Voice Phishing Scams Are Getting More Clever (krebsonsecurity.com) 201
Security researcher Brian Krebs highlights several clever methods scammers are using to obtain your personal information. In one example, someone used a fully-automated voice to try and scam "a cybersecurity professional with more than 30 years of experience" by greeting him with a four-note AT&T jingle, "followed by a recorded voice saying AT&T was calling to prevent his phone service from being suspended for non-payment."
"It then prompted me to enter my security PIN to be connected to a billing department representative," Jon said. "My number was originally an AT&T number (it reports as Cingular Wireless) but I have been on T-Mobile for several years, so clearly a scam if I had any doubt. However, I suspect that the average Joe would fall for it." Krebs reports of another, more sophisticated scam attempted on Matt Haughey, the creator of the community Weblog MetaFilter and a writer at Slack: Haughey banks at a small Portland credit union, and last week he got a call on his mobile phone from an 800-number that matched the number his credit union uses. Actually, he got three calls from the same number in rapid succession. He ignored the first two, letting them both go to voicemail. But he picked up on the third call, thinking it must be something urgent and important. After all, his credit union had rarely ever called him. Haughey said he was greeted by a female voice who explained that the credit union had blocked two phony-looking charges in Ohio made to his debit/ATM card. She proceeded to then read him the last four digits of the card that was currently in his wallet. It checked out. Haughey told the lady that he would need a replacement card immediately because he was about to travel out of state to California. Without missing a beat, the caller said he could keep his card and that the credit union would simply block any future charges that weren't made in either Oregon or California.
This struck Haughey as a bit off. Why would the bank say they were freezing his card but then say they could keep it open for his upcoming trip? [...] The caller then read his entire home address to double check it was the correct destination to send a new card at the conclusion of his trip. Then the caller said she needed to verify his mother's maiden name. The voice in his head spoke out in protest again, but then banks had asked for this in the past. He provided it. Next she asked him to verify the three digit security code printed on the back of his card. Once more, the voice of caution in his brain was silenced: He'd given this code out previously in the few times he'd used his card to pay for something over the phone. Then she asked him for his current card PIN, just so she could apply that same PIN to the new card being mailed out, she assured him. Ding, ding, ding went the alarm bells in his head. Haughey hesitated, then asked the lady to repeat the question. When she did, he gave her the PIN, and she assured him she'd make sure his existing PIN also served as the PIN for his new card. Haughey said after hanging up he felt fairly certain the entire transaction was legitimate, although the part about her requesting the PIN kept nagging at him. Long story short, two fradulent charges were made on his account totaling $3,400. "People I've talked to about this say there's no way they'd fall for that, but when someone from a trustworthy number calls, says they're from your small town bank, and sounds incredibly professional, you'd fall for it, too," Haughey said.
"It then prompted me to enter my security PIN to be connected to a billing department representative," Jon said. "My number was originally an AT&T number (it reports as Cingular Wireless) but I have been on T-Mobile for several years, so clearly a scam if I had any doubt. However, I suspect that the average Joe would fall for it." Krebs reports of another, more sophisticated scam attempted on Matt Haughey, the creator of the community Weblog MetaFilter and a writer at Slack: Haughey banks at a small Portland credit union, and last week he got a call on his mobile phone from an 800-number that matched the number his credit union uses. Actually, he got three calls from the same number in rapid succession. He ignored the first two, letting them both go to voicemail. But he picked up on the third call, thinking it must be something urgent and important. After all, his credit union had rarely ever called him. Haughey said he was greeted by a female voice who explained that the credit union had blocked two phony-looking charges in Ohio made to his debit/ATM card. She proceeded to then read him the last four digits of the card that was currently in his wallet. It checked out. Haughey told the lady that he would need a replacement card immediately because he was about to travel out of state to California. Without missing a beat, the caller said he could keep his card and that the credit union would simply block any future charges that weren't made in either Oregon or California.
