The Fake Speeding Ticket Scam - What Will Hackers Think of Next?

What is it?

A new malware phishing threat has emerged that uses smartphone GPS and fake speeding tickets to install malware on computer systems. Residents in Pennsylvania have received emails appearing to come from a local police department claiming that they were caught speeding and including a link to a site claiming to show “proof” of the violation and a photo of the victim’s license plate. When the user clicks the link, malware is downloaded on to their computer.

How does it work?

While phishing scams aren’t a new thing, this is actually a pretty sophisticated scam. What makes this scam unique is that the fake emails appear to contain accurate traffic data with street names and actual locations where the victims were at some point in time.

It is thought that the location information is received by the developers of an app that has access to smartphone GPS data. It is still unknown whether or not the hackers have breached the database of a legitimate app or created their own app. It is not uncommon for apps to require or request GPS data—in fact many apps have access to many different parts of our mobile devices. For more info please read http://blog.inspiredelearning.com/application-permission-creep

What should you do?

If you receive such an email, contact your local police department before clicking any links. Even though the message may appear to be legitimate with accurate information, it is highly unlikely that a police department would notify the public of traffic violations via email. Violation notices are delivered in person or through the US mail.

Article By:

Tyler Cohen Wood, Inspired eLearning, LLC

http://blog.inspiredelearning.com/

Mar 28, 2016

Custom Fields
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
Back-up your files today!
Viewed 442 times since Mon, Nov 16, 2015
What’s the Deal with Publicly Posted Credentials?
Viewed 70 times since Thu, Jun 29, 2017
Policies on IT resources
Viewed 1149 times since Wed, Mar 25, 2015
Ransomware arrives on the Mac: OSX/KeRanger-A
Viewed 511 times since Thu, Mar 10, 2016
Things to Consider if Your UNH Account has been Compromised
Viewed 15 times since Wed, Aug 16, 2017
File-Sharing Policy
Viewed 393 times since Tue, Jun 2, 2015
Using Facebook, Google or other Social Login Services
Viewed 389 times since Fri, Aug 26, 2016
Mobile Device Health and Security
Viewed 550 times since Fri, Jul 10, 2015
How to Spot a “Phishing” Email
Viewed 634 times since Tue, Feb 2, 2016
Microsoft Security Essentials and Windows Defender Installation
Viewed 4837 times since Wed, Aug 12, 2015
MENU