ReportWire

Tag: Business Scams

  • I Fell for a $1.25 Million Scam — Now MrBeast Is Helping Me Hunt Down the Scammers | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    This is hard to admit, but I got scammed out of $1.25 million.

    The money is gone, and I can’t get it back. But instead of hiding, I’ve decided to share my story. My recent post on X about the $1.25 million scam went viral with more than 4 million views and thousands of reposts and comments.

    MrBeast even chimed in that he would give a $100,000 reward to anyone who could help track down the scammers.

    Now that I’ve had even more time to process the situation, I think it’s time to share the lessons I’ve learned from my $1.25 million mistake.

    How it began

    A few years ago, I donated $1.2 million to MrBeast’s #TeamSeas campaign to help clean up the oceans. After the donation, I was invited to spend a few days with Jimmy (MrBeast) and his team.

    So, when they reached out to me again for a donation to MrBeast’s Team Water campaign, I naturally wanted to help. During the discussion, we even talked about planning another meet-up.

    A few weeks after I donated $1 million to the project, I was added to what looked like a private group text with other major donors; it didn’t feel out of place at all. In fact, it seemed like the natural next step.

    The group looked legitimate. The names were impressive: Mark Rober, Shopify’s Tobi Lütke, Stake’s Ed Craven, Adin Ross. There was banter, casual voice notes and even more talk about the donor trip. It all lined up with what I’d been expecting — and I felt like I was in the “cool crowd.”

    Then came the pitch: a crypto investment tied to a major exchange. Everyone in the group “joined.” I didn’t want to be the outsider. So I wired the money. $1.25 million.

    Later, I checked in with the real Jimmy and felt my stomach drop. The group text was fake. My money was gone.

    Related: The 3 Biggest Mistakes That Made Me a Better Entrepreneur

    Lesson 1: Don’t make big decisions when you’re distracted

    When the scam was unfolding, I was away at a retreat that I’d been planning all year. This was terrible timing for me, but perfect for the scammers.

    I was relaxed and in the completely wrong headspace for any major decisions. My guard was down, and I was the perfect target.

    Having reviewed the texts afterward, I see several red flags that would have given me pause any other day. However, I was distracted and made a rash decision.

    Tip: Don’t make major decisions when you’re distracted, traveling or emotionally charged. Give yourself the space and energy to sit with the choices and only make a decision with a clear head.

    Lesson 2: Listen to reality, not the story you’re telling yourself

    When I was added to the text group, I honestly wanted it to be real. I’d talked with MrBeast’s team previously about planning a trip, and my brain connected the dots, telling me this was all part of the plan.

    This also had me overlooking red flags. I didn’t verify the phone numbers, and I didn’t double-check anything. I trusted what I wanted to be true instead of what the evidence showed. I was naive, and it cost me $1.25 million.

    Entrepreneurs make this same mistake all the time. We fall in love with our product, our marketing strategy or our “next” big idea. When our customers and data tell us otherwise, we often struggle to accept that reality and continue pushing what we want instead of what is right.

    Tip: Don’t fall in love with the story you tell yourself. Trust the data, trust what your customers are telling you, and be willing to adjust or pivot.

    Lesson 3: Don’t be afraid of mistakes — share them

    This was easily the most embarrassing mistake of my life. I’m a successful entrepreneur, and I made more than $50 million before 30 — being scammed was not supposed to happen to me.

    But, it did.

    The easiest way to deal with this mistake would be to hide it. But, I didn’t.

    Instead, I shared it. First with my family and close friends, then publicly online. The responses ranged from “idiot” to “martyr,” but overwhelmingly, people appreciated the honesty. Some even admitted they’d been scammed too, but had never told anyone.

    And then something unexpected happened: MrBeast himself spoke up. He offered a $100,000 reward for credible information leading to the scammers.

    Sharing reframed the story. From personal embarrassment to a community problem worth solving.

    Tip: Don’t hide from your mistakes. Own them, talk about them, and turn them into lessons others can learn from.

    Related: Beware of SEO Scammers — Here’s How to Spot and Avoid Mediocre SEO Agencies

    Final thoughts

    I’ll never see the $1.25 million I lost again. But I can use it as the most expensive learning experience of my life.

