Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Gutsy woman, 71, fends off violent attack by 4 teen girls on blue city subway

4 January 2025 at 12:37

An unflinching 71-year-old woman gave a group of would-be teen muggers a taste of their own medicine when they tried to mug the senior on her way to church on New Year’s Day.

The gutsy straphanger fought off the four female teens as they punched and stomped on her during the botched robbery on the New York City subway system, the latest in a string of crimes on the Big Apple’s crime-ridden transit network.

The victim was on her way to a church service on New Year's Day in Brooklyn at around 6 p.m. when she got off a Number 3 train at Hoyt Station – only to be set upon by the teens, according to the NYPD and a New York Post report. 

SUSPECT ACCUSED OF BURNING WOMAN TO DEATH ON NYC SUBWAY IS PREVIOUSLY DEPORTED ILLEGAL IMMIGRANT

Police say the four suspects tried to steal the woman’s bag and struck her on the body. The NYPD released video of the group smiling as they pass through subway turnstiles and police say they are still on the loose. They have asked for the public's help in tracking them down. 

The woman, identified by the Post as Linda Rosa from East New York, detailed the disturbing attack to the publication, saying she was adamant she would not be robbed. 

Rosa said after one of the teens tried to grab her purse while a second also tried to get her sticky fingers on it, asking the senior if she wanted to fight. 

The first teen then smacked Rosa in the face, knocking her glasses to the floor, while the second teen managed to snatch a pocket pouch that held Rosa’s ID and medical records, she said. 

"I was still wrestling with the first person," Rosa told the Post. "Then I was trying to kick her in between her legs, but my leg wouldn’t stretch far enough, so I believe that’s when I fell. I fell, and then she stomped on me." 

NYC MAN CHARGED WITH ATTEMPTED MURDER AFTER ALLEGEDLY SHOVING COMMUTER IN PATH OF SUBWAY

Fearing the law flouting teens would stomp her in the head, Rosa said she fought back. 

"So I got up right away, and with that, I grabbed her braids and twirled them around my right hand, and then I pulled her down. She had her head down," Rosa said. "Then the other young lady said, ‘Let her go.’ And I said, ‘Oh, no, I’m not letting her go.’"

The plucky senior yelled out for someone to help her and then the second teen came for her again. 

"So out of nowhere, I grabbed her hair and twisted it around my left hand," Rosa said. "So I had them both facedown….[like] rams when they’re getting ready to fight."

Rosa said the other two teens screamed at her to let the pair go and Rosa then yelled for help.

The senior eventually cut them loose and the stunned teens bolted from the subway system.

Rosa then headed to the nearby Brooklyn Tabernacle Church, where the staff tended to her and called 911, per the Post.

Police tell Fox News Digital that the victim sustained minor injuries and was taken by EMS to The Brooklyn Hospital Center in stable condition.

She told the Post that she was thankful they did not have weapons and that the frightening ordeal didn’t spark a heart attack.

Nevertheless, she said she forgives them.

"They do not know what they do," Rosa told the Post. "They don’t know what they did. It’s just teenagers acting foolish."

She said that nobody is safe in New York City’s subway system or on the streets these days. 

"It could happen to anybody," Rosa said. "Now we’re seeing seniors getting attacked. Anywhere – it can happen anywhere, any station. You could be walking down the street. You could be crossing the street."

The attack came just a day after a 45-year-old man was shoved into an oncoming subway train in Manhattan. He suffered a head injury and was miraculously listed in stable condition. 

Days earlier, police say an illegal immigrant from Guatemala heinously set on fire and burned a woman to death on a subway train in Brooklyn, New York.

The crimes come despite New York Governor Kathy Hochul touting the subway system as safe.

Colorado suspect wanted in alleged failed bank robbery after handing teller note that was illegible

28 December 2024 at 23:57

A Colorado man allegedly attempted to rob a bank but left with nothing after handing a note to a teller who was unable to decipher what he had written, according to police.

