.

NW3C News.....

<<

oyle

User avatar

Sr. Member
Sr. Member

Posts: 264

Joined: Mon Jan 02, 2006 11:19 am

Location: Cleveland Ohio

Post Fri May 26, 2006 6:39 pm

NW3C News.....

I had a job Interview on May 1st at the National White Collar Crime Center in Fairmont WV. I had to drive the 250 miles to get there. While I was there (in the wrong building) I submitted my paperwork to volunteer for the NWCCC, the National White Collar Crime Consortium. In the lobby of the correct building (finally) I picked up a free copy of their magazine, "The Informant:The magazine for professionals who support the prevention, investigation, or prosecution of economic and high-tech crime".

So I got in the snail mail today the next issue, Vol.2, No.1, March-June 2006. OH boy, I'm on their list! Yay! (reallly!) ;D ;D

This magazine has LOTS of good stuff regarding Internet Crime, fraud, and how to report possible crimes. The current issue features Shaquille O'Neal attending a NW3C STOP course.

BTW, the NWCCC offers classes in Internet fraud. Sadly, none of them are in my area, Cleveland.

So I thought maybe I could start a new forum here in which I relate some of the stories in the magazine. This stuff is really fascinainting, and scary at the same time.

Here's a few stories from the new March June issue.

For further info:

NW3C website is here.
ICCC (Internet Crime Complaint Center) website is here.
National Cyber-Forensics and Training Alliance is here.
Last edited by oyle on Fri May 26, 2006 7:25 pm, edited 1 time in total.
MCP, MCP+I, MCSA, MCSE(NT4/W2K), CCNA, CCA, NWCCC, VH-PIRTS, CEH
--------------------
"hackers are like jedi, crackers are like the sith: do not fall prey to the dark side".

From 1337 h4x0r h4ndb00k: "the ten laws of geek", law x
                  -Tapeworm
<<

oyle

User avatar

Sr. Member
Sr. Member

Posts: 264

Joined: Mon Jan 02, 2006 11:19 am

Location: Cleveland Ohio

Post Fri May 26, 2006 6:59 pm

Re: NW3C News.....

Note: This IS NOT the entire article from the magazine. The entire article is 4 pages. it is jus the highlights, as all posts in this forum will be.


****Internet Crime Spotlight:Disaster Fraud

The best time to educate and warn the public about disaster fraud is before a disaster occurs.


***What is Disaster Fraud?
Disaster Fraud includes both natural disasters such as hurricanes, tornadoes, earthquakes, fires, floods, tsunamis, etc., AND man-made disasters, such as terrorist attacks, hazardous material spills, etc.
Typical forms of disaster fraud include fraudulent charitable solicitations, government-benefit fraud, property insurance fraud, contractor and vendor fraud, price gouging, identity theft, and forgery.

10 warning signs of Contractor Fraud:
  • Pressure Tactics
  • A special price if the homeowner agrees or signs a contract right away.
  • The Contractor requires large cash deposits in advance
  • A discount will be offered because the job will be used for training or as a model home.
  • Contractor tells the homeowner "With all the work out there now, I don't have the time to come back".
  • The contractor's credentials or references can't be verified.
  • The contractor is unlicensed.
  • The homeowner is asked to sign a blank contract, or a contract with blanks in it.
  • The contractor pressures the homeowner to sign a completion certificate before the job is finished.
  • Contractor asks homeowner to obtain all permits.

The article relays lots of info about scam artists feeding off of Hurricane Katrina.
****How to report it:
DHS (Dept. of Homeland Security) Hurricane Katrina elief Fraud Hotline:

(operated by Department of Defense OIG)
  • To report Government Fraud or Public Corruption call: 1-866-720-5721 or
  • Call the FBI's tip line, 1-800-CALL-FBI (1-800-255-5324