    If you take nothing else from my story, take these:

    1. Don’t make important decisions while distracted.
    2. If it’s too good to be true, it probably is.
    3. Don’t be afraid to talk about your mistakes.

    If you’re curious about how this scam actually played out, I’ve made everything public. On Great.com, we’ve posted the full chat logs, the wallet addresses and even the phone numbers tied to the scammers. You can see exactly what I saw — and if you spot something that could help track them down, you could earn the $100,000 reward from MrBeast.

    This is hard to admit, but I got scammed out of $1.25 million.

    The money is gone, and I can’t get it back. But instead of hiding, I’ve decided to share my story. My recent post on X about the $1.25 million scam went viral with more than 4 million views and thousands of reposts and comments.

    MrBeast even chimed in that he would give a $100,000 reward to anyone who could help track down the scammers.

    The rest of this article is locked.

    Join Entrepreneur+ today for access.

    Erik Bergman

    Source link

  • 3 Common Lies of a Get Rich Quick Scheme (and How to Avoid Them) | Entrepreneur

    3 Common Lies of a Get Rich Quick Scheme (and How to Avoid Them) | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    If you’ve recently received an email from a Nigerian Prince asking for a small sum of money now to help him out of a financial bind, don’t bother. I have already paid it and should be receiving an expeditious reward in the form of gold bricks. It’s a great feeling.

    Thank goodness I didn’t fall for any scams. You’re probably familiar with them; The Ponzi scheme, for example, whereby current investors are paid only by new investors until the jig is up and the new investors dry up. Without naming names, one very famous financial advisor used this ruse and Madoff with millions.

    Matt Fore

    Source link

  • How to Use New Technology to Combat Phone Scammers | Entrepreneur

    How to Use New Technology to Combat Phone Scammers | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    In 2019, Congress passed the TRACED Act to give the Federal Communications Committee (FCC) additional tools to combat robocalls. It’s a problem plaguing public sector call centers and constituents; people still receive millions of robocalls (automated or pre-recorded messages) and scam calls (made by criminals) every year in the U.S.

    It is incumbent that government agencies utilize the technological tools available today to combat fraudulent, phone-related activity, boosting public trust and the constituent experience.

    The not-so-smartphone problem

    The household landline is steadily declining; roughly one-third (37%) of homes still have one. In an incredible technological revolution, smartphones have become the preferred telephone device for most homes and individuals. Smartphones are powerful, but their ability to root out scam calls is still decidedly inefficient. Today’s smartphones don’t pull caller ID data from a centralized registry of phone numbers. Instead, they rely on information from your contact list to identify incoming calls. Essentially, you tell your phone who’s calling — not the other way around.

    Most people don’t realize cell phones lack a caller ID, causing problems for public agencies trying to reach beneficiaries or constituents. To deal with the over 3 billion spam calls received per month, most people simply ignore numbers they don’t recognize.

    Due to this breakdown in public trust, many government agencies won’t initiate contact via phone. Rather, they’ll return calls from consumers who request help. However, if a recipient misses a call, they’re faced with the daunting prospect of returning it — only to navigate endless menus and jump through hoops to reach a live person on the other end. The result is a further breakdown in trust and loss of confidence in the efficacy of public sector call centers.

    Phone service providers have developed technical ways to alleviate the problem of eroded trust. Many major providers employ a certification system for phone numbers registered to customers. This development resulted from the STIR/SHAKEN caller identification framework set forth by Neustar Management and mandated by the FCC as part of the TRACED Act.

    With caller ID authentication standards like STIR/SHAKEN, phone service providers verify a caller’s actual number matches the caller ID information, enabling higher trust for the receiver of the call. It’s a small step, but it indicates how the public sector can better leverage technological tools to solve these problems. Unfortunately, the scammers have a vote in this process too, and they’re not going away without a fight.