This struck Haughey as a bit off. Why would the bank say they were freezing his card but then say they could keep it open for his upcoming trip? [...] The caller then read his entire home address to double check it was the correct destination to send a new card at the conclusion of his trip. Then the caller said she needed to verify his mother's maiden name. The voice in his head spoke out in protest again, but then banks had asked for this in the past. He provided it. Next she asked him to verify the three digit security code printed on the back of his card. Once more, the voice of caution in his brain was silenced: He'd given this code out previously in the few times he'd used his card to pay for something over the phone. Then she asked him for his current card PIN, just so she could apply that same PIN to the new card being mailed out, she assured him. Ding, ding, ding went the alarm bells in his head. Haughey hesitated, then asked the lady to repeat the question. When she did, he gave her the PIN, and she assured him she'd make sure his existing PIN also served as the PIN for his new card. Haughey said after hanging up he felt fairly certain the entire transaction was legitimate, although the part about her requesting the PIN kept nagging at him. Long story short, two fradulent charges were made on his account totaling $3,400. "People I've talked to about this say there's no way they'd fall for that, but when someone from a trustworthy number calls, says they're from your small town bank, and sounds incredibly professional, you'd fall for it, too," Haughey said.
Whoa. (Score:5, Insightful)
Re:Whoa. (Score:5, Insightful)
If they ask, get a name and extension,
Always this. They can spoof the legitimate bank customer service number. So don't assume the caller ID is correct. Always tell them that you will call them back at a convenient time.
Re:Whoa. (Score:5, Interesting)
They can spoof the legitimate bank customer service number.
But only because the telecom companies let them, and the government has done nothing to ban the practice.
Spoofing should be illegal unless the company doing the spoofing owns both numbers.
That this is mostly an American+Canadian problem. The practice is illegal in most other countries.
Re: (Score:2)
The telecom companies that is forwarding that info to you has no way to know that the caller spoofed their caller ID. Not only do you have to trust the exchange you are getting the call from, but you must trust the exchange that connected to that exchange, and so on, all the way to the original caller, and there is no way for the receiver to positively identify these exchanges if the original caller happened to send false information in the first place.
The only fix for this would completely break backw
Re: (Score:2)
The telecom companies that is forwarding that info to you has no way to know that the caller spoofed their caller ID. Not only do you have to trust the exchange you are getting the call from, but you must trust the exchange that connected to that exchange, and so on, all the way to the original caller, and there is no way for the receiver to positively identify these exchanges if the original caller happened to send false information in the first place.
The only fix for this would completely break backwards compatibility and would in general make it all but impossible to make long distance calls.
I see, So whay didn't I get any of this crap back in say - the 1980s?
And are you seriously suggesting that it is impossible to make certain that the number that pops up is the number that is calling?
Such a complex system that a call announcing system was developed that is not capable of ever working. Someone should be fired over developing that never working device.
Re: (Score:2)
I see, So whay didn't I get any of this crap back in say - the 1980s?
You did, it was just rarely abused and not cheap or easy to gain access to.
Any company owning a PBX system trunked to the phone exchange, was the owner of the device (the PBX) being asked by your exchange, what the caller ID should be.
The staff that programmed the PBX defined the caller ID rules, and as is common practice, would have defined all "internal only" extensions to return a different phone number, likely the companies main number or reception desk.
A PBX wasn't cheap, nor was the trunk fees to conn
Re: (Score:3)
The only fix for this would completely break backwards compatibility
Nonsense. An obvious solution would be to ban all American companies from 3P spoofing, and ban them from connecting to foreign networks that allow it. Give them six months to implement it.
During those six months, any country that wants to continue to connect to America's phone system (i.e. all expect North Korea) would scramble to fix their own phone systems. Most would need to do nothing, since 3P spoofing is ALREADY ILLEGAL. In India, 3P spoofing is already illegal for domestic calls, but allowed for
Re: (Score:2)
Not only do you have to trust the exchange you are getting the call from, but you must trust the exchange that connected to that exchange, and so on, all the way to the original caller
But how does a call get too a phone number then? If I dial phone number 1234, how does my carrier know what final exchange that number is located at? And if they do, why are they accepting a phone number dialing out from a different exchange that doesn't match the info for me placing a call to 1234? I'm sure there is some technical reason for it, but It still seems screwy to me.
