Jump to content
lynnmor

UPS Scam

Recommended Posts

Jeff-C175
7 hours ago, roadapples said:

If it's a real person

 

I can't remember the last time a spam call was a real person.  

 

7 hours ago, roadapples said:

I  just hang up on the men

 

"She sounds hideous!"

  • Haha 1

Share this post


Link to post
Share on other sites
 
The Tuul Crib

Thing that irritates me is you can block the caller but then that doesn't matter because they keep changing the number they called from. I just don't answer it!

Share this post


Link to post
Share on other sites
 
Jeff-C175
Just now, The Tuul Crib said:

they keep changing the number they called from

 

I really don't understand why it is so easy for them to do this.  Until @bcgold explained that anyone can easily do it I thought they must be hacking the system somehow.  But no...  the phone system makes it far to easy to spoof caller ID.  That should not be so.  It should be HARD or nigh impossible to do that!  What's the point of having caller ID at all if it can't be trusted?

  • Thanks 1

Share this post


Link to post
Share on other sites
 
The Tuul Crib
2 minutes ago, Jeff-C175 said:

 

I really don't understand why it is so easy for them to do this.  Until @bcgold explained that anyone can easily do it I thought they must be hacking the system somehow.  But no...  the phone system makes it far to easy to spoof caller ID.  That should not be so.  It should be HARD or nigh impossible to do that!  What's the point of having caller ID at all if it can't be trusted?

Yeah now that you say that I do remember a guy at work showed me that anyone can do it with an app. My opinion there are too many app holes out there!  :ROTF:

  • Like 1
  • Haha 2

Share this post


Link to post
Share on other sites
 
Kenneth R Cluley

There is a special place in hell for these scammers! 

  • Like 2
  • Excellent 1
  • Haha 1

Share this post


Link to post
Share on other sites
 
bc.gold
7 hours ago, Jeff-C175 said:

 

I really don't understand why it is so easy for them to do this.  Until @bcgold explained that anyone can easily do it I thought they must be hacking the system somehow.  But no...  the phone system makes it far to easy to spoof caller ID.  That should not be so.  It should be HARD or nigh impossible to do that!  What's the point of having caller ID at all if it can't be trusted?

 

It's worse than you think, every electronic device made, be it your mobile phone, camera , wifi router, ethernet cards hell anything that connects to the Internet all have a MAC address which identify's your device. Phone number doesn't mean squat.

 

Since the mac originates from hardware that address is below IP number even if its VPN ( virtual private network ) assigned to protect your privacy. For total anonymity you can spoof your devices Mac address.

 

Some airports limit  the wifi time to something like 30 minutes, the system is tracking your mac address, when your 30 minutes are up just spoof the mac and your good for another half hour.

 

Twenty years ago when internet service providers were offering different packages based on usage and number of computers connected, I was testing a large number of ethernet cards when our service suddenly went down. Phoned he tech at the ISP and he says we have to many computers connected.

 

Every time I plugged in another ethernet card to be tested and new mac address registered at the ISP end, they know how to keep the watch dog on guard but the dog was unable to flush the mac address's when they were inactive. Thus forcing the telephone call to possibly upgrade our service.

 

The IT guy had to manually flush the excess mac's.

 

A business like ebay will have static IP numbers for their various websites, we pheasants rely of DHCP ( Dynamic Host Configuration Protocol ) assigned numbers, it's this system which gives our mobile telephones mobility. While the phone moves into a new cell or access point the IP number automatically changes over to the new assignee. - DHCP server.

 

As for being hacked none of us has money enough in our bank accounts to risk goal time, you  are not the target your internet connection is. The hacker wants to hijack your phone of computer then turn it into a zombie to be used later in a DDOS attack on w more worthy target.

 

Today's botnets may have a million or more zombies, when the botnet is directed at say a bank or even the federal reserve the website is unable to handle the requests and sends the server kernel into a panic and this is when the system is vulnerable.

 

What are Bots, Botnets and Zombies?

 

An anonymous reader writes: Two hackers are renting access to a massive Mirai botnet, which they claim has more than 400,000 infected bots, ready to carry out DDoS attacks at anyone's behest. The hackers have quite a reputation on the hacking underground and have previously been linked to the GovRAT malware, which was used to steal data from several US companies. Renting around 50,000 bots costs between $3,000-$4,000 for 2 weeks, meaning renting the whole thing costs between $20,000-$30,000.

