FTC expands rules to hold tech support scammers accountable

The Federal Trade Commission (FTC) can now go after scammers posing as tech support providers even if it's the consumer who called them up. It has just approved amendments to its Telemarketing Sales Rule that expands its coverage to include "inbound" calls to companies pitching "technical support services through advertisements or direct mail solicitations." Samuel Levine, Director of the FTC's Bureau of Consumer Protection, explained that the new rule will allow the agency to hold these scammy businesses accountable and to get money back for the victims. 

"The Commission will not sit idle as older consumers continue to report tech support scams as a leading driver of fraud losses," Levine also said, because the rule's expansion would mostly help protect consumers 60 years and older. According to the agency, older adults reported losing $175 million to tech support scams in 2023 and were five times more likely to fall for them than younger consumers. 

Tech support scams typically trick potential victims into calling them by sending them emails or triggering pop-up alerts claiming that their computer has been infected with malware. Scammers then ask their targets to pay for their supposed services by wiring them money, by putting money in gift or prepaid cars or by sending them cryptocurrency coins, because those methods can be hard to trace and reverse. They've long been a problem in the US — the agency shut down two massive Florida-based telemarketing operations that had scammed victims out of $120 million in total way back in 2014 — but the issue has been growing worse over time. The $175 million victims reported losing in 2023 was 10 percent higher than the reported losses to tech support scams in 2022. 

As the FTC notes, the Telemarketing Sales Rule has been updated several times since the year 2000 before this latest amendment. The first amendment in 2003 led to the creation of the Do Not Call Registry for telemarketers, while subsequent changes were made to cover pre-recorded telemarketing calls and debt collection services.

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/ftc-expands-rules-to-hold-tech-support-scammers-accountable-143051612.html?src=rss

Meta says it’s taken down 2 million accounts linked to ‘pig butchering’ scams

Meta is making progress in its fight against pig butchering scams. In an update, the company said it has taken down more than 2 million accounts associated with such scams this year and that its effort to work with other companies to take down fraudsters has had some success.

Described by Meta as “one of the most egregious and sophisticated” online scams, pig butchering is an increasingly common ruse in which scammers trick victims, who they often find on social media and dating apps, into making crypto investments and other financial schemes before disappearing with their funds. One study, published earlier this year and reported by Bloomberg, found that these scams “have likely stolen more than $75 billion from victims around the world” since 2020.

Meta says it’s been tracking the criminal networks behind these scams for the last two years as these groups have increasingly grown their geographic footprint. “This year alone, we’ve taken down over two million accounts associated with scam centers in Cambodia, Myanmar, Laos, the United Arab Emirates and the Philippines,” the company said in a blog post. “We also continue to update behavioral and technical signals associated with these hubs to help us scale automated detection and block malicious infrastructure and recidivist attempts.”

Earlier this year, Meta joined Match Group, Coinbase and others in forming a coalition to jointly fight financial scams. In its latest update, Meta notes that it has also worked with other firms exploited by scammers. It says that OpenAI recently tipped off the social media company to “a newly stood up scam compound in Cambodia” after the AI company caught the would-be scammers attempting to translate scam content.

This article originally appeared on Engadget at https://www.engadget.com/social-media/meta-says-its-taken-down-2-million-accounts-linked-to-pig-butchering-scams-180036668.html?src=rss

Google’s live scam detection for phone calls is now out for Pixel devices

One of the Gemini AI-powered features Google introduced at I/O this year was a solution for never-ending scam calls. It has the capability to detect whether a call is suspicious while it's still ongoing and can alert you so that you could drop the call as soon as possible. That live scam detection feature for phone calls is now available for Pixel 6 and newer devices, as long as you're part of the Phone by Google public beta program in the English language. 

"[S]cam calls are evolving, becoming increasingly more sophisticated, damaging and harder to identify," the company said in its announcement. Scam Detection uses on-device AI to determine whether a call is a potential scam in real time. For instance, if the caller tells you it's your bank and asks you to transfer funds to another account because yours had allegedly been breached — a common scam tactic — you'll get an audio and a haptic alert. When you look at your phone, you'll see a visual warning, along with a button to easily end the call. If the AI ends up making a mistake, you can tap on the "Not a scam" button instead.

A screenshot that says
Google

Scam Detection is off by default, and it's up to you whether you want to activate it. Google says it doesn't send your calls or their transcripts to a remote server, because the feature processes phone calls on-device. On the Pixel 9 series, it's powered by Gemini Nano, which Google describes as its "most efficient model for on-device tasks." On Pixel devices older than the Pixel 9, it's powered by the company's other machine learning models.

