Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and an international company is offering you a dream job ? you can be an agent for them ? a financial intermediary ? receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.

There's no investment, no money required. They are just looking for people with a good reputation that they can trust with their money.

The company needs a local agent because US banking laws restrict the accounts that a foreign company has, unless they have a U.S. citizen as a registered agent of the company.

It sounds really good. After all, the company is overseas and it needs a U.S. Agent to receive payments and all you have to do is wire-transfer the money to the company account overseas, less your commission.

There seems to be no way to lose, since you won't be putting out any of YOUR money and YOU have control over all incoming and outgoing payments.

You can't lose, can you?

Unfortunately you can. Take this job and you become a "money mule" ? an unwitting participant in a scheme to defraud others. Here's how it works: The company may or may not have a good looking website with what sounds like a legitimate name, "Techhydraulik" and says it's based in Germany.

Sounds like it is a technology company having something to do with hydraulics, doesn't it?

However, it is really an Internet front for Bad Guys who need to be able to transfer money out of the United States from people that they have defrauded through "Phishing."

Phishing is the practice of setting up fake bank sites that look just like the real bank site (for example, Wells Fargo) and sending emails to millions of people saying that there is an irregularity in their Wells Fargo account and to "click on the link to confirm your information or your account will be closed".

When you click on the link and fill out the fields for your account number, username and passwords, it sends the information to the Bad Guys who empty your account. Believe it or not, tens of thousands of people fall for this each year.

The Bad Guys then send the payment to their agent (you), and you wire-transfer the money, less your commission, to their overseas account.

Several weeks or months later, perhaps, there is a knock at your door and the FBI wants to know why you are receiving stolen funds. You explain that the funds are not stolen, they are payments for equipment purchased by people from Techhydraulik, and you are their legitimate agent.

You may not be held criminally liable since you were an unknowing dupe, but you may certainly be liable for repayment of all of the money that passed through your hands.

And of course, the real perpetrators have long ago closed that overseas account and disappeared.

How can you protect yourself?

Go to www.betterwhois.com and look up the information about the company's website. You'll be able to see when the .com was registered.

Typically, the names are registered just a few days before the email is sent out, because the individual websites are generally only up for a few days or weeks, to make it hard for authorities to trace. For example, techhydraulik.com was registered on August 2nd and the fraudulent email was sent out on August 15. Chances are the website will be gone shortly.

The techhydraulik.com website is hosted by computers in Russia where laws are lax and recovery is unlikely. It's also possible that if you did visit the techhydraulik site, your computer would be infested with password stealers, key loggers and spyware.

The Internet is a wonderful tool. It is also a place where you need to protect yourself from becoming a victim.

Sign up for the free "The Blinking Cursor News" to stay on top of the latest scams and shams on the Internet.

© Steve Freedman, Archer Strategic Alliances 2005 All Rights Reserved

http://helpprotectmycomputer.com

In The News:


pen paper and inkwell


cat break through


Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom As a network... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More