The Fake Speeding Ticket Scam - What Will Hackers Think of Next?

What is it?

A new malware phishing threat has emerged that uses smartphone GPS and fake speeding tickets to install malware on computer systems. Residents in Pennsylvania have received emails appearing to come from a local police department claiming that they were caught speeding and including a link to a site claiming to show “proof” of the violation and a photo of the victim’s license plate. When the user clicks the link, malware is downloaded on to their computer.

How does it work?

While phishing scams aren’t a new thing, this is actually a pretty sophisticated scam. What makes this scam unique is that the fake emails appear to contain accurate traffic data with street names and actual locations where the victims were at some point in time.

It is thought that the location information is received by the developers of an app that has access to smartphone GPS data. It is still unknown whether or not the hackers have breached the database of a legitimate app or created their own app. It is not uncommon for apps to require or request GPS data—in fact many apps have access to many different parts of our mobile devices. For more info please read http://blog.inspiredelearning.com/application-permission-creep

What should you do?

If you receive such an email, contact your local police department before clicking any links. Even though the message may appear to be legitimate with accurate information, it is highly unlikely that a police department would notify the public of traffic violations via email. Violation notices are delivered in person or through the US mail.

Article By:

Tyler Cohen Wood, Inspired eLearning, LLC

http://blog.inspiredelearning.com/

Mar 28, 2016

Custom Fields
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
UNH Information Security Services - Tax Season Resources
Viewed 157 times since Wed, Feb 21, 2018
Mobile Device Health and Security
Viewed 994 times since Fri, Jul 10, 2015
Policies on IT resources
Viewed 2281 times since Wed, Mar 25, 2015
Antivirus Software for Windows
Viewed 7071 times since Wed, Aug 12, 2015
How to Spot a “Phishing” Email
Viewed 1252 times since Tue, Feb 2, 2016
Red Flag Rule - Identity Theft Prevention
Viewed 1495 times since Thu, May 7, 2015
UNH Campus Virus Protection
Viewed 15185 times since Wed, Aug 12, 2015
Ransomware arrives on the Mac: OSX/KeRanger-A
Viewed 900 times since Thu, Mar 10, 2016
System Center 2012 Endpoint Protection for Mac Installation
Viewed 3682 times since Wed, Aug 12, 2015
Things to Consider if Your UNH Account has been Compromised
Viewed 306 times since Wed, Aug 16, 2017
MENU