Re: (Score:2)
Re: (Score:2)
Telco could cut down on caller id fraud (Score:2)
The telcos know the originating company. If it's a company that agrees to not allow spoofed caller id your carrier could pass along the caller id, if not your carrier could set the caller ID to LIKELY FRAUD CALL. If not preventing spoofing, it would certainly discourage it and put the recipient on alert for a likely fraud.
The problem is that the telco have almost no incentive to cut down on fraud calls. They get paid the same for a fraud call as a legit one, so why not carry them all?
Re: (Score:2)
Spoofing may not be illegal, but scamming still is. And "other countries' have plenty of scams still. In fact, there are the old "microsoft tech support scam", the "refund scam" which is especially popular in the UK and plenty
Re: (Score:2)
and the government has done nothing to ban the practice.
This statement is wrong. The government has done something (Truth in Caller ID Act [wikipedia.org]) but it is not enough. The caller (either a real person or robot) clearly and fraudulently intend to obtain importation personal data from the person being called. The problem with the law is that it is not clear enough and no one really enforces it.
Re: (Score:2)
Spoofing should be illegal unless the company doing the spoofing owns both numbers.
Wikipedia says it already is...
United States[edit]
In the United States, telemarketers are required to transmit caller ID.[16] This requirement went into effect on January 29, 2004.[17] Courts have ruled that caller ID is admissible.[18] Providers are required by FCC rules to offer "per-call" blocking of caller ID to their customers. Legislation in the United States in 2007 made caller ID spoofing illegal for fraudulent purposes.
Already is, Truth in Calling Act. Scamming too (Score:2)
Scamming people is illegal.
Caller ID spoofing of this type is illegal under the Truth in Calling Act.
Unfortunately the criminals don't follow the law. That's a concept some people forget often.
Re: (Score:3)
making things illegal won't stop criminals.
We don't need to stop the criminals. We only need to stop the telecoms from enabling them.
Re: (Score:3)
So is fraud; making things illegal won't stop criminals.
Actually, it will, in that you can arrest, jail, prosecute and imprison them once it's illegal, but if it's legal, they can continue at will.
Re: Whoa. (Score:2)
Hell go the whole hog. Judge Death style. Eliminate crime by eliminating life. No people, no laws. Everyone wins!
Re: (Score:3)
Re: (Score:3)
If it doesn't occur in Europe, then they have apparently figured out how to disable it..
Caller id spoofing happens just the same in Europe. A number of calls are placed from abroad and spoof local numbers. The phone system is a worldwide system so the solution must be deployed worldwide for it to work.
Re: (Score:2)
Just force calls originating from outside the country to have their actual numbers displayed, rather than the caller ID ones.
Companies that have legitimate call centres outside the country will always have an exchange in country anyway, so as to allow for free/low cost calls to their number. In fact in many EU countries it's a legal requirement to have such a number - companies are not allowed to charge more than the cost of a local call to contact them, especially their help/service/complaints lines.
Re: (Score:2)
Just force calls originating from outside the country to have their actual numbers displayed
You're saying that as if there was such a thing as an "actual (phone) number" for ip [wikipedia.org]. What is the phone number of a computer in a data center? How do you know if that computer is the origin of the call or just the n-th relay?
And what phone number would you display for people calling their family on their own cell phone from abroad? Or is your solution to make cell phones unusable abroad?
Re: (Score:2)
In the UK such numbers just come up as "unknown", which is reasonable. The display should only show a number if there is a reasonably high level of confidence that it is genuine.
Re: (Score:2)
In the UK such numbers just come up as "unknown", which is reasonable. The display should only show a number if there is a reasonably high level of confidence that it is genuine.
Every time a city trader / UK retiree calls home from the other side of the EuroTunnel his number comes up as "unknown"? I very much doubt so. Do you have a source? But if that's true then we have different definitions of reasonable.
