Imagine this ? you open up your email box and an international company is offering you a dream job ? you can be an agent for them ? a financial intermediary ? receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.
There's no investment, no money required. They are just looking for people with a good reputation that they can trust with their money.
The company needs a local agent because US banking laws restrict the accounts that a foreign company has, unless they have a U.S. citizen as a registered agent of the company.
It sounds really good. After all, the company is overseas and it needs a U.S. Agent to receive payments and all you have to do is wire-transfer the money to the company account overseas, less your commission.
There seems to be no way to lose, since you won't be putting out any of YOUR money and YOU have control over all incoming and outgoing payments.
You can't lose, can you?
Unfortunately you can. Take this job and you become a "money mule" ? an unwitting participant in a scheme to defraud others. Here's how it works: The company may or may not have a good looking website with what sounds like a legitimate name, "Techhydraulik" and says it's based in Germany.
Sounds like it is a technology company having something to do with hydraulics, doesn't it?
However, it is really an Internet front for Bad Guys who need to be able to transfer money out of the United States from people that they have defrauded through "Phishing."
Phishing is the practice of setting up fake bank sites that look just like the real bank site (for example, Wells Fargo) and sending emails to millions of people saying that there is an irregularity in their Wells Fargo account and to "click on the link to confirm your information or your account will be closed".
When you click on the link and fill out the fields for your account number, username and passwords, it sends the information to the Bad Guys who empty your account. Believe it or not, tens of thousands of people fall for this each year.
The Bad Guys then send the payment to their agent (you), and you wire-transfer the money, less your commission, to their overseas account.
Several weeks or months later, perhaps, there is a knock at your door and the FBI wants to know why you are receiving stolen funds. You explain that the funds are not stolen, they are payments for equipment purchased by people from Techhydraulik, and you are their legitimate agent.
You may not be held criminally liable since you were an unknowing dupe, but you may certainly be liable for repayment of all of the money that passed through your hands.
And of course, the real perpetrators have long ago closed that overseas account and disappeared.
How can you protect yourself?
Go to www.betterwhois.com and look up the information about the company's website. You'll be able to see when the .com was registered.
Typically, the names are registered just a few days before the email is sent out, because the individual websites are generally only up for a few days or weeks, to make it hard for authorities to trace. For example, techhydraulik.com was registered on August 2nd and the fraudulent email was sent out on August 15. Chances are the website will be gone shortly.
The techhydraulik.com website is hosted by computers in Russia where laws are lax and recovery is unlikely. It's also possible that if you did visit the techhydraulik site, your computer would be infested with password stealers, key loggers and spyware.
The Internet is a wonderful tool. It is also a place where you need to protect yourself from becoming a victim.
Sign up for the free "The Blinking Cursor News" to stay on top of the latest scams and shams on the Internet.
© Steve Freedman, Archer Strategic Alliances 2005 All Rights Reserved
http://helpprotectmycomputer.com
Airport Menace: The Wireless Peeping Tom As a network... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Today the internet is a mine field of malicious code... Read More
The money being spent online is steadily growing. With billions... Read More
P C. owners are constantly at risk from attacks by... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
First I would like to stress I am condoning the... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
There has not been a time in the history of... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
If you know what is the 'Fishing' then it's very... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Spyware is software or hardware installed on a computer without... Read More
It has been said that with the wealth of information,... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
First, let's do a little recap'. As I stated in... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
These six ways to prevent identity theft offer you valuable... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
With the advent of the World Wide Web, a whole... Read More
A couple of days ago, I was searching for a... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Identity Theft is one of the most serious problems facing... Read More
Imagine this ? you open up your email box and... Read More
Today,on most internet user's computers, we have the ability to... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Let us take the example of scrambling an egg. First,... Read More
Business on the internet is getting down right shameless. This... Read More
If you use emails actively in your communication, you must... Read More
History and BackgroundThe virus was one of the first ever... Read More
There is nothing more important that password security in world... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
There has not been a time in the history of... Read More
Watching how the traditional media covers the latest virus or... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
The Message Must Get Through The year is 300A.D.,... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Imagine my surprise when I received a phone call from... Read More
The words Corporate Security may conjure up images of a... Read More
Identity Theft is one of the most serious problems facing... Read More
I am the victim of an internet scam. It is... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
The top five online scams on the Internet hit nearly... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
This is the second in a series of articles highlighting... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Well, if that would have been said to me by... Read More
This really chapped my lips...I recently bought a new computer.... Read More
So you want to know who your kids are chatting... Read More
Business on the internet is getting down right shameless. This... Read More
Working from home has its advantages, including no commute, a... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Identity theft is one of the most common criminal acts... Read More
It's late. You've been scouring the web for that perfect... Read More
Over £5 billion pounds was spent on online shopping in... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Only the top spyware removers are successful at detecting and... Read More
It has been said that with the wealth of information,... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Internet Security |