The incident happened shortly before 5 p.m. on Dec. 17 at First National Bank at 750 North Lincoln Ave. in Loveland, Colorado, according to the Loveland Police Department.

Police said the man walked into the bank and handed the teller a note.

COLORADO SKI RESORT MALFUNCTIONS, 174 RESCUED: 'ONCE-IN-A-LIFETIME-EXPERIENCE'

The teller, however, had a difficult time reading the note since it was allegedly almost completely illegible, according to CBS Colorado.

The man allegedly grew frustrated as the teller was struggling to read the note, so he quickly left the bank, the outlet noted.

AURORA, COLORADO, POLICE SAY HOME INVASION 'WITHOUT QUESTION' TREN DE ARAGUA GANG ACTIVITY

Police are still searching for the suspect.

The man was captured in surveillance images wearing a brown hoodie, green pants, a green baseball cap, sunglasses and brown gloves.

Luka Dončić's home burglarized, adding to list of targeted homes of high-profile athletes

28 December 2024 at 14:57

After the homes of Patrick Mahomes, Travis Kelce and Joe Burrow were burglarized in recent weeks, the ring has hit the NBA.

Luka Dončić's home was broken into Friday night, his business manager, Lara Beth Seager, told ESPN.

Nobody was home at the time of the burglary, and everyone is safe, Seager said.

CLICK HERE FOR MORE SPORTS COVERAGE ON FOXNEWS.COM

The crime occurred two days after Dončić' sustained a calf strain, which will cause him to miss roughly a month.

NFL Network’s Tom Pelissero reported last month that the FBI is investigating the crime spree, "which is believed to be tied to a South American crime syndicate." 

The NFL cautioned players to be on high alert after homes were targeted last month that were believed to be tied to international organized crime. 

The targeted NFL stars all had their homes burglarized while they were playing road games. Dončić's Dallas Mavericks were in Phoenix Friday playing against the Suns.

LEBRON JAMES TROLLED FOR SAYING CHRISTMAS BELONGS TO NBA AFTER NFL VIEWERSHIP IS REVEALED

In the memo, the league also urged players to take precautions, including installing home security systems. They were also encouraged not to post images of expensive items or live updates of their whereabouts on social media. 

"I feel like my privacy has been violated in more ways than one. And way more is already out there than I would want out there and that I care to share. So, that's all I got to say about that," Burrow said earlier this month.

"We live a public life, and one of my least favorite parts of that is the lack of privacy. And that has been difficult for me to deal with my entire career. Still learning. But I understand it's the life that we choose. Doesn't make it any easier to deal with."

Fox News' Scott Thompson contributed to this report.

Prankster arrested after reportedly filming himself spraying food at Walmart: 'Reckless'

22 December 2024 at 15:59

A prankster was recently arrested and charged after allegedly spraying bug killer on food in an Arizona Walmart, police say.

Charles Smith, 27, was charged with felony-level poisoning and misdemeanor-level criminal damage, in addition to misdemeanor charges of endangerment and theft. The Mesa Police Department confirmed the arrest in a statement to Fox News Digital.

The incident began on Dec. 19 at around 8:30 p.m., police said, when the suspect entered a Mesa Walmart "intending to film pranks for social media." He then grabbed a can of bug killer "without paying for it," according to the police's statement.

According to the authorities, Smith aimed the spray at both produce and prepared food items, such as rotisserie chickens.

THIEVES STEAL 2,500 PIES IN ODD FOOD HEIST GONE WRONG: 'SO MUCH WASTE'

"He then sprayed the pesticide on various produce items, including vegetables, fruit, and rotisserie chickens that were available for purchase," the Mesa Police Department's statement said. "Smith filmed his face, the pesticide can, and the act of spraying. He later posted the video online."

Smith later voluntarily turned himself in and admitted to the crimes.