Re: (Score:2)
It depends. Where there is an agreement the real number comes up. Where there isn't it says "out of area" or "international".
That's my experience.
Re:Whoa. (Score:4, Insightful)
backwards compatibility be damned.
What is the legitimate use case for 3rd party number spoofing?
it's 2018 why haven't we solved the SPAM problem yet????
Stupid analogy. Spam is a problem worldwide. There is no obvious solution.
3d party number spoofing is an America+Canada only problem. The solution is obvious, and most of the world has already done it.
Re: (Score:2)
Re: (Score:3, Insightful)
A. Number portability. I can no longer be certain that an AT&T assigned number is still with AT&T.
Why does this require 3rd party number spoofing?
B. Many companies assign the main corporate number to all outbound calls. This is a feature that shouldn't be broken.
C. VOIP service. I want calls from my cell and voip to be transparent. It's also nice to be able to call as, so I can call as me or as my corporate phone number from one phone.
Neither of these require 3rd party number spoofing.
Spoofing is fine if the same company owns both numbers. That is legal almost everywhere.
Re: Whoa. (Score:5, Informative)
You can spoof any number by sending a user provided caller ID. The only reason the other party doesn't see the caller ID you provided is because the provider strips it from your signalling. If you are behind the phone switch of your company, the provider has no way to determine if the extension your phone switch signals to PSTN is correct. Depending on your trunk configuration, the provider thus either accepts the signalling, or strips it and replaces it with the trunk dial-in number (e.g. the number of the company's attendant switch board), so no callback will get through to the extensions.
If you are a company with several number blocks (e.g. several locations with their own trunks), and the company wants to show a central dial-in number for callbacks, the provider has a problem. It doesn't necessarily know all the locations of your company, because some might be with a different provider. Or the company has for redundancy reasons bought connectivity with different providers, with separate trunk numbers, but wants always their main number of the first trunk as the caller ID.
In this case, the company gets a "CLIP no screening" contract, where it is the sole responsibility of the company to signal the right caller ID, and the provider takes it without further checks, as it has incomplete information anyway and wouldn't be able to determine if the caller ID provided is valid or not. Only if there are complaints about wrong caller IDs coming from the trunk, the provider will cancel the "CLIP no screening" and no longer trust the information, strip it and replace it with the trunk number (or cancel the contract alltogether).
But if the calls with the spoofed number are crossing several providers, it will take a long time until the rogue trunk is determined that is using the wrong caller ID, because at the exchange points, the providers have to take the information of the call at face value, not really able to check if they are valid or not.
Re: (Score:2)
More to the point of OP
It is designed insecure for reasons stated above so making it illegal does nothing because criminals don't follow laws or they wouldn't be criminals.
Re: (Score:2)
making it illegal does nothing because criminals don't follow laws or they wouldn't be criminals.
I keep hearing this, so I'm persuaded. We'll do away with all laws then; it will save paper and as a bonus I'll be able to murder anyone I want.
Re: (Score:2)
So you're telling me that criminals follow laws? Kind of seems like what your shitty analogy means.
Re:Whoa. (Score:5, Insightful)
So there are legitimate reasons to allow caller ID spoofing
Of course there are, and you listed several, but that WAS NOT THE QUESTION,
Let me repeat: Is there any legitimate use case for THIRD PARTY phone number spoofing?
This means you call from a number that you own and control, and you make it look like it is coming from a number that you do NOT own or control, and do not have permission to use. This is obviously useful to criminals. Is it needed by anyone else?
Re: (Score:2, Informative)
Define "Legitimate"
Here's one all the same though,
Fortune 500 company decides that it wants to use the services of "Call center cubefarm dystopia" for part of its service call needs.
Call center cubefarm dystopia INC clearly is not Fortune 500 Inc, but has an agreement to PRETEND to be, with Fortune 500 Inc. Fortune 500 Inc DOES NOT WANT customers to know that Cubefarm Dystopia Inc is who is really handling their support calls, because that's just bad PR. They also do not want to train, retain, or operate
Re:Whoa. (Score:4, Insightful)
Contract signed by both number holders.
