Back to Back Issues Page
Watch For Scams Newsletter. Cyber Criminals Using Photo-Sharing Programs to Compromise Computers
August 05, 2013
Hello

Cyber Criminals Using Photo-Sharing Programs to Compromise Computers

Watch For Scams is dedicated to helping you avoid becoming a victim of fraud.

If you like this ezine, do a friend a big favor and forward this to them. If a friend forwarded this to you, and if you like what you read, please subscribe by visiting the link below:

Subscribe Here

Cyber Criminals Using Photo-Sharing Programs to Compromise Computers

The FBI has seen an increase in cyber criminals who use online photo-sharing programs to perpetrate scams and harm victims’ computers. These criminals advertise vehicles online but will not provide pictures in the advertisement.

They will send photos on request. Sometimes the photo is a single file sent as an e-mail attachment, and sometimes the victim receives a link to an online photo gallery.

The photos can often contain malicious software that infects the victims” computer, directing them to fake websites that look nearly identical to the real site where they originally saw the advertisement.

The cyber criminals run all aspects of these fake websites, including “tech support” or “live chat support,” and any “recommended” escrow services. After the victim agrees to purchase the item and makes the payment, the criminals stop responding to correspondence. The victims never receive any merchandise.

The FBI urges consumers to protect themselves when shopping online. Here are a few tips for staying safe:

• Be cautious if you are on an auction site and lose an auction and the seller contacts you later saying the original bidder fell through.

• Make sure websites are secure and authenticated before you purchase an item online. Use only well-known escrow services.

• Research to determine if a car dealership is real and how long it has been in business.

• Be wary if the price for the item you’d like to buy is severely undervalued; if it is, the item is likely fraudulent.

• Scan files before downloading them to your computer.

• Keep your computer software, including the operating system, updated with the latest patches.

• Ensure your anti-virus software and firewalls are current – they can help prevent malware infections.

If you believe you have been a victim of this type of scam you should promptly report it to the IC3's website at www.IC3.gov. The IC3's complaint database links complaints together to refer them to the appropriate law enforcement agency for case consideration.

Remember - always watch for scams!

Steve

Back to Back Issues Page