Google didn't say when live scam detection will make it out of beta, but it promised that it's coming soon to more Android devices. In October, the company also rolled out enhanced scam detection for Messages, which also uses on-device machine learning models to identify scam texts. 

This article originally appeared on Engadget at https://www.engadget.com/mobile/smartphones/googles-live-scam-detection-for-phone-calls-is-now-out-for-pixel-devices-143017096.html?src=rss

Lyft will have to tell drivers how much they can truly earn, with evidence

Lyft has agreed to to tell its drivers how much they can truly earn on the ride-hailing platform — and back it up with evidence — as part of its settlement for a lawsuit filed by the US Justice Department and the Federal Trade Commission. The lawsuit accused the company of making "numerous false and misleading claims" in the advertisements it released in 2021 and 2022, when the demand for rides recovered following COVID-19 lockdowns in the previous years. Lyft promised drivers up to $43 an hour in some locations, the FTC said, without revealing that those numbers were based on the earnings of its top drivers. 

The rates it published allegedly didn't represent drivers' average earnings and inflated actual earnings by up to 30 percent. Further, the FTC said that Lyft "failed to disclose" that information, as well as the fact that the amounts it published included passengers' tips. The company also promised in its ads that drivers will get paid a set amount if they complete a certain number of rides within a specific timeframe. A driver is supposed to make $975, for instance, if they complete 45 rides over a weekend. 

Lyft allegedly didn't clarify that it will only pay the difference between the what the drivers' earn and its promised guaranteed earnings. Drivers thought they were getting those guaranteed payments on top of their ride payments as a bonus for completing a specific number of rides. The FTC accused Lyft of continuing to make "deceptive earnings claims" even after it sent the company a notice of its concerns in October 2021, as well. 

Earlier this month, the company launched an earnings dashboard that showed the estimated hourly rate for each ride, along with the driver's daily, weekly and yearly earnings. But under the settlement, Lyft will have to explicitly tell drivers how much their potential take-home pay is based on typical, instead of inflated, earnings. It has to take tips out of the equation, and it has to to clarify that it will only pay the difference between what the drivers get from rides and its guaranteed earnings promise. Finally, it will have to pay a $2.1 million civil penalty. 

This article originally appeared on Engadget at https://www.engadget.com/transportation/lyft-will-have-to-tell-drivers-how-much-they-can-truly-earn-with-evidence-120011572.html?src=rss

Lyft will have to tell drivers how much they can truly earn, with evidence

Lyft has agreed to to tell its drivers how much they can truly earn on the ride-hailing platform — and back it up with evidence — as part of its settlement for a lawsuit filed by the US Justice Department and the Federal Trade Commission. The lawsuit accused the company of making "numerous false and misleading claims" in the advertisements it released in 2021 and 2022, when the demand for rides recovered following COVID-19 lockdowns in the previous years. Lyft promised drivers up to $43 an hour in some locations, the FTC said, without revealing that those numbers were based on the earnings of its top drivers. 

The rates it published allegedly didn't represent drivers' average earnings and inflated actual earnings by up to 30 percent. Further, the FTC said that Lyft "failed to disclose" that information, as well as the fact that the amounts it published included passengers' tips. The company also promised in its ads that drivers will get paid a set amount if they complete a certain number of rides within a specific timeframe. A driver is supposed to make $975, for instance, if they complete 45 rides over a weekend. 

Lyft allegedly didn't clarify that it will only pay the difference between the what the drivers' earn and its promised guaranteed earnings. Drivers thought they were getting those guaranteed payments on top of their ride payments as a bonus for completing a specific number of rides. The FTC accused Lyft of continuing to make "deceptive earnings claims" even after it sent the company a notice of its concerns in October 2021, as well. 

Earlier this month, the company launched an earnings dashboard that showed the estimated hourly rate for each ride, along with the driver's daily, weekly and yearly earnings. But under the settlement, Lyft will have to explicitly tell drivers how much their potential take-home pay is based on typical, instead of inflated, earnings. It has to take tips out of the equation, and it has to to clarify that it will only pay the difference between what the drivers get from rides and its guaranteed earnings promise. Finally, it will have to pay a $2.1 million civil penalty. 

This article originally appeared on Engadget at https://www.engadget.com/transportation/lyft-will-have-to-tell-drivers-how-much-they-can-truly-earn-with-evidence-120011572.html?src=rss

The FBI arrested an Alabama man for allegedly helping hack the SEC’s X account

A 25-year-old Alabama man has been arrested by the FBI for his alleged role in the takeover of the Securities and Exchange Commission's X account earlier this year. The hack resulted in a rogue tweet that falsely claimed bitcoin ETFs had been approved by the regulator, which temporarily juiced bitcoin prices.