Next fringe case?
Re: (Score:2)
It only takes ONE kind of case if there are multiple millions of dollars of "shareholder value" on the line.
It is much easier to make cherry backroom deals with the telecoms to look the other way over such things (as a rule rather than an exception, so that end users have no real means of identifying that Callcenter Dystopia Inc is really who is answering all the support calls, so that Fortune 500 Inc can post EVEN BETTER quarterlies.) than it is to pay callcenter people at the pay grades otherwise demanded
Re: (Score:2)
That's the mechanism, not the legitimate use case.
Re: (Score:2)
So, Cubefarm Dystopia Inc spoofs being Fortune 500 Inc on their caller ID.
Fortune 500 Inc configures one of the numbers that they own to be the reported source of Cubefarm Dystopia's calls.
Re: (Score:2)
That implies that Cubefarm Dystopia does not itself subcontract, or otherwise have very transient operations necessitating it being the one doing the report modification.
We *ARE* talking about seeking the lowest priced option, and covering it up here.
Re: (Score:2)
That implies that Cubefarm Dystopia does not itself subcontract,
Correct. It is in the interest of Fortune 500 Inc to be aware of (and monitor for quality control purposes) any subcontractors actually doing work in its name. The entity seeking the lowest price option should be Fortune 500 Inc, not Cubefarm Dystopia.
Re: (Score:3)
Why can't you route your call through your office in order to avoid the need to spoof your number? That would be like a VPN for telephone calls.
An alternative would be something similar to SPF [wikipedia.org] so the recipient knows that you own both numbers (cell+office) and displays your office number when they receive a call from your cell phone.
Re: (Score:2)
Re: (Score:2)
What sort of software will run on a Western Electric 2500DM?
Falling for it? No way! (Score:2)
"you'd fall for it, too"
No, I wouldn't. I might not be very knowledgeable in how banks work, but I know one thing for sure: personal card info is personal. Nobody from the bank will ever ask you for your PIN number or the three digits on the back of your card. Nobody, ever. If they ever do, change the bank because they are not handling your personal data professionally.
I don't know how things are in the USA, but in my country all banks allow you to change your PIN at the card issuer's ATMs, the card is mail
Re: (Score:2)
Based on what evidence?
Mine. And my mobile provider's. As previously mentioned, different countries, different cultures.. Here, mobile subscriptions are really cheap, one of mine costs 5 EUR a month and you have free unlimited voice minutes to all landlines with very few exceptions, and thousands of international minutes, etc(*). So yes, people do call back most times because it costs them nothing. If I call someone and they don't answer, they call back almost without exception. The culture here is usually: texting is for things
Re: Whoa. (Score:2)
I've been waging bit of a personal war against local utilities for the last year over robocalls and phoning up asking for identifications. I want it banned. The average user , the people is IT professionals are meant to protect have no chance of identifying a well done scam if the legitimate phonecalls are indistinguishable from the fraudulent ones, and it's damn irresponsible for these companies to continue to use these tactics when they put everyone at risk. It costs peanuts to rent a handful of lines, an
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Yes, that is true.
Unfortunately, my bank has a nasty habit of doing exactly this. And no, you cannot call them back, because it is usually a call from back office (and they only call, they do not usually take calls).
I think that banks has long trained customers to fall for this scam.
Re: (Score:2)
19 out of 20 telephone calls who are not friends and family are scams
Really? Are you sure it's not 18 out of 19?
Haughey is a dumb-ass. (Score:5, Insightful)
So "alarm bells" went off in his head four times and he kept giving out his information? He should have said he would call his bank branch directly or the 800 number listed on the back of his card and hung up.
The "bank" called him, at his phone number, so he doesn't need to confirm anything - the bank needs to confirm themselves. Both of my banks say they will never ask for personal information if they contact me, not only for my safety but because -- spoiler alert -- they already have my information. (I, however, need to provide my information if I call them to prove that I am me.) In addition, why would they ask him to confirm information that won't be changed?
