US firm used Indian call centres to bilk consumers

September 12, 2013

Call_centresWashington, Sep 12: A US regulatory body has put a stop to fake debt scams by two Florida-based companies who worked with a call centre in India and bilked millions of dollars from consumers.

The Federal Trade Commission (FTC) said Tuesday the companies, through threatening debt collecting tactics, collected about $5 million from consumers who either did not owe the debt or owed a debt to someone else.

The FTC said it had imposed a judgment of more than $25.3 million against the companies, which also used a phony interest rate reduction scheme between January 2010 and August 2011.

The FTC alleged that the two companies Fisher, Andre Keith Sanders, Pro Credit Group, LLC, and Sanders Legal Group, PA set up US-based financial accounts for a call centre operation based in India.

The operation"s callers used threats, lies, and abusive tactics to collect debts from consumers who had previously applied for or received loans from online payday loan companies and had supplied sensitive personal financial information that later found its way into the hands of those involved with the scam.

Once consumers agreed to pay, Fisher and attorney Sanders used Sanders Legal Group, PA to process at least $5 million from consumers whom the India-based callers had misled, the FTC alleged.

Although numerous consumers complained to the local Better Business Bureau chapter about the abusive tactics of the callers, and many consumers tried unsuccessfully to get refunds, the defendants continued processing consumers" payments, it said.

In the spring of 2012, at the request of the FTC, a court shut down the two operations.

Brett Fisher, a repeat offender who settled charges with the FTC in 2009 in a scam involving both advance-fee credit cards and bogus interest-rate reduction claims, masterminded both schemes, the FTC alleged.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 20,2020

In a bid to help struggling small businesses in Covid-19 times, Facebook has introduced Shops to help set up a single online store for customers to access on both Facebook and Instagram.

While Facebook Shops is being rolled out from Wednesday, the company will introduce Instagram Shop, a new way to discover and buy products in Instagram Explore, this summer, starting in the US.

The social networking giant also announced that it will invest in features across its family of apps to inspire people to shop and make buying and selling online easier.

"Creating a Facebook Shop is free and simple. Businesses can choose the products they want to feature from their catalogue and then customise the look and feel of their shop with a cover image and accent colours that showcase their brand," Facebook said in a statement late Tuesday.

Any seller, no matter their size or budget, can bring their business online and connect with customers wherever and whenever it's convenient for them.

People can find Facebook Shops on a business' Facebook Page or Instagram profile, or discover them through stories or ads.

"From there, you can browse the full collection, save products you're interested in and place an order — either on the business' website or without leaving the app if the business has enabled checkout in the US," informed the company.

Last month, Facebook announced $40 million in grants for 10,000 small businesses in the US to help them get through these challenging time.

The grants will go to small businesses in 34 locations where Facebook employees live and work.

The company said that in Facebook Shops, users will be able to message a business through WhatsApp, Messenger or Instagram Direct to ask questions, get support, track deliveries and more.

In the future, they will be able to view a business' shop and make purchases right within a chat in WhatsApp, Messenger or Instagram Direct.

Later this year, Facebook will add a new shop tab in the navigation bar, so people can get to Instagram Shop in just one tap.

Facebook said it is making it easier to shop for products in real time.

Soon, sellers, brands and creators will be able to tag products from their Facebook Shop or catalogue before going live and those products will be shown at the bottom of the video so people can easily tap to learn more and purchase.

"We're starting to test this with businesses on Facebook and Instagram, and we'll roll it out more broadly in the coming months," said the company.

Facebook is also working with partners like Shopify, BigCommerce, WooCommerce, ChannelAdvisor, CedCommerce, Cafe24, Tienda Nube and Feedonomics to support small businesses.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.