Now, the FBI has identified Eric Council Jr. as one of the people allegedly behind the exploit. Council was charged with conspiracy to commit aggravated identity theft and access device fraud, according to the Justice Department. While the SEC had previously confirmed that its X account was compromised via a SIM swap attack, the indictment offers new details about how it was allegedly carried out.

According to the indictment, Council worked with co-conspirators who he coordinated with over SMS and encrypted messaging apps. These unnamed individuals allegedly sent him the personal information of someone, identified only as “C.L,” who had access to the SEC X account. Council then printed a fake ID using the information and used it to buy a new SIM in their name, as well as a new iPhone, according to the DoJ. He then coordinated with the other individuals so they could access the SEC’s X account, change its settings and send the rogue tweet, the indictment says. 

The tweet from @SECGov, which came one day ahead of the SEC’s actual approval of 11 spot bitcoin ETFS, caused bitcoin prices to temporarily spike by more than $1,000. It also raised questions about why the high profile account wasn’t secured with multi-factor authentication at the time of the attack. “Today’s arrest demonstrates our commitment to holding bad actors accountable for undermining the integrity of the financial markets,” SEC Inspector General Jeffrey said in a statement.

The indictment further notes that Council allegedly performed some seemingly incriminating searches on his personal computer. Among his searchers were: "SECGOV hack," "telegram sim swap," "how can I know for sure if I am being investigated by the FBI," "What are the signs that you are under investigation by law enforcement or the FBI even if you have not been contacted by them," "what are some signs that the FBl is after you,” “Verizon store list," "federal identity theft statute," and "how long does it take to delete telegram account," the indictment says.

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/the-fbi-arrested-an-alabama-man-for-allegedly-helping-hack-the-secs-x-account-193508179.html?src=rss

Data breach of Fidelity leaks 77,000 customers’ personal data

Another breach of a huge financial institution has leaked the personal information of thousands of customers to the public. TechCrunch reported that an unidentified hacker obtained 77,009 customers’ personal data from the asset management firm Fidelity Investments.

A filing by Maine’s attorney general posted yesterday revealed that the unidentified third party obtained the information in mid-August using two phony customer accounts. It’s not yet known how these accounts were used to access customer data. Fidelity said in a letter to its customers that it discovered the breach on August 19. The letter also said that the unidentified party did not access customers’ Fidelity accounts but after Fidelity completed its review, it confirmed that customers’ personal data had been breached.

The New Hampshire attorney general’s office filed a second data breach notice yesterday revealing another “data security incident” of Fidelity Investments’ customer data. The notice says the unauthorized third party obtained access to “an internal database that houses images of documents pertaining to Fidelity customers” by submitting fake requests for access also on August 19. The second data breach did not provide unwanted access to any customer accounts or funds and the leaked information only “related to a small subset of Fidelity’s customers.”

If you believe your data has been obtained by unwanted parties or is part of a data leak, the Federal Trade Commission recommends putting a freeze and fraud alerts on your credit reports and personal bank and credit card accounts. You can also report any identity theft incidents at IdentityTheft.gov or by calling 1-877-438-4338.

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/data-breach-of-fidelity-leaks-77000-customers-personal-data-214248985.html?src=rss

Comcast says 230,000 customers affected by debt collection data breach

Comcast is warning that hackers stole the personal data of more than 230,000 customers during a ransomware attack on a third-party debt collector, according to a court filing. The bad actors targeted a Pennsylvania-based debt collection agency called Financial Business and Consumer Solutions (FBCS.)

The attack occurred back in February, but Comcast claims that FBCS initially said that the incident didn’t involve any customer data. FBCS changed its tune by July, when it notified Comcast that customer information had been compromised, according to reporting by TechCrunch.

All told, 237,703 subscribers were impacted by the breach. The attackers were thorough, scooping up names, addresses, Social Security numbers, dates of birth, Comcast account numbers and ID numbers. Comcast says the stolen data belongs to customers who signed up with the company “around 2021.” It also says it has stopped using FBCS for the purposes of debt collection.

“From February 14 and February 26, 2024, an unauthorized party gained access to FBCS’s computer network and some of its computers,” the filing states. “During this time, the unauthorized party downloaded data from FBCS systems and encrypted some systems as part of a ransomware attack.”

No group has stepped forward to claim credit for the incident. FBCS has only referred to the attacker as an “unauthorized actor.” The debt collection agency was hit hard by this attack, with Comcast customers being just one group of victims. The company says more than four million people were impacted and that the cybercriminals accessed medical claims and health insurance information, in addition to standard identification data. 

To that end, medical debt-purchasing company CF Medical confirmed that 600,000 of its customers were involved in the breach. Truist Bank also confirmed it was affected by the attack.