Haughey banks at a small Portland credit union, and last week he got a call on his mobile phone from an 800-number that matched the number his credit union uses.
Caller ID can be spoofed. Never trust it.
"People I've talked to about this say there's no way they'd fall for that, but when someone from a trustworthy number calls, says they're from your small town bank, and sounds incredibly professional, you'd fall for it, too," Haughey said.
No. Just no.
Re:Haughey is a dumb-ass. (Score:4, Informative)
More than that, when they asked for his PIN, twice, he should have hung up then and there. Banks never have, and never will ask for your PIN. It is always set either by yourself at a bank branch keying it into a terminal, or when you activate the card by dialing the number on the card sent to you at the time of activation.
The other stuff is semi-legit if you include all practices that banks have used since the beginning of time, but many of them are not in use anymore. Example: mother's maiden name is easily gained information in the age of The Book of Faces.
Re: Haughey is a dumb-ass. (Score:2)
If, as they claimed, they asked for his PIN so it could remain the same on the new card... why wouldn't they already have it on file?
Re: Haughey is a dumb-ass. (Score:5, Insightful)
The news needs to be spread far and wide that you always just thank them for the information and inform them you'll be calling their fraud line.
Re: (Score:3)
My fraud line called ME, and said "did you make these charges"? No. They denied them, and issued me a new card. No other verify needed.
Re: (Score:2)
Re: (Score:2)
Its been spread far and wide for years. The first time I received one of these calls was in the mid-90s claiming to be from the IRS. I was a little slow to realize it back then, but after they started asking me information I decided to call the IRS myself. Of course it wasn't actually the IRS.
Even back then I had heard of these scams.
Now it's not uncommon for me to get a call or text about suspicious activity on my credit card - about once a year. I NEVER call the number back. I call the main number a
Re: (Score:2)
I'd be surprised, but not too surprised, if banks had peoples pins on file. Whenever I've got a new card, the teller takes me to the ATM, explains things and then turns their back on me while I enter my (new) pin.
Re: (Score:2)
Re: (Score:2)
Pretty much this. I have a simple policy: it doesn't matter whether I believe the call is legitimate or not, I do not give out information or try to resolve a problem when it's the other party calling me. I note who it is and what they claim the problem is, then I call the contact number from my own records for that person/company (from my address book, the credit card itself, the last bill, their Web site from my bookmarks, etc.) and ask to be connected to the correct department for the problem. Now I know
Re: (Score:2)
So "alarm bells" went off in his head four times and he kept giving out his information?
Because no alarm bells went off. He's just trying to make it sound after the fact that he isn't completely naive, I suspect.
Re: (Score:2)
"you'd fall for it, too,"
No, no we wouldn't.
This. I don't believe that even the average Joe would give out their PIN to a caller, otherwise we would hear of far more successful scams than there are. In the UK, practically every bit of correspondence from banks hammers the point that you should never give out your PIN, even to bank staff (real or fake).
I can vouch for this (Score:5, Interesting)
The creepiest voice phish I ever got was the call from my little brother, exactly his voice and intonation pattern, telling us he was in jail in Mexico and needed money. The only way I knew it was a scam, besides the Mexican authorities suddenly accepting payment in Bitcoin, was knowing that he had been sick for years and unable to travel.
Comment removed (Score:5, Interesting)
Re:I can vouch for this (Score:5, Interesting)
I'm guessing that they phone-scraped voice from his job, which was buyer for a hinge manufacturing company in LA. He had to spend a lot of time on the phone.
Basic phone security (Score:3)
Donâ(TM)t call me, I will call you.
If you get a call from ANYBODY claiming whatever, hang up and call that supposed somebody at a known good number. Every time.
If they call my cell phone... (Score:2)
... it's a guaranteed scam. NOTHING legitimate has my cell phone number.
Re: (Score:2)
Re: (Score:2)
I had a cell phone number back in the 90s, but I have cut the wireless. Now I am corded only.