Federal Emergency Management Agency (FEMA) (Stop laughing!!) ::)
[/list]
[/list]
If an individual has mistakenly reported damages on a claim, FEMA should be contacted immediately at 1-800-621-FEMA(3362). The claim can be corrected or withdrawn and the individual might avoid being prosecuted. Additionally, if individuals have knowledge of someone taking advantage of other's misfortune, this should be reported via the FEMA Fraud Hotline at 1-800-323-8603. Darn it, stop laughing!  ;)

Call the FTC's Consumer Response Center toll-free at 1-877-FTC-HELP (1-877-382-4357).
Last edited by oyle on Fri May 26, 2006 7:24 pm, edited 1 time in total.
MCP, MCP+I, MCSA, MCSE(NT4/W2K), CCNA, CCA, NWCCC, VH-PIRTS, CEH
--------------------
"hackers are like jedi, crackers are like the sith: do not fall prey to the dark side".

From 1337 h4x0r h4ndb00k: "the ten laws of geek", law x
                  -Tapeworm
<<

oyle

User avatar

Sr. Member
Sr. Member

Posts: 264

Joined: Mon Jan 02, 2006 11:19 am

Location: Cleveland Ohio

Post Fri May 26, 2006 7:34 pm

Re: NW3C News.....

I just discovered the magazines are online at the NWCCC website in Adobe .pdf. The current Mar-Jun 2006 issue is here.
You will need to scroll down a little bit.


Oooooo, here's a good one: Women and White Collar Crime. They do stupid things too, I guess. 'Nuff Said. GO here.
Last edited by oyle on Fri May 26, 2006 7:49 pm, edited 1 time in total.
MCP, MCP+I, MCSA, MCSE(NT4/W2K), CCNA, CCA, NWCCC, VH-PIRTS, CEH
--------------------
"hackers are like jedi, crackers are like the sith: do not fall prey to the dark side".

From 1337 h4x0r h4ndb00k: "the ten laws of geek", law x
                  -Tapeworm
<<

oyle

User avatar

Sr. Member
Sr. Member

Posts: 264

Joined: Mon Jan 02, 2006 11:19 am

Location: Cleveland Ohio

Post Sat May 27, 2006 10:40 am

Re: NW3C News.....BLACKWORM Mass-Mailer!

BLACKWORM
February 2, 2006 -- Blackworm is a mass-mailing worm which
degrades security software and destroys certain types of files. The
worm is also known as: CME-24, Kapser.A, KillAV.GR, Grew.A, Nyxem.
E, MyWife.d, Small.KI, Tearec.A, and Blackmal.E. Blackworm will
destroy files on infected systems on the 3rd day of every month
beginning February 3, 2006. Blackworm is detected and removed
by up-to-date anti-virus software.
An overview of this worm can be found [url=http://www.lurhq.
com/blackworm.html.]here.[/url]If you do not have up-to-date anti-virus
software installed on your system then you can use one of the following
removal tools:
here.
or,
[url=http://securityresponse.symantec.com/avcenter/venc/
data/w32.blackmal@mm.removal.tool.html]here.[/url]
Last edited by oyle on Sat May 27, 2006 10:54 am, edited 1 time in total.
MCP, MCP+I, MCSA, MCSE(NT4/W2K), CCNA, CCA, NWCCC, VH-PIRTS, CEH
--------------------
"hackers are like jedi, crackers are like the sith: do not fall prey to the dark side".

From 1337 h4x0r h4ndb00k: "the ten laws of geek", law x
                  -Tapeworm
<<

oyle

User avatar

Sr. Member
Sr. Member

Posts: 264

Joined: Mon Jan 02, 2006 11:19 am

Location: Cleveland Ohio

Post Sat May 27, 2006 10:44 am

Re: NW3C News.....Sago Mine Disaster Fraud

There are unscrupulous people (Ooooops, almost caled them "scumbags") out there that are trying to cash in on the recent mine disaster in Sago WV, where 13 miners died....