    Related: Rising AI Threat Sounds Like Your Loved One on the Phone — But It’s Not Really Them

    Robocalling isn’t going anywhere

    Robocalls and scam calls aren’t subsiding anytime soon — they’re too lucrative for the fraudsters who perpetrate them. In 2021, fraudulent calls cost Americans over $29 billion. Without positive identification in the form of verified caller ID, the public is never sure they’re talking to a legitimate service. The result is a concerning loss of trust in government call centers.

    Fraud doesn’t stop at government call centers. Law enforcement agencies have seen an alarming jump in a spoofing technique known as swatting. The basic concept is the same, but the agency is the initial victim of the scam — with potentially deadly consequences for those whom agencies are charged with protecting.

    Many government call centers have tried to combat spoofing practices by eliminating initial contact with customers via telephone, but millions of people fall for these scams every year. Some agencies send public reminders that they won’t call about an issue, but scammers make their calls convincing enough to succeed.

    Related: How To Avoid Spam Calls And Focus On Important Ones

    How technology can help

    All is not lost. Scam calls are a technical problem that requires a technical solution. There are many tools public agencies and private organizations can implement to rebuild trust with consumers. One example is emerging technology in providing better caller ID by applying a token to verified phone numbers or displaying a branded logo on the receiver’s phone. Services like this allow organizations to ensure outbound calls aren’t mislabeled as spam calls or blocked by the telephony system and that they actually originate from the correct entity.

    It’s similar to your fingerprint: difficult to fake and uniquely tied to your identity. Calls can be certified as they’re routed by verifying the phone number belongs to the person (or call center) placing the call.

    Major cell phone providers often use each other’s databases as trusted sources, too, so this tool isn’t limited to a single provider. It can also stop spoofed outbound calls at the source and identify likely fraudulent calls so people can screen them appropriately.

    Another emerging caller ID technology has worked remarkably well for the Virginia Department of Health (VDH). During the height of COVID-19, the VDH reached out to patients and close contacts daily. When only an unidentified phone number was displayed, many calls went unanswered, wasting the department’s time and resources.

    When the VDH branded the calls as they displayed on recipients’ phone screens, presenting the department’s logo and name on the recipient’s smartphone, its first-time answer rate jumped 105% almost immediately.

    Related: This Saas-Based Startup Is Disrupting Call Centre Market With AI-Based Voice Bots

    Tools to repair trust

    Scammers are constantly innovating, but the technology sector innovates alongside them. Call carriers, third-party service providers and the federal government continue to develop new anti-spoofing tools, processes and policies to protect consumers — and public sector agencies must be sure to use them. Through constant vigilance, they can combat fraudulent phone calls, bolster public trust and improve the customer service experience.

    Scott Straub

    Source link

  • Father-Son Duo to Serve Time for $20 Million Lottery Scheme | Entrepreneur

    Father-Son Duo to Serve Time for $20 Million Lottery Scheme | Entrepreneur

    A father and son had their day in court after a decade of lying and scheming to defraud the Massachusetts State Lottery – illegally claiming more than $20 million in lottery winnings to avoid federal taxes.

    Ali Jaafar, 63, was sentenced to five years in prison, and his son, Yousef, 29, will serve 50 months for “unlawfully” claiming more than 14,000 winning lottery tickets in a “ten-percenting” scheme involving multiple convenience stores across the state from 2011 to June 2020, the U.S. Attorney’s Office for the District of Massachusetts said in a press release. The scam resulted in $6 million in federal tax losses.

    The Jaafars purchase winning lottery tickets at a discount from people who wanted to avoid having to identify themselves — lottery winners in the state are legally required to identify themselves to collect their winnings. This allowed the winners to dodge any outstanding tax or child support payments, which are deducted from the prize money if owed, according to the U.S. Attorney’s Office for the District of Massachusetts.

    RELATED: A Florida Woman Was Scammed Out $11,000 By People Claiming to be Arizona Lottery Winners. Now She Wants Justice.

    The scammers would pay convenience stores for leads on winners and then lie to the Massachusetts State Lottery Commission to claim winnings on their behalf. The Commission is set to revoke or suspend more than 40 licensed lottery agents as a “direct result of this case,” said Acting United States Attorney Joshua S. Levy in a press release. “This case is, at its core, an elaborate tax fraud.”