After the Mirai source code leaked, there are countless smaller Mirai botnets around, but this one is [believed to be the one] accounting for more than half of all infected IoT devices...that supposedly shut down Internet access in Liberia. The original Mirai botnet was limited to only 200,000 bots because there were only 200,000 IoT devices connected online that had their Telnet ports open. The botnet that's up for rent now has received improvements and can also spread to devices via SSH, hence the 400,000 bots total.

 

If the website address ( URL ) you've been requested to visit does not start with HTTPS avoid, if the certificate was self assigned ( unt-rusted ) your browser will kick out an alert -- danger lies ahead.

 

From Wikipedia, the free encyclopedia, HTTPS.

 

When you shouldn’t trust a trusted root certificate

 

Share this post


Link to post
Share on other sites
 
bc.gold

The zombies were put to work.

 

533 million Facebook users' phone numbers and personal data have been leaked online. The data includes phone numbers, full names, location, email address, and biographical information. Data could be used by hackers to impersonate people and commit fraud.

 

Full article.

 

A user in a low level hacking forum on Saturday published the phone numbers and personal data of hundreds of millions of Facebook users for free online.

 

The exposed data includes personal information of over 533 million Facebook users from 106 countries, including over 32 million records on users in the US, 11 million on users in the UK, and 6 million on users in India. It includes their phone numbers, Facebook IDs, full names, locations, birth dates, bios, and — in some cases — email addresses.

 

Insider reviewed a sample of the leaked data and verified several records by matching known Facebook users' phone numbers with the IDs listed in the data set. We also verified records by testing email addresses from the data set in Facebook's password reset feature, which can be used to partially reveal a user's phone number.

 

A Facebook spokesperson told Insider that the data was scraped due to a vulnerability that the company patched in 2019.

 

While a couple of years old, the leaked data could provide valuable information to cybercriminals who use people's personal information to impersonate them or scam them into handing over login credentials, according to Alon Gal, CTO of cybercrime intelligence firm Hudson Rock, who first discovered the entire trough of leaked data online on Saturday.

 

A database of that size containing the private information such as phone numbers of a lot of Facebook's users would certainly lead to bad actors taking advantage of the data to perform social engineering attacks [or] hacking attempts," Gal told Insider.

 

Gal first discovered the leaked data in January when a user in the same hacking forum advertised an automated bot that could provide phone numbers for hundreds of millions of Facebook users in exchange for a price.

 

Motherboard reported on that bot's existence at the time and verified that the data was legitimate.

 

Now, the entire dataset has been posted on the hacking forum for free, making it widely available to anyone with rudimentary data skills.

Share this post


Link to post
Share on other sites
 
bc.gold
On 4/1/2021 at 7:09 AM, The Tuul Crib said:

Yeah now that you say that I do remember a guy at work showed me that anyone can do it with an app. My opinion there are too many app holes out there!  :ROTF:

 

There hasn't been an app made yet that will give the user root access to the telephone system or any financial institution, root is gained via brute force via an army of bots.

 

Smart people have a secondary email address that they use to sign up for things like facebook and forums.

 

With voip.ms I can cancel my current telephone number in less than a minute and have a new one for a $0.40 set up fee, the number costs less than a dollar a month. If ya wanna play it safe grab a second number to use for signing up on online forums often the site will email or text a verification code as proof of life.

 

And this is where the second telephone number and email address comes in handy.

 

Answering robot and telemarketing calls, stop being an app hole and take control of your life.

 

 

 

 

Edited by bcgold

Share this post


Link to post
Share on other sites
 
lynnmor
45 minutes ago, bcgold said:

 

Answering robot and telemarketing calls, stop being an app hole and take control of your life.

 

No sure how you can run a small business and not answer the phone.

  • Like 1

Share this post


Link to post
Share on other sites
 
bc.gold
1 hour ago, lynnmor said:

No sure how you can run a small business and not answer the phone.

 

Port your business telephone number over to Voip.ms then block anonymous callers, if you have a  website use a QR code where the visitor has to scan the number via his/her telephone.

 

Use the QR code on your business cards and promotional items., there isn't a scammer alive that will waste their time with a QR coded telephone number.

 

QR code bridges communications.

 

spacer.png

 

spacer.png

 

 

Edited by bcgold

Share this post


Link to post
Share on other sites
 
lynnmor

This is what I am currently doing with VOIP and I still get too many jerks:

 

Select level of call blocking

  • Custom
    Select what filters you want to use
  • High   is chosen
  • Medium
  • Low
  • Off
Block anonymous calls and send to voicemail
Block specific names/numbers and send to voicemail
Block known spammers and send to voicemail
Block suspected spammers and send to voicemail
 
 
 

Share this post


Link to post
Share on other sites
 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×
×
  • Create New...