"Through investigative means, and with assistance from the Tempe Police Department, detectives were able to identify Smith as the suspect," the statement added. "Mesa Police contacted Smith and he turned himself in voluntarily. During the interview, Smith admitted to the theft and spraying of the pesticide."

WOMAN 'STILL SUFFERING' AFTER BEING KNOCKED OUT BY A CAULIFLOWER WHILE GROCERY SHOPPING

"Thanks to the tireless work of our officers and detectives, an arrest occurred less than 24 hours after police were notified of the incident," the police department continued. "We also extend our gratitude to the Tempe Police Department for their valuable contributions and collaboration in quickly solving this case."

Authorities added that the incident exemplifies "the potential dangers of reckless actions disguised as social media pranks."

On Sunday, Walmart told Fox News Digital that customer safety "is always a top priority," and confirmed that all tainted products were removed from shelves.

CLICK HERE TO GET THE FOX NEWS APP

"We have removed all directly impacted product and have cleaned and sanitized the affected area of the store," the company continued. "We apologize for any inconvenience this may have caused our customers as we work to resolve this issue. We will continue to work closely with law enforcement during their investigation."

Tren de Aragua gang members arrested in NYC apartment next to daycare facility

20 December 2024 at 14:55

Several suspected members of the bloodthirsty Venezuelan gang Tren De Aragua (TdA) were busted hiding out in a New York City apartment building located next to a daycare center, a law enforcement source tells Fox News, underlining how the gang has immersed itself among the general population in the sanctuary city. 

The New York Post was first to report on the Bronx bust with the publication reporting that seven suspected members of TdA – which has been terrorizing cities across the nation following – were arrested inside the apartment building and were sought on multiple warrants after crossing the US border with Mexico. 

The raid on the Bronx five-story apartment building, which is located next to the Doña Juana Day Care facility, took place on Dec. 5 and was carried out by Homeland Security Investigations (HSI) and the NYPD's federal task force, a law enforcement source tells Fox News. A separate raid took place in Brooklyn with 22 suspected members of the gang scooped up in both raids. 

A worker at the daycare center tells Fox News Digital that there were children inside the facility when the raid took place. 

VENEZUELAN GANG MEMBERS LINKED TO VIOLENT APARTMENT TAKEOVER ARRESTED IN NEW YORK CITY

The vicious gang has taken advantage of a lax southern border under the Biden-Harris administration, with many of its foot soldiers swarming the U.S. and unleashing hell on unsuspecting communities. The gang has been engaged in all sorts of violent crime, including murders, shootings of police officers, assaults, robberies and gun smuggling into migrant shelters.

The alleged gangbangers were traced to the Bronx apartment after tracking the ankle monitor of suspected TdA member Jarwin Valero-Calderon to the hideout on the edge of Crotona Park, sources told The Post. Crotona Park is where President-elect Trump held a campaign rally in May

The NYPD confirmed to Fox News that Valero-Calderon was one of those who was taken into custody on Dec. 5 on a federal arrest warrant. 

According to the Post, Valero-Calderon entered the U.S. at Eagle Pass, Texas, in August 2022 and was released with a court date. In the meantime, he racked up a long rap sheet in multiple states before being ordered deported in April but was still on the loose on Dec. 5, the Post reports, citing sources.

Valero-Calderon reported to a US Immigration and Customs Enforcement (ICE) office in New York City in September 2022 but then went on his crime spree.

VENEZUELAN MIGRANT GANG TREN DE ARAGUA NOW OPERATING IN 16 STATES: REPORT

He was twice busted on larceny charges in New York and New Jersey with a conviction in June 2023. He was also arrested on a separate petty larceny conviction in Nassau County on April 24, 2023, before being arrested in Florida in February for fraud, larceny and resisting arrest, according to the Post.

Other suspected TdA members arrested in the raid, according to the Post, include Angel Gabriel Marquez Rodriguez, 19, who was arrested in Chicago last year on a shoplifting charge then four months later was busted on larceny charges in New York City and again three months later.