    “Instead of using business savvy and skill to build a legitimate multi-generational family business, the Jaafars carried out a complex decade-long tax and lottery scam, building a vast network of coconspirators to further their illegal activities. Tax violations have been erroneously referred to as victimless crimes, but it’s the honest law-abiding citizen who is harmed when someone tries to manipulate our nation’s tax system,” said Joleen Simpson, special agent in charge of the Internal Revenue Service’s criminal investigations in Boston, in the release.

    Ali, his other son Mohamed (who’s awaiting sentencing after pleading guilty to conspiracy to defraud the Internal Revenue Service in November), and Yousef have been some of the highest individual ticket cashers in the state for years.

    “This case should serve as a warning to those who think they can cheat the system for their own financial gain: you will be identified, prosecuted and held accountable,” Levy said.

    RELATED: This Retired Mathematician Won $26 Million From State Lotteries … Legally

    In addition to defrauding the Commission, the Jaafars would then report their winnings on their income tax returns as fake gambling losses, which allowed the family members to avoid federal income taxes and pocket fraudulent tax refunds totaling $1.2 million.

    Ali and Yousef were convicted by a federal jury in December for one count of conspiracy to defraud the Internal Revenue Service and one count of conspiracy to commit money laundering. Both were also hit with one count each of filing a false tax return. They were ordered to forfeit their profits from the scheme and pay $6,082,578 in restitution.

    “The outcome of this case sends a clear message that anyone complicit in the avoidance of financial obligations through fraudulent Lottery prize claims faces real and severe consequences,” said Mark William Bracken, interim executive director of the Massachusetts State Lottery, in a statement.

    Sam Silverman

    Source link

  • Overlooking These 4 Critical Measures Expose Your Company to Cyber Attacks | Entrepreneur

    Overlooking These 4 Critical Measures Expose Your Company to Cyber Attacks | Entrepreneur

    Opinions expressed by Entrepreneur contributors are their own.

    Here’s a sobering truth: 95% of cyberattacks can be traced to human errors. The more employees you have, the greater your risk of being a cybercrime victim. We all imagine legions of hackers trying to tear through our firewalls, and yes, occasionally, some will make it through. But the much-more-common truth is that unsuspecting employees inadvertently grant those cybercriminals access to corporate systems and data, or they are influenced by these hackers to perform questionable (or even illegal) actions.

    Even worse are the willful fraudulent actions of the humans sitting between the keyboard and the chair. Some employees themselves try to cheat the system by changing amounts, bank account details, or other data to benefit their personal financial situation. Then, there are other outside humans up to no good, such as when a supplier or partner sends fake or altered documents to the company, such as vendor invoices with fake bank account details or wrong amounts.

    None of these occurrences are an indictment of company leaders, security practices or judgment. They just highlight that technology alone can’t stop every cyberattack. The key to maximizing protection and minimizing exposure to these attacks is to combine technology with the human touch.

    Related: Cybercrime Will Cost The World $8 Trillion This Year — Your Money is in Danger. Here’s Why Prioritizing Cybersecurity is Crucial to Mitigate Risk.

    1. Secure data starts and ends with humans

    Many cyberattacks succeed due to simple but preventable human error or improper reaction to a scam. For example, an employee might reveal usernames and passwords after clicking on a link in a phishing email. They might open an email attachment that unknowingly installs ransomware or other equally destructive malware on the corporate network. Or they might simply choose easily guessed passwords. These are just a few examples that can allow cyber thieves to attack.

    To minimize human error-related risks, consider implementing the following measures to ensure your business stays well-protected.