ATTENTION - E-MAIL SOLICITATION OF FUNDS FOR A
MINER HURT IN A WEST VIRGINIA MINE DISASTER
January 11, 2006 -- On January 3, 2006, an explosion occurred
in the Sago Coal Mine, located in West Virginia, trapping 13 miners.
Randal McCloy, Jr., is the only survivor of the disaster. The FBI
has become aware of a spam e-mail soliciting funds for the medical
care of Randal McCloy, Jr. The e-mail purports to be from Dr.
Lawrence Roberts, who is one of the main physicians in charge of
McCloy. The e-mail address is “dr_lawrenceroberts@yahoo.
com.co.in” and recipients are requested to respond to the e-mail
if they are interested in making a donation.
Last edited by oyle on Sat May 27, 2006 10:55 am, edited 1 time in total.
MCP, MCP+I, MCSA, MCSE(NT4/W2K), CCNA, CCA, NWCCC, VH-PIRTS, CEH
--------------------
"hackers are like jedi, crackers are like the sith: do not fall prey to the dark side".

From 1337 h4x0r h4ndb00k: "the ten laws of geek", law x
                  -Tapeworm
<<

oyle

User avatar

Sr. Member
Sr. Member

Posts: 264

Joined: Mon Jan 02, 2006 11:19 am

Location: Cleveland Ohio

Post Sat May 27, 2006 10:56 am

Re: NW3C News.....Extortion email

ATTENTION - EXTORTION E-MAIL
March 13, 2006 -- The FBI has been made aware of a spam
e-mail attempting to extort money from the recipient. The e-mail
purports to be from Shawn Dudziak, using the e-mail address of
shawndud@hotmail.com. The e-mail provides accurate information
about the victim including complete name, address, telephone
number, social security number, and date of birth; all the
information a credit report/credit application would include.
The e-mail threatens to destroy the victim’s credit unless the victim
sends $500.00 through e-gold or Western Union. The e-mail
alleges that once the money is received, the victim’s information
would be deleted from the sender’s database. It further advised
the victim would never hear from the sender again. THIS E-MAIL
IS AN ATTEMPT TO EXTORT MONEY. DO NOT FOLLOW THE INSTRUCTIONS.
If you receive a spam e-mail that contains your personal information,
it is suggested that you:
• Alert credit card companies.
• Alert banking institutions.
• Contact the three major credit bureaus and request an alert
be put on your file.
• Request a copy of your credit report and notify the credit bureau
of any suspicious entries.
Be cautious - protect personal identity when responding to requests
or special offers delivered through unsolicited e-mail:
• Guard your personal information as well as your account information
carefully.
• Keep a list of all your credit cards and account information
along with the card issuer’s contact information. If your monthly statement looks suspicious or you lose your card(s), contact the
issuer immediately.
MCP, MCP+I, MCSA, MCSE(NT4/W2K), CCNA, CCA, NWCCC, VH-PIRTS, CEH
--------------------
"hackers are like jedi, crackers are like the sith: do not fall prey to the dark side".

From 1337 h4x0r h4ndb00k: "the ten laws of geek", law x
                  -Tapeworm
<<

oyle

User avatar

Sr. Member
Sr. Member

Posts: 264

Joined: Mon Jan 02, 2006 11:19 am

Location: Cleveland Ohio

Post Sat May 27, 2006 10:59 am

Re: NW3C News.....NEW Nigirian scam

Oh boy, just what I need. I don't get enough of these things.

NIGERIAN 419 SCAM - NEW SOPHISTICATED TECHNIQUE
March 7, 2006 -- A typical phishing scam is a three step process:
1. The phisher deploys a Web site which mimics portions of a
legitimate financial institution or other e-commerce Web site.
2. The phisher crafts an e-mail message which appears to be from
the organization represented on the phishing Web site. The e-mail
message notifies the potential victim of a problem with their account
and instructs them to login to the phishing site where the
account information will be “verified”.
3. Utilizing spam, the phisher sends this e-mail to hundreds of
thousands of potential victims. If the victim falls for the scam, they
end up divulging their account, credit card, and other identity theft
related information. This information is then collected by the phisher
and used to commit credit card fraud and other identity theft
related offenses.
The FBI has become aware of a new phishing technique that adds
another step to the process. It utilizes the login credentials entered
by the victim to connect to the authentic Web site and downloads
unique identifying victim information such as first and last name.
This data is then used to populate portions of the phishing Web
site. By doing so, the phishing site appears more legitimate; therefore,
the victim is more likely to divulge sensitive information.