Jhonaiker Alexander Gil Cardozo, 24, was also arrested by the NYPD on grand larceny and stolen property charges back in July and had two other Big Apple busts in June for reckless endangerment and robbery but was left out on the streets.

Last week, New York City Mayor Adams sat down with incoming border czar Tom Homan and agreed to work with the new Trump administration in weeding out migrant criminals in the city. It was met with pushback by some Democrats.

News of the raids was welcomed by New York City Council Member Joe Borelli of Staten Island. 

"This is a gang that set up camp in our city, and it is beyond the pale that the Democratic Party is entrenched against having the NYPD cooperate with ICE to remove them," Borelli told Fox News Digital. "They are actively recruiting members among the migrant community and unfortunately, spend most of their time terrorizing those very same people."

"Mayor Adams should use every resource available to end the city law that precludes the NYPD from cooperating with ICE because it is specific groups like this that make me question the sanity of people who seek to protect them and ensure they remain here."

Those comments were echoed by Rep. Nicole Malliotakis, R-N.Y. who told "Maria Bartiromo's Wall Street" that Democrats have been weakening laws to allow for illegal immigrants, gangs and criminal organizations to stay within New York and "wreak havoc."

"It's good news that we're hearing Eric Adams change tune, but quite frankly, he has the ability right now under existing law to cooperate with Ice detainer requests for people who are hardened criminals for violent offenders, for sex offenders," Malliotakas said. 

Late last month, two members of the violent gang who participated in a caught-on-camera-armed apartment invasion in Aurora, Colorado, were captured in New York City. 

Denyeer Aramillo Meneses, 23, and Edison Pena Angulo, 25, both pictured in the viral video, were nabbed in the Bronx by an NYPD gang task force and Homeland Security in a major credit card scam and drug trafficking bust.

Fifteen suspected members of the notorious gang were picked up after a six-month investigation into the gang’s crimes that led to a drug ring, sources told the New York Post

Fox News’ Christina Coulter contributed to this report.

Personal Data of Rhode Island Residents Breached in Large Cyberattack

14 December 2024 at 16:25
An “international cybercriminal group” harvested the personal data of potentially hundreds of thousands of people from the state’s social services and health insurance systems, officials said.

How to thief-proof your Christmas decorations

14 December 2024 at 10:00

Holiday decoration theft has become an increasingly frustrating issue for many homeowners. Karen from Los Angeles shared her experience with us in an email, stating,

"We have criminals who visit our neighborhood to not only steal mail and packages but also holiday decorations. I made a Christmas decoration for our mailbox, which was promptly stolen."

We’re sorry to hear about the theft in your neighborhood. This highlights a problem that goes beyond mere property loss. It's a theft of holiday cheer and personal effort. Let’s see how we can use technology to help secure your decorations.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Karen also inquired about the effectiveness of Samsung SmartTags, asking if these tags would work on her decorations and how far they could reach. The good news is that Samsung SmartTags can indeed be used on your holiday decorations. You can attach the SmartTag to any item you want to track. These devices are compatible with most recent Samsung Galaxy phones, including the Galaxy S9, making them accessible to many Android users.

As for the distance, the range of the Samsung SmartTag uses Bluetooth to connect to your phone. If the item is within Bluetooth range, you can ring it to find it or use the "Search Nearby" feature to get directions to it. If the item is out of range, other Samsung devices near the tag will anonymously locate it for you and then let you know where it is. This is done in the background and is encrypted to ensure privacy. The SmartTag does not beep when it’s out of range.

The Samsung SmartTag is compatible with almost all Samsung Galaxy phones released recently. They must have 2GB of RAM and run Android 8.0 (Oreo) or higher. So, your Samsung Galaxy S9 phones should be compatible with the Samsung SmartTag.