    • Strengthen employee awareness and training: Arrange periodic training on cybersecurity best practices, recognizing phishing emails, avoiding social engineering attacks, and understanding the importance of secure data handling. In 2022, around 10% of cyberattack attempts were thwarted because employees reported them, but they can only report such attempts if they recognize them.
    • Build a culture of security: Make sure everyone in their role is actively protecting company assets by promoting open communication about security issues, recognizing employees who demonstrate sound security practices, and incorporating security into performance evaluations.
    • Employ stricter access controls: Access controls limit who can view or change sensitive company data and systems. Applying the “principle of least privilege” access controls and educating employees on the risks of account sharing can limit unauthorized accesses and data leaks.
    • Use password managers: Strong passwords are difficult to crack but challenging to remember. Password manager software can create and store difficult-to-guess passwords without users having to “write them down.”
    • Enable multifactor authentication (MFA): MFA adds an extra layer of security by requiring an additional verification method — such as a fingerprint or a one-time code — just in case a bad actor does snitch an employee’s password.
    • Implement fraud detection processes for incoming documents: These processes attempt to identify fraudulent documents (like fake invoices) on receipt before they can be processed.

    2. Reduce exposure to cyberattacks and fraud with technology and automation

    While lack of awareness, training, recognition and processes account for the success of most cyberattacks, you still need technology barriers to try and keep determined hackers out of your systems. Finance and accounting offices are top targets for cyberattacks and fraudsters, so the accounts payable (AP) systems are a prime target if they do get in.

    In fact, 74% of companies experience attempted or actual payment fraud. Accounts payable fraud exploits AP systems and the associated data and documents with mischief like:

    • Creating fake vendor accounts and fake invoices for them.
    • Altering payment amounts, banking details or dates on valid invoices.
    • Tampering with checks.
    • Making fraudulent expense reimbursement.

    Related: What Is Phishing? Here’s How to Protect Against Attacks.

    3. Keeping the bad guys out

    Of course, you’ll want your IT department to use technology to thwart unauthorized attempts to access the network and systems in the first place. Besides the venerable firewall, some trusty systems include:

    • Intrusion Detection and Prevention System (IDPS) monitors network traffic for malicious activities or policy violations and can automatically take action to block or report these activities.
    • Artificial Intelligence (AI) plays a significant role in cybersecurity by using machine learning algorithms to analyze volumes of data, identify patterns, and make predictions about potential threats. It can identify attack vectors and respond to cyber threats quickly and efficiently that humans can’t match.
    • Data Encryption ensures that only authorized parties with the correct decryption key can access a file’s content, protecting sensitive data at rest (stored on devices) and in transit (across networks).

    4. Protecting against fraud from the inside

    Whether a cybercriminal slips through all those barriers or an unscrupulous employee is bent on committing AP fraud, various types of automation can detect and prevent the cyber attack from succeeding.

    • Automated monitoring of employee activities: This can help identify suspicious behavior and potential security risks. The software tracks user activity, analyzes logs for signs of unauthorized access, and regularly audits user access rights. Of course, employees should know they are being monitored and to what extent.
    • Automating the payment process end-to-end on a single platform: It takes human error (and human scruples) out of the equation, except when there’s an exception. Encrypted receipt/intake of electronic invoices from suppliers, automated matching of invoices to orders, and electronic payments —all without human intervention — are examples of how automation removes the opportunity (and temptation) to commit AP fraud.
    • Document-level change detection takes this protection one step further: This automated technology can detect when a sneaky cyberthief with access to the underlying systems makes unauthorized access attempts, modifications, or deletions to sensitive documents, including orders, invoices, and payment authorizations. These tools alert administrators and provide detailed audit trails of document activity, helping detect and prevent AP fraud, whether it comes from outside or inside.
    • Detection of unusual data patterns: Alert AP staff to take a further look before allowing the invoice to be processed and paid. Using machine learning and AI, automated systems can compare data with historical data, flagging suspicious changes in bank details, vendor’s legal name, and address as well as unusual payment amounts.

    Related: How AI and Machine Learning Are Improving Fraud Detection in Fintech

    It’s almost impossible to protect yourself entirely against cyber theft and AP fraud, especially when most of the vulnerabilities and culpabilities are human. You must focus your security efforts on the perfect balance between state-of-the-art technology and the humans between the keyboard and the chair. Proper and continuous training can reduce the human errors that allow cyberattacks to succeed. And technology and automation can help prevent attacks from reaching people in the first place. But the right combination of the two, though, is the key to defeating would-be fraudsters.

    Francois Lacas

    Source link