It’s notable that this incident primarily impacts debtors, opening them up to potential scams. Chris Hauk, consumer privacy advocate at Pixel Privacy, told Engadget that “the bad actors that get their paws on this information may use it to pose as debt relief agencies, which many turn to as a way out of their situation, meaning many of the involved debtors may be defrauded out of large sums of money, something they can ill-afford.”

In other words, keep an eye out for suspicious phone calls, emails and texts. This is good advice for anyone, and not just debtors who had data stored with FBCS. After all, it was revealed that hackers stole more than 2.7 billion records from American consumers earlier this year, which likely includes data on everyone who lives in the country.

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/comcast-says-230000-customers-affected-by-debt-collection-data-breach-184554728.html?src=rss

Bitcoin ATM scams have cost Americans over $10 million per month this year

The Federal Trade Commission has published a report that aims to warn people about Bitcoin ATM (or BTM) scams, which have apparently increased tenfold from 2020 to 2023. Americans had lost $65 million to fraud losses involving BTMs within the first six months of this year alone, and the actual amount may be a lot more than that, since most scams go unreported. Further, losses due to BTM scams have been exceptionally high, with people reporting a median loss of $10,000 over the past six months. 

In most of the BTM scams reported, the bad actors impersonated government and business entities, as well as tech support representatives. Almost half of the instances reported started with a phone call, though some victims were fooled by fake security warnings from online ads, pop-ups and emails from scammers pretending to be from Microsoft or Apple. 

Some scammers pretend to be government agents or employees from utility providers, for instance, and tell people that they have to settle their bills by paying through a nearby BTM. Others pretend to be feds or bank agents and scare would-be victims into believing that their accounts are being targeted by hackers, so they have to transfer their money to a "secure account." Those are just some examples of how the bad actors can fool their victims. 

According to the commission's warning, scammers tend to send their targets to specific BTM locations, showing that they prefer some operators over others. Those preferences have changed over time, though, likely due to the fraud prevention measures crypto companies introduce to their systems. Whatever operator the scammer chooses, they send QR codes to their victims, since BTMs typically require depositors to scan one linked to the recipient's account. Those QR codes, of course, send money straight to the scammers' wallets. 

As you can guess, most of the BTM scam victims are older people. The FTC says $46 million of the total losses involving BTMs in the first half of 2024 — that's 71 percent of the overall amount — came from people over 60. If you take BTMs out of the equation, most of the losses from cryptocurrency fraud were reported by people between 18 and 59 years old who fell victim to fake investment opportunities. 

If you have an older person in your life, it's best to warn them about potential BTM scams before they get targeted, because recovering the money they lose from these schemes would most likely be impossible. In addition, it may be time for all BTM operators, as well as the supermarkets, convenience stores and other locations where the machines are installed, to post warnings next to BTMs about these scams. 

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/bitcoin-atm-scams-have-cost-americans-over-10-million-per-month-this-year-140031675.html?src=rss

National Public Data confirms breach that exposed Americans’ social security numbers

A data dump that contains 2.7 billion records of personal information for people living in the US, including their Social Security Numbers, have recently been leaked online. The data dump's contents were linked to National Public Data, a company that scrapes information from non-public sources and sells it for background checks. Now, the company has confirmed that it did have "a data security incident" wherein people's names, emails, addresses, phone numbers, social security numbers and mailing addresses had been stolen. 

National Public Data's wording in its Security Incident report is a bit a vague and convoluted, but it did blame the security breach on a third-party bad actor. It said that the bad actor "was trying to hack into data in late December 2023" and that "potential leaks of certain data" took place in April 2024 and summer 2024, indicating that the hacker had successfully infiltrated its system. In April, a threat actor known as USDoD tried to sell 2.9 billion records of people living in the US, UK and Canada for $3.5 million. It claimed that it stole the information from National Public Data. Since then, the records have been leaked in chunks online with the more recent one being more comprehensive and containing more sensitive information. 

The company said it worked with law enforcement to review potentially affected records and will "try to notify" individuals "if there are further significant developments applicable" to them. It also said that it published the notice so that those who were potentially affected can take action. The company is advising people to monitor their financial accounts for fraudulent transactions, and it's also encouraging them to get free credit reports and to put a fraud alert on their file. 

The National Public Data is already facing a proposed class action lawsuit that was filed in early August by a plaintiff who received a notification from their identity theft protection service that their personal information was posted on the dark web. They argued that the company failed "to properly secure and safeguard the personally identifiable information that it collected and maintained as part of its regular business practices." 

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/national-public-data-confirms-breach-that-exposed-americans-social-security-numbers-100046695.html?src=rss