Jump to content

Search the Community

Showing results for tags 'identity theft'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 6 results

  1. Police in the Mongolian capital of Ulaanbaatar have apprehended 800 Chinese citizens and confiscated hundreds of computers and mobile phone SIM cards as part of an investigation into a cybercrime ring, local security authorities said. The arrests took place after police raided four locations, and followed two months of investigations, Gerel Dorjpalam, the head of the General Intelligence Agency of Mongolia, said at a media briefing. He did not go into specific details of the offences but said they involved illegal gambling, fraud, computer hacking, identity theft and money laundering. "As of this moment we suspect they are linked to money laundering," he said. "We are looking into the matter." All of the 800 Chinese citizens in detention came to Mongolia using 30-day tourist visas. The Chinese Embassy in Ulaanbaatar said in a statement that it would cooperate with the Mongolian police. "The police department of Mongolia has taken the necessary measures in this case and is currently in the process of investigating," it said. "China and Mongolia will have open law enforcement and security cooperation, and the two parties will be working closely together on this matter." A month ago, 324 undocumented Chinese citizens were arrested in the Philippines on charges of running illegal online gaming activities and engaging in cyberfraud, according to a notice by the country's immigration bureau. Mongolia saw about 480,000 foreign tourists enter in the first three quarters of this year, up 10.7%, with Chinese citizens accounting for nearly a third of the total. The landlocked north Asian nation is trying to diversify its economy and ease its dependence on raw materials, but it has traditionally been wary of opening up its economy to China, its giant southern neighbour. Source: Mongolia arrests 800 Chinese citizens in cybercrime probe (via The Star Online)
  2. The suspect, only identified by the initials B.B.A., second from left, is presented at a press conference at the headquarters of the National Police in South Jakarta on Friday. (Antara Photo/Reno Esnir) Police arrested a 21-year-old man in Sleman, Yogyakarta, on Friday for allegedly using malicious software to extort victims and steal financial data for personal gain. Yogyakarta Police spokesman Senior Comr. Yuliyanto said the suspect, only identified by the initials B.B.A., sent phishing emails to at least 500 randomly selected addresses to spread ransomware, or software designed to block access to computer systems until a ransom is paid. The suspect had reportedly been acting alone since 2014 and collected 300 Bitcoins, or equivalent to around Rp 31.5 billion ($2.25 million), Yuliyanto said. He said the investigation started after a tipoff that the suspect had hacked the computer system of a company based in San Antonio, Texas. The suspect allegedly also stole credit card data from internet users for personal gain. The National Police's cybercrime unit is investigating the case. Yuliyanto said the Yogyakarta Police are assisting in the investigation and will forward evidence to the National Police headquarters in Jakarta. "The evidence includes a Harley Davidson motorcycle and several computers. We will send these [to Jakarta]," he said. The suspect has been in custody in Jakarta since his arrest. The suspect lived in a boarding house in Sleman for the past two years, Yuliyanto said, without providing further detail. Senior Comr. Rickynaldo Chairul, head of the police's cybercrime investigation unit, said separately in Jakarta that the suspect had sent emails containing hyperlinks that directed unsuspecting recipients to his webmail server, which would then install ransomware on recipients' computer systems and prevent them from accessing their data. In the case involving the US company, the suspect threatened to delete its data if it failed to pay the ransom within three days. "The suspect demanded the ransom be paid in Bitcoin before restoring access to the victim's mail server," Rickynaldo said. The suspect reportedly used the email address, [email protected], in his communications with victims. He faces up to six years in prison under the Electronic Information and Transactions Law. Source: Police Arrest Yogyakarta Man Who Used Ransomware Attacks to Amass 300 Bitcoins (via Jakarta Globe) p/s: For those who can understand Indonesian language, there's a news reporting on that. https://cyberthreat.id/read/3532/Pertama-Kali-dalam-Sejarah-Polri-Tangkap-Hacker-Ransomware