TOP PICKS TO AMP UP YOUR HOME SECURITY

For those considering a switch to Apple, AirTags present another viable option. Karen asked if she would have problems tracking her decorations with an Apple AirTag. While primarily designed for iOS devices, you can use it with your Android phone as mentioned in our article here, with some limitations. It uses the Find My network, and if another Apple device passes by the AirTag, the Find My network will be notified of the lost item’s location.

The AirTag does not beep when it’s out of range. However, the AirTag’s Precision Finding feature, which provides highly accurate tracking, is only compatible with iPhone 11 series and onwards. If you’re considering purchasing an iPhone, the iPhone 11 would be a relatively inexpensive option that is compatible with the AirTag’s Precision Finding feature.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

BEST HOME SECURITY SYSTEMS

Both Samsung SmartTags and Apple AirTags offer extensive tracking capabilities. The SmartTag uses Bluetooth for nearby tracking and relies on other Samsung devices for long-range location. Similarly, AirTags leverage the Find My network, utilizing nearby Apple devices to relay location information.

For Samsung users like Karen, the SmartTag is the natural choice, working seamlessly with Galaxy devices. Those considering Apple might look at the AirTag as an option.

Please note that while these tags can help you track your items, they might not prevent theft as they are not hidden devices and can be removed by someone who recognizes what they are. 

10 THINGS YOU MUST CONSIDER WHEN CHOOSING ANY SECURITY CAMERA

1. Use motion-activated cameras: Install motion-activated security cameras to monitor your decorations. Many security cameras send real-time notifications to your phone, allowing you to act quickly if someone tampers with your property.

2. Secure decorations: Consider physically securing your decorations with zip ties, chains or locks. While this won't deter all thieves, it can make stealing more difficult and time-consuming.

3. Light it up: Well-lit areas are less appealing to thieves. Ensure your yard and decorations are adequately lit with outdoor lights, especially in dark corners or near entry points.

4. Engage your neighbors: Create a sense of community by alerting neighbors to thefts and keeping an eye out for suspicious activity. A connected neighborhood can act as a strong deterrent.

5. Mark your property: Use invisible ink or engrave your decorations with a unique identifier. If stolen items are recovered, this will help law enforcement return them to you.

6. Report thefts to local law enforcement: Always report thefts, no matter how small. Law enforcement can track patterns and increase patrols in areas with frequent incidents. Providing details may also help them recover stolen items.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

In her email, Karen expressed her frustration: "I know this seems minor... but it’s disheartening to see the things you spend time, money and a little love get stolen." The desire to protect holiday decorations goes beyond material value — it's about safeguarding the joy and effort put into creating a festive atmosphere. As we embrace these technologies, let's also remember the importance of community vigilance and mutual respect.

Have you ever used tracking devices, security cameras, or other gadgets to safeguard your decorations? What worked well, and what would you recommend to others? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to Make Cybersecurity Training Accessible

We repeatedly hear that human behavior is an essential element of any organization’s security, arguably the most critical.

Therefore, most training programs focus on putting people first. But do you think everyone can access and understand your training? 

Accessibility needs to be a fundamental part of your awareness program. Furthermore, your security strategy needs to permit accessible options. For the millions of people living with disabilities, inaccessible training and tools leave them vulnerable – which becomes a vulnerability for our organizations and society. To create a safer digital environment, we must ensure that cybersecurity training is accessible and inclusive. You can start making your training accessible today.  

Understand the unique needs of employees with disabilities 

Disabilities come in many forms, including physical, cognitive, and sensory impairments. These present distinct challenges when interacting with digital systems, particularly cybersecurity tools that often require fine motor skills, clear visual perception, or cognitive focus. For instance, a visually impaired person might struggle with CAPTCHA verification, while someone with a hearing impairment may miss critical audio alerts during security processes. 

Inaccessible protocols make it difficult for people with disabilities to complete basic cybersecurity tasks, increasing the risk of human error or insecure workarounds. Employees with disabilities are just as invested in maintaining security as their peers, but without accessible tools and training, they are often unintentionally excluded from these efforts. 

