Beware of a New Scam Aimed at Bargain-Hunters
Trying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Several websites offering cheap airline tickets in fact weren't selling anything; the aim was to cheat users out of credit card details.
Of course, these sites have already been identified and disabled, but who knows whether (or better to say when) other ones will appear again, this time offering all kinds of products.
The scam is very simple; the thieves simply wait until some unsuspecting user who is searching for airline ticket offers, finds their site offering dirt-cheap airline tickets. Really pleased with himself and looking forward to the trip, the user fills in the form, entering his credit card number, expiry date and verification value (CVV).
As soon as these details have been entered, an error page appears; it tells the user that the transaction has been unsuccessful, and offers instructions on how to pay for the ticket by postal money order. So the user may well be fooled twice. He loses his credit card details, putting them right into the hands of cyber-crooks, and then loses money, if decides to buy the ticket by money order.
Luis Corrons, the director of PandaLabs, comments on this scam: "This kind of online fraud differs from those witnessed previously. The malicious user does not contact the person interested in buying the product, but it is actually the buyer, in searching for the best prices online, who goes to the fraudulent web page. This creates a false sense of security that can lead users to proceed with the transaction".
This makes such a scam very dangerous. It is the user who finds the "bargain"; no spam or pop-up ad is involved-- actually, nobody either forces or tries to persuade the user to buy something. This tactic is bound to be "effective", if such a word is appropriate here. That is why it is extremely likely that there will be other websites and other scams using the same pattern.
Too Cheap to be a Bargain? You'd Better Steer Clear
How to avoid this kind of fraud? "Users are best advised to treat 'bargains' with suspicion, and only make online purchases from trusted sites. In any event, if in doubt, it is a good idea to search for information about the website in question on the Internet. Users should be able to find opinions and experiences of other users who have used the same service," says Luis Corrons.
That's all users can do so far -- to steer clear of suspicious bargains and to check the firm one is going to buy from. Of course, the authorities are informed; these cybercriminals will be tracked, caught and sent to jail.
But this entire story gives a strong impression that cybercrooks are becoming more and more shameless. People get cheated when they expect it the least -- just remember bogus appeals to make donations for tsunami victims.
Such criminals are impudently taking advantage over majority of people -- over those who remember the Golden rule and expect others to behave the same way. That is why everybody who either falls the victim of this --or any other--scam, or learns about such incidents, should make this information public. This will be a small contribution that may help to curb growing cybercrime.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Having a good Spyware eliminator on your computer is vital... Read More
A couple of days ago, I was searching for a... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
This is the second in a series of articles highlighting... Read More
Over the past few years as the internet has become... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
There you are busily typing away on your PC or... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
The first thing people think about when defending their computers... Read More
First I would like to stress I am condoning the... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Let us take the example of scrambling an egg. First,... Read More
Well, if that would have been said to me by... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
The trash folder in my main inbox hit 4000 today.... Read More
If you use emails actively in your communication, you must... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
What is computer security? Computer security is the process of... Read More
Pharming is one of the latest online scams and rapidly... Read More
If you are a parent, as am I, I think... Read More
Computer infections can be broken up into 4 main categories... Read More
A few nights ago I received an email from "2CO"... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
You'd better learn news from media, not from emails, security... Read More
Only the top spyware removers are successful at detecting and... Read More
So called phishers try to catch the information about the... Read More
Have you ever bought a product or service from the... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Phishing is the act of some individual sending an email... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
During the release of a new software product specialized to... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Phishing is a relatively new form of online fraud that... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Have you ever got an email asking you to confirm... Read More
First the basic definition of Spyware: It is a type... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Spyware is software that runs on a personal computer without... Read More
In a word, no - an email message has always... Read More
Spyware is the most troublesome software to appear on the... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
File sharing on p2p is soaring despite the music and... Read More
Security leaks can be a big problem for any site... Read More
Computer security for most can be described in 2 words,... Read More
First off I should explain what phishing is. Phishing is... Read More
Be careful of sites that promise to send you "instant... Read More
Let us take the example of scrambling an egg. First,... Read More
Despite the current wave of identity theft and corporate security... Read More
Threats we ordinary Web users face online leave us no... Read More
I got a virus the other day, Thursday I believe... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
We all know that it's dangerous to use the same... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Internet Security |