  3. Most Important Methods to Detect and Prevent Identity Theft From Hackers An identity thief can steal your sensitive information to commit fraudulent activities, such as file tax, apply for medical services or credit. Identity theftcan damage your reputation, credit status, and cost your money and time. If you receive mysterious bills or credit card charges without shopping for anything, investigate this matter carefully because you are a victim of identity theft. Sometimes, you may get denials for your loan application, or someone calls you to collect debts for new accounts. All these situations indicate that your identity is stolen and misused. A victim of identity theft may spend over 600 hours in clearing his/her identity. You will need affidavits and reports to prove theft. To protect yourself from this situation, you will need a service such Identity Guard to protect against future theft. Here are some easy tips to decrease the risk of identity theft. Fraud Alert and Security Freeze Contact a credit bureau and put a fraud alert on your credit reports. Duration of a fraud alert may vary between 90 days and seven years. After placing a fraud alert, you will get notifications to verify your identity before taking any action on credit. For a security freeze, you will need a password or PIN to check your credit report. Unlike fraud alerts, you have to pay a fee for a security freeze on credit reports. Obtain Credit Reports You are entitled to a free credit report annually from three credit bureaus. Make sure to order these reports once after every four months to monitor your credit. Unfortunately, you can get a report of one bureau at a time. If your reports don’t show identity theft, you might miss these reports for one year. After using your free annual reports, you can purchase credit reports at $11 to $15. Subscribe to credit monitoring services to get free credit reports. Monitor Online Accounts Get access to online banking to check your bank accounts periodically. In this way, you can keep an eye on your accounts and avoid unauthorized charges. For the security of your online bank account, you should not write down your login information. Moreover, don’t share it with anyone. You have to protect this information from identity thieves. Credit Monitoring Discontinue Pre-Approved Credit Cards A pre-approved card can disclose your personal information. Identity thieves can misuse this information to get new credit cards. Make sure to shred credit cards before throwing them away. Pay online bills because identity thieves can steal your checks from a mailbox. Get the advantage of online payment facilities to prevent attacks of identity thieves. Secure Your Social Security Number Keep your social security number at a safe place. Avoid putting a social security card in your pocket or wallet. You should not write down its number on a random location. Before giving this number to customer service personnel, carefully see around. Potential thieves can note down your number for its misuse. Thieves can get your sensitive information via stolen checks. With your checking account number, an identity thief can make purchases and create checks. Pick up your new checks from the bank instead of getting them in your mailbox. Source
  4. 4iQ is a identity threat intelligence company that monitors the internet for identity records exposed in data breaches and accidental leaks. The latest 4iQ identity breach report indicates that between 2016 and 2017 there was a 182 percent increase in raw identity records discovered by its team. The report, "Identities in the Wild: The Tsunami of Breached Identities Continues", reveals 4iQ's detection of over three billion identity records curated from 8.7 billion raw records in 2017. Extracted from that data, 4iQ analyzed the details of close to 3,000 breaches it discovered--which are within the reach of threat actors. To make matters worse, identity thieves' tactics have become more sophisticated. Forbes recalls that, “in the 1982 sci-fi movie Blade Runner, Deckard, a hard-bitten ex-detective played by Harrison Ford, had to track down replicants — robots who were so lifelike that it was almost impossible to tell man from machine. In the coming years, bankers will need the equivalent of Deckards on their staffs as they deal with one of the most serious problems facing the financial community: synthetic identity fraud.” It’s not a fictional concept anymore, however. Referred to as synthetic identity theft, this type of fraud differs from traditional identity theft in that the perpetrator creates a new synthetic identity instead of stealing an existing one. The process begins with searching for inactive Social Security numbers, which will typically lead to the Social Security numbers of children. Fake addresses are linked to the kids’ Social Security numbers and then over time a credit rating is built for these identities as products and services are purchased on credit. Forbes notes that the threat actors, “eventually rack up