For example, if a person has a visual impairment, using facial recognition for multi-factor authentication on a smartphone would be difficult because they might be unable to match their face with the phone’s camera.  

However, accessible training is a good practice even if you don’t think anyone on your team requires accommodation. Consider the three following scenarios: 

  • A coworker is deaf.
  • A coworker is working at a noisy coffeeshop without headphones.
  • A coworker has a hard time hearing because of an ear infection.  

If your training video doesn’t have a transcript or closed captions, none of these coworkers can learn from it. By making accessibility a priority, you improve the reach of your program for everyone.

Common accessibility challenges in training and awareness programs

Traditional cybersecurity training methods frequently fall short of addressing the needs of employees with disabilities. If the effort isn’t spent making them accessible, training materials such as video tutorials or interactive platforms might rely heavily on visual or auditory cues without offering alternative formats. People with visual impairments may struggle with videos lacking closed captions or alternative text. Those with mobility issues may find navigating training modules requiring precise mouse clicks challenging. 

Additionally, your training might emphasize speed and efficiency, which disadvantages people who require more time to process information or interact with digital tools. As a result, employees with disabilities may miss critical training details, leaving them underprepared for potential security threats. This puts them at risk and increases the organization’s overall vulnerability. 

Creating accessible cybersecurity training is not just about compliance with regulations; it’s about fostering an inclusive security culture that empowers all employees. Accessible training ensures everyone can fully engage with and adhere to security practices. 

When organizations prioritize accessibility, they create a more supportive environment where employees feel valued and capable of contributing to their workplace security. This inclusivity reduces the risk of errors, improves overall security compliance, and promotes a culture of trust and safety. Moreover, accessible training benefits all employees by offering easy-to-follow materials catering to various learning styles and preferences. 

One out of every four Americans lives with a significant disability, but we have a long way to go to make the internet accessible to everyone. A recent WebAIM survey found that 96% of website homepages failed to meet one or several international accessibility guidelines.  

So accessibility isn’t just a goal for training – we must work to ensure all cybersecurity protocols are accessible to everyone, too.

Accessible and secure by design

Designing accessible cybersecurity solutions starts with understanding usability and people’s diverse needs. Accessibility doesn’t mean compromising on security; it means finding innovative ways to ensure that everyone can participate in keeping an organization secure. This includes design choices that account for visual, auditory, and cognitive differences. 

Some key strategies for accessible design include: 

  • User-friendly interfaces: Implementing interfaces that are easy to navigate, with clear fonts, proper color contrast, and simple layouts that accommodate screen readers or other assistive technologies.
  • Alternative formats: Providing alternative content formats, such as text descriptions for visual elements or captions for video content, ensures that people with different disabilities can access the same information.
  • Flexible input methods: Offering options like keyboard navigation, voice commands, or biometric authentication (e.g., fingerprint or facial recognition) can cater to users who struggle with traditional methods like passwords or CAPTCHA. 

When accessibility is built into cybersecurity tools from the start, it not only benefits employees with disabilities but also improves the overall user experience.  

For example, state governments in the United States must adhere to Web Content Accessibility Guidelines (WCAG) 2.1 Level AA. These guidelines provide specific criteria for digital content that is usable to all and are a good place for your organization to start.  

Involve your people in accessibility efforts

No one understands the accessibility needs of your team better than your employees. Engaging your team in the design, testing, and feedback processes leads to more effective and inclusive security solutions. Encouraging open dialogue allows organizations to identify specific accessibility barriers and develop tailored strategies that address them. 

Collaborating with accessibility experts and user experience designers will enhance these efforts. By working together, organizations can ensure that their security practices are robust yet adaptable to the diverse needs of their workforce. 

In cases where security policies may conflict with accessibility needs, such as strict password policies that are difficult for some users to manage, flexibility is vital. Explore alternative methods that meet security requirements while accommodating employees’ needs – there’s more than one way to MFA, for instance. A culture of collaboration empowers employees to maintain security without compromising their ability to perform their roles effectively.

