the number I knew to be correct to ask them about it.  Unfortunately, it's such a big bureaucracy that I couldn't even get through to someone who could even tell me whether or not the call was legitimate for sure.

Because my insurance company was so bureaucratic and stupid, I wouldn't put it past them to have such stupid practices -- but it's also just as likely (at least) that it was a malfeasor's bit of social engineering.  In any case, nothing bad happened to me because I refused to "verify" my information.

People calling you asking you to "verify" your information is the slightly more sophisticated social-engineering equivalent of someone calling you and after you say hello, the other person on the line immediately says, "Who's this?"  YOU CALLED ME.  >:P
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23691
PUBLISHED: 2021-05-14
YFCMF v2.3.1 has a Remote Command Execution (RCE) vulnerability in the index.php.
CVE-2020-18166
PUBLISHED: 2021-05-14
Unrestricted File Upload in LAOBANCMS v2.0 allows remote attackers to upload arbitrary files by attaching a file with a ".jpg.php" extension to the component "admin/wenjian.php?wj=../templets/pc".
CVE-2020-18167
PUBLISHED: 2021-05-14
Cross Site Scripting (XSS) in LAOBANCMS v2.0 allows remote attackers to execute arbitrary code by injecting commands into the "Homepage Introduction" field of component "admin/info.php?shuyu".
CVE-2020-23689
PUBLISHED: 2021-05-14
In YFCMF v2.3.1, there is a stored XSS vulnerability in the comments section of the news page.
CVE-2021-25941
PUBLISHED: 2021-05-14
Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.