Internet-inspired fraud tactics that try to use telephone calls to dupe millions of people or to overwhelm switchboards for essential public services
Phone swindles are practically as old as the telephone itself. But new technology has led to an onslaught of Internet-inspired fraud tactics that try to use telephone calls to dupe millions of people or to overwhelm switchboards for essential public services, causing deep concern among law enforcement and other groups.
People, businesses and government agencies across the country are combating the new schemes, in which scammers use the Internet to send huge volumes of calls at the same time. Many of the attacks bombard individuals with automated requests for personal data, in a variation of their email-scam cousins. But others are more vicious, flooding entire phone systems when demands are not met, similar to some attacks against websites.
“You can blast out 100 million calls from the comfort of your keyboard,” said Kati Daffan, a lawyer in the bureau of consumer protection at the Federal Trade Commission.
In October, the Department of Homeland Security advised federal agencies, local governments and other organizations to be prepared for so-called denial of service attacks, which flood phone systems with calls, making them unusable by legitimate callers. The warning came after attacks against a sheriff’s office in the Southern United States and another against a Coast Guard cutter. The department said there had been over 200 such attacks identified against public sector groups.
As they are for most forms of Internet fraud, the latest phone schemes are also difficult to track and investigate because of their frequency, their layers of anonymity and their global nature. Several investigators could not name a successful prosecution of the latest wave of phone swindles, though cybercriminals who committed other forms of fraud have been arrested.
In Tarrant County, Tex., the phone lines of several emergency dispatch centers were disabled in the last year because of a surge of automated calls, said Wanda S. McCarley, director of operations for the Tarrant County 911 District, which includes Fort Worth. The attacks lasted up to an hour and were aimed at 10-digit phone emergency numbers at the centers, which are accessible to callers outside the area, rather than 911 lines, which are not.
Something similar happened to a Texas hospital two years ago, when an intensive care unit’s phone lines were disabled for about six hours, said the chief information officer for the hospital chain that owns the facility, who spoke on the condition that he not be named to avoid unwanted attention for his employer. To defend itself, the hospital started using a service from SecureLogix, a telephone-security company, which the hospital’s chief information officer said had been effective.
In both cases, employees at the facilities were contacted by callers who said they were debt collectors seeking repayment of loans taken out by the workers. If the employees did not pay up, the callers threatened, the lines at the employees’ workplaces would be brought down. The attackers then overwhelmed the lines with repeated calls, causing busy signals for legitimate callers.
It is not clear how or why the specific employees were chosen, though law enforcement officials believe that swindlers in such cases may find names on public staff directories or professional sites like LinkedIn.
Some pay up in such swindles, often out of uncertainty about whether they owe the money or to avoid embarrassment at their workplaces, law enforcement officials said. Ralph A. Gagliardi, agent in charge with the Colorado Bureau of Investigation’s identity theft and mortgage fraud units, said he traced payments from the victim in one such attack in Colorado to Nigeria via an intermediary in Florida.
Michael J. McKeown, supervisory special agent for the Federal Bureau of Investigation in Pittsburgh, said, “If people do pay, that makes their problems stop, but it may make it more lucrative for people to do this.”
The Latest on: Denial of service attacks
[google_news title=”” keyword=”Denial of service attacks” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Denial of service attacks
- Hacktivism drives a slew of DDoS attackson April 26, 2024 at 1:32 am
Driven by tech-savvy and politically motivated hacktivist groups and an increase in DNS water torture attacks, a new Netscout report has observed more than 7-million distributed denial of service ...
- Cisco Warns of Brute Force Attacks Targeting VPNs and Firewallson April 19, 2024 at 12:02 pm
Cisco has revealed that a global increase in brute force attacks targeting Virtual Private Networks (VPNs) and other devices is currently taking place.
- DDoS attacks saw a huge surge in the first part of 2024, with one particular country badly hiton April 17, 2024 at 4:10 am
Distributed denial of service ( DDoS) attacks saw a significant increase during the first quarter of 2024, with one European country being particularly badly hit, new research has claimed.
- Cisco warns of large-scale credential compromise attack that’s likely to get biggeron April 16, 2024 at 2:30 pm
Cisco’s Talos security team is warning of a large-scale credential compromise campaign that’s indiscriminately assailing networks with login attempts aimed at gaining unauthorized access to VPN, SSH, ...
- Cisco warns of large-scale brute-force attacks against VPN serviceson April 16, 2024 at 9:11 am
Cisco warns about a large-scale credential brute-forcing campaign targeting VPN and SSH services on Cisco, CheckPoint, Fortinet, SonicWall, and Ubiquiti devices worldwide.
- Cloudflare reports 50% first-quarter increase in distributed denial-of-service attackson April 16, 2024 at 6:00 am
A new report from content delivery network provider Cloudflare Inc. today details a disturbing rise in distributed denial-of-service attacks in the first quarter, including a surge of attacks against ...
- Loop DoS: New Denial-of-Service Attack targets Application-Layer Protocolson March 19, 2024 at 12:36 am
In doing so, they create large volumes of traffic that result in a denial of service for involved systems ... even the attackers are unable to stop the attack. Previously known loop attacks ...
via Bing News