The post How to Make Cybersecurity Training Accessible appeared first on National Cybersecurity Alliance.

What is Pig Butchering and How to Spot the Scam 

“Pig butchering” is a scam that’s been muscling into the headlines lately.

The unsettling term for these scams, pig butchering, suggests that scammers take their time to “fatten up” their victims and take as much money as they can.

These scams are also called “accidental text” scams because they often begin with a seemingly innocent mistaken text. These scams are defined by the fact that they take place over a long period of time, and they frequently combine multiple scam tactics. 

You can keep your wallet off the chopping block by watching out for red flags and protecting your data.  

Pig butchering scam meaning

The term “pig butchering” is a translation from the Chinese term shu zhu pan, which can also be translated as “killing pig plate.” For the scammers, the “pig” is a victim to be fattened up for slaughter so scammer can siphon off as much money as possible. Pretty nasty stuff!  

Shu zhu pan scams were first identified in China in the late 2010s, perpetrated by fraud networks that targeted Chinese offshore gamblers. Many of the organized crime outfits that specialize in pig butchering are still based in Asia but target people all over the world.

What is pig butchering? 

Pig butchering is very similar to romance scams, which have been around for decades, and other cryptocurrency scams that sprouted as crypto became mainstream over the past 10 years.  

As pig butchering scams have proliferated, they seem to share several traits in common: 

  • “Accidental” contact: Scammers often pretend they contacted the potential victim by mistake. While contact can occur through texts, it can also happen through social media DMs, dating sites, or other electronic communications.  
  • Crypto investment: After conversing with the target, the scammer will try to persuade them to invest in a cryptocurrency or platform. They may also suggest gold trading or forex (foreign exchange markets). In pig butchering, all these “investments” are fabrications, and the money goes straight into the scammer’s pocket.  
  • Extended contact: The scammer will insist on continued investment once they’ve hooked a victim. They might produce fake charts or even send over small “withdrawals” to convince the victim. Sometimes a target is directed to a fraudulent app that mimics financial platforms like Robinhood or Coinbase. Once the victim catches onto the scam or seems to be tapped dry, the scammer ends contact and disappears.

Pig butchering red flags 

The best way to avoid becoming a pig butchering victim is to be suspicious of any seemingly mistaken contact. This includes texts, messaging services like WhatsApp, online dating platforms, and social media. As generative AI becomes widespread, “wrong number” phone calls and even video calls could be pig butchering scams.  

These texts can be simple (“Hi.”), conversational (“Long time, no see”), and even downright whimsical, suggesting an intriguing story (“It’s been forever since our last charity gala!”). 

A good rule of thumb is to never respond to any communication from a stranger. Don’t even tell them they’re texting the wrong number.  

Here are some general pig butchering red flags to look out for: 

  • Seemingly accidental or mistaken contact, but the person wants to keep talking.
  • Conversation turns to investments in cryptocurrency, gold markets, or forex.
  • Continued, sustained contact to encourage repeat theft.  

How the scam works 

Most of these scammers work from offices and are forced to scam by organized crime syndicates. Many perpetrators are actually human trafficking victims lured in by the promise of a call center job, for example.  

Scammers can buy batches of phone numbers stolen in data breaches or phone numbers from legal data brokers. They then send fake messages to millions of phone numbers hoping someone will respond.  

Once a person responds, even with “you have a wrong number,” the scammer will strike up a conversation.  

At some point, the conversation will pivot to investment opportunities. The scammer might say they know about a great new cryptocurrency or a trading platform. They will make the investment sound as legitimate as possible by sharing screenshots or sending pics of their apparently glamorous lifestyle.   

Sometimes, victims are added to a group chat with many people discussing investments. The group is all scammers, or it might just be one person using multiple profiles! 

If you agree to invest, the scammer will focus on getting you to invest more and more money. They will share doctored images showing incredible returns. They might control an app