debts of $20,000 or more on countless accounts only to disappear without a trace. Synthetic identity fraud is costing banks billions of dollars and countless hours as they chase down people who don’t even exist.” Personal data breaches are the second most common cybercrime, according to the latest annual FBI/IC3 cybercrime report. Corporate data breaches are lower on the list, but some commercial breaches have widespread reach, such as the Equifax breach. Recently, it was revealed just how extensive a breach it was. In addition to a huge amount of people impacted, the level of detail is alarming--addresses, dates of birth, social security numbers, genders, phone numbers, driver's license numbers, credit card numbers, tax ID, and the state of driver's licenses exposed. A case in point is an eleven-year-old boy from Kansas whose Social Security number was used to rent a car and open bank accounts and credit cards in Wisconsin. His mother, Wiesje Sammis, said she recently received a perplexing call from a Milwaukee County detective who asked if her son had rented a car. “I was, of course, like, 'Ummm no, he's 11,’" she said. Sammis said her son Terrelle Lewis's identity was stolen and his Social Security number was being used. "I think it's kind of shocking. That you can do that these days," Lewis said. Police were able to locate the culprit at a Walmart in West Milwaukee. When asked for ID he presented a fake driver's license and a Social Security card with Lewis's number on it. The suspect had apparently also rented a car in January, but never returned it. He also opened up several credit card and bank accounts. Lewis's mother said police informed her of the likelihood her son's Social Security number was purchased online. She believes it was acquired during a data breach of his health insurance company four years ago. "'There's no way somebody could take a child's identity. There's just no way' is what I thought," Sammis said, upon recollection. And, now she is concerned that others may have his Social Security Number, as well. "I think this will impact him long term," she said. Parents (and others) who need assistance with an identity theft situation, can visit IdentityTheft.Gov which is administered by the Federal Trade Commission (FTC). A credit freeze can also be requested, to prevent new accounts from being opened up. < Here >
  5. Federal authorities unsealed a 22-count indictment last week that serves as a prime example of the challenges of managing and securing third-party access to corporate networks. According to the U.S. Department of Justice, eight people in Florida have been charged in connection with the theft of information on customers of AT&T. The indictment names: Chouman Emily Syrilien, 25, of Lauderdale Lakes; Arrington Basil Segu, 28, of Miami; Carlos Antonio Alexander, 24, of Orlando; Angel Arcos, 23, of Pompano Beach; Shantegra La’Shae Godfrey, 23, of Deerfield Beach; and Monique Smith, 31, of Pompano Beach as conspirators in the case. According to the charges, Syrilien was an employee of Interactive Response Technologies (IRT), which provides staffing for call centers to handle direct sales and customer inquiries for AT&T. The indictment alleges that Syrilien provided a co-conspirator with personal identifying information from multiple AT&T customer files, as did Segu. The criminals added Alexander, Godfrey and Smith as 'authorized users' on victims’ credit or debit card accounts. Once a co-conspirator’s name was added as an authorized user, the bank and or credit card company was directed to mail additional debit or credit cards bearing the names of these newly-added authorized users to their addresses or addresses under their control. According to authorities, the defendants then used these credit and debit cards to make purchases or obtain money. Alexander, Smith and Godfrey are each accused of making both retail purchases as well as cash advances in excess of $24,000, $12,000 and $8,200, respectively. "Keeping a close eye on who has access to what is a seriously difficult undertaking, and fully vetting and monitoring all staff requiring access to personal info is likely to be all but impossible, even when all those staff are in-house," blogged John Hawes on Sophos' Naked Security blog. "Firms that entrust data to third parties need to ensure that assurances they receive regarding auditing and vetting are backed up by concrete evidence that their data is properly secured," he added. If convicted, the defendants each face a maximum of 30 years in prison for the conspiracy charge, a maximum of 10 years in prison for the access device fraud charge and a mandatory term of two years in prison for each aggravated identity theft charge - at least one of which must be served consecutive to any other term in prison. Source
  • Create New...