This was a great liberation. I can no longer be reached at any time, anywhere. No texts, send me an e-mail, to be read at my convenience, not yours. I have a phone that still works through power outages (because power to the landline system is supplied through the phone wires), including DSL still working through power outages. This saved me when we had a ten day power outage here, and all cell phone towers wer
Re: (Score:3)
Re: (Score:2)
He said that neigbours asked to send emails, not that they got to send them. I also have a landline phone that will work through power cuts.
Re: (Score:2)
This just means they're running out of obvious (Score:2)
Security professionals become easy targets (Score:2)
As people age they stop remembering details of scams but seem to remember they are smarter than the scammers so they can't be scammed. The result is they get taken. People who worked in security along with retired police and criminal lawyers are easier to scam after they retire than the average person.
Re: (Score:2)
Citation?
Rule Number F-cking One (Score:2)
Rule Number F-cking One: Never give out information to anyone who contacts you first.
It's just that simple. You find the number or confirm the number they left is legit, and you initiate the contact.
CSB: Once I was being legitimately audited by the IRS, and the IRS employee/contractor calls me and asks for my SSN. I was 99% sure it was the IRS, and the person threatened me with escalation, and I know you don't eff with the IRS. But I did not give out my SSN because it violated Rule Number F--king One. Ulti
Re: (Score:2)
Re: (Score:2)
There's been a lot of scams up here where the scammers pretend to be from the CRA (Canada Revenue), demanding payment now to avoid arrest. Some people don't even catch on when they demand payment in itunes cards.
Easy Fix (Score:5, Insightful)
Start holding the Telecoms responsible for failing to fix the ability to spoof Caller ID.
They start footing the bills for fraudulent shit like this they'll have that shit fixed in no time.
Never tell anybody anything (Score:3)
sounds incredibly professional, you'd fall for it, too," Haughey said.
Errr, no.
The first principle of phone banking is to never give out personal information to anyone who calls you. Never.
If you feel there is an issue that does need information to be passed, hang up and phone them on the public number. Just make sure you have actually hung up, there is a long-standing scam where the thieves actually recommend you call the bank, yourself. They then make the sound of hanging up but stay on the line. When you dial the bank's number, you are still actually talking to the scammers.
don't give out private info to a cold call! (Score:3)
Don't EVER give out private information to a cold call. Never, for any reason. If there's a problem, and it's urgent, tell them you'll call them back on a known number. (Not a number they provide./duh) Legitimate callers will agree to this. Non-legitimate callers will try to steer you to a different number or insist that you must take care of this now, on this call. Don't fall for it.
Let me repeat this for the cognitively impared: If they call YOU, do NOT give out private information. If you call THEM on a legitimate number, it's a different story.
Let's be safe out there.
So says Canada Bill Jones (Score:2)
sounds like he fell for a scam (Score:2)
when someone from a trustworthy number calls, says they're from your small town bank, and sounds incredibly professional, you'd fall for it, too
No I really wouldn't and I don't think anyone I know or where I work would either, I have been targeted with these before and know many others that have received similar types of calls and not even for a nanosecond would I fall for it. Hell when I have had legitimate calls from my bank I ask for a name/extension and tell them I will call the banks switchboard and ask for them. It isn't rocket science, if they called you DON'T TRUS
Root problem: spoofing (Score:2)
It's easy so say "I wouldn't fall for this", but some scammers are good. The ones that call you are excellent actors, and can be damned convincing. Just look at the number of elderly people who fall for the "grandkid in trouble" scams. Yes, this guy shouldn't have given out his PIN - that was one step too far.
However, the root problem in this particular case remains spoofing. There is absolutely no excuse for spoofing numbers to still be possible, after all these decades of abuse. The phone company (or VoIP
"""trustworthy""" number (Score:2)
but when someone from a trustworthy number calls
Caller ID is not "trustworthy", and any number you get via that is by extension not trustworthy. Anyone who hasn't learned that just from the all the "same exchange" spoofing (all but last four numbers same as yours) these days is a fool.