In this latest version of the scam, first reported by the FBI in November,
the recipient is directed to open a bank account at a Suffolk
England Bank and is provided a link to the bank’s Web site. After
clicking the link, the victim is directed to a professional-looking
bank Web site which appears to be that of Suffolk England Bank;
however, it is actually a replica of the true bank site. Within hours
after opening the account, a balance of millions of dollars appears
to have been deposited in the victim’s account. When attempting
to transfer or withdraw funds from the account, the victim receives
a notice requiring certain “fees” to be paid. The victim is then instructed
to wire transfer the fees to Africa. If the victim makes an
inquiry concerning the wire transfer, they are given instructions for
a Bank of China branch in London and provided some reason justifying
why the Suffolk England Bank cannot handle the transfer.

Review of the wiring instructions indicated the funds are actually
being transferred to the Bank of China in Beijing.
MCP, MCP+I, MCSA, MCSE(NT4/W2K), CCNA, CCA, NWCCC, VH-PIRTS, CEH
--------------------
"hackers are like jedi, crackers are like the sith: do not fall prey to the dark side".

From 1337 h4x0r h4ndb00k: "the ten laws of geek", law x
                  -Tapeworm
<<

Dengar13

User avatar

Sr. Member
Sr. Member

Posts: 380

Joined: Tue Sep 20, 2005 8:43 am

Location: The Steel City

Post Sat May 27, 2006 10:33 pm

Re: NW3C News.....NEW Nigirian scam

Oyle wrote:Oh boy, just what I need. I don't get enough of these things.

NIGERIAN 419 SCAM - NEW SOPHISTICATED TECHNIQUE
March 7, 2006 -- A typical phishing scam is a three step process:
1. The phisher deploys a Web site which mimics portions of a
legitimate financial institution or other e-commerce Web site.
2. The phisher crafts an e-mail message which appears to be from
the organization represented on the phishing Web site. The e-mail
message notifies the potential victim of a problem with their account
and instructs them to login to the phishing site where the
account information will be “verified”.
3. Utilizing spam, the phisher sends this e-mail to hundreds of
thousands of potential victims. If the victim falls for the scam, they
end up divulging their account, credit card, and other identity theft
related information. This information is then collected by the phisher
and used to commit credit card fraud and other identity theft
related offenses.
The FBI has become aware of a new phishing technique that adds
another step to the process. It utilizes the login credentials entered
by the victim to connect to the authentic Web site and downloads
unique identifying victim information such as first and last name.
This data is then used to populate portions of the phishing Web
site. By doing so, the phishing site appears more legitimate; therefore,
the victim is more likely to divulge sensitive information.

In this latest version of the scam, first reported by the FBI in November,
the recipient is directed to open a bank account at a Suffolk
England Bank and is provided a link to the bank’s Web site. After
clicking the link, the victim is directed to a professional-looking
bank Web site which appears to be that of Suffolk England Bank;
however, it is actually a replica of the true bank site. Within hours
after opening the account, a balance of millions of dollars appears
to have been deposited in the victim’s account. When attempting
to transfer or withdraw funds from the account, the victim receives
a notice requiring certain “fees” to be paid. The victim is then instructed
to wire transfer the fees to Africa. If the victim makes an
inquiry concerning the wire transfer, they are given instructions for
a Bank of China branch in London and provided some reason justifying
why the Suffolk England Bank cannot handle the transfer.

Review of the wiring instructions indicated the funds are actually
being transferred to the Bank of China in Beijing.



This one as well as the "lottery winner" ones crack me up!
A+, Net+, MCP, CEH
MCSE: Security/Messaging
MCSA: Security/Messaging
Former U.S. Marine and damn proud of it!

Return to News from the Outside World

Who is online

Users browsing this forum: No registered users and 0 guests

cron
.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software