Verification. (Score:2)
Sorry, but if you want something from me, do it in writing. It's that simple.
If I want something from you, you demand I call your main number and agree/sign things. You have to do the same. Except I have to verify myself to you when I call, so when you call me I expect you to verify yourself to me.
Any automated or inbound call that doesn't give me information I demand ("Okay, can you tell me my last transaction and my account number please?") doesn't get anything from me. Yes, I've actually asked my ban
DMMF (Score:2)
In a correctly designed phone system, it shouldn't be possible to generate DTMF tones on a call you didn't originate yourself without first spelling "DMMF" by a sequence of Morse-code hook flashes.
DMMF = dox me, motherfuckers.
Your address book should have little padlocks beside "verified" numbers, where the name of the organization and the number are known by the smart phone mafia to correspond.
It really ought to be required to originate the call from a verified address book entry in order to access inline
Re: (Score:2)
Hmmm, I was feeling bold today, and didn't click preview, having forgotten that I had used any markup at all.
Very exciting.
The hard to do solution (Score:2)
Ok, so the request for his PIN number didn't set off the alarms.
Really, this is an example of where you make the caller provide some information, then if ti seems wrong hang up and call in to the number you know.
I'm getting 5-15 calls a month from the 'credit card reconciliation center' or some such BS. I haven't listened past them asking me for my name, which if they are my bank or card company they should already know.
uh, no (Score:2)
Long story short, two fradulent charges were made on his account totaling $3,400. "People I've talked to about this say there's no way they'd fall for that, but when someone from a trustworthy number calls, says they're from your small town bank, and sounds incredibly professional, you'd fall for it, too," Haughey said.
Uh, no, really, I wouldn't. If they call me, I give them nothing. I have to call them, on their regular public phone numbers.
How a real fraud alert works (Score:2)
Nothing clever about this voice phishing. The victim forgot the telltale signs of a scam and ignored the bells going off in his head. Scammers are good at psychological skills and they rush the convers
It's like people forget the head of the animal (Score:2)
This is a great story of stupidity. You've "given out that information before" so you can give it out again?! "Before", you gave it to someone you trusted/called/engaged. This time, they engaged you.
Isn't that already enough to tell you to walk away?
How about the ol' if-it-aint-broke-don't-fix-it? Your card didn't stop working for you. Stop trying to solve a problem that you haven't experienced. Either go to the gas station and try your card for yourself, or use your other card (that's why you should
Re: (Score:2)
That's racist. You're telling us you wouldn't take a call from Sitting Bull?
Re: (Score:2)
That's racist. You're telling us you wouldn't take a call from Sitting Bull?
He died in 1890, still waiting for a dialtone. He actually had a candlestick phone, but it had not yet been connected.
Re: (Score:2)
You're telling us you wouldn't take a call from Sitting Bull?
I dunno, is he calling to confirm my address and ask for my PIN?
Re: (Score:2)
There's another type of Caller ID known as Automatic Number Identification (ANI). How easy is it to fake that?
Some parts of the telephone system need a way to provide perfect information about who called, such as with Psychic Buddy's 1-900-SUC-KERS toll lines. If that is faked (even outside real-time), then those people would lose out on money from inbound callers.
Re: (Score:3)
In his 30 years of being "a cybersecurity professional" he never learned that caller ID is trivially faked?
Anyone using "cyber" as part of their description are fake themselves.
Re:Caller ID? (Score:4, Funny)
In his 30 years of being "a cybersecurity professional" he never learned that caller ID is trivially faked?
Anyone using "cyber" as part of their description are fake themselves.
What about us cyber-punks, you insensitive clod?
Re: (Score:2)
That's what that call was. Oh, BTW, when a bank (or credit-whatever) issues a new card, they ALWAYS give out a new PIN!!
My credit union walks me to an ATM, tells me to enter a pin and turns their back while I do it.
Re: (Score:2)
What exacly are you afraid of? Of breaking down into a jibbering wreck and blurting out all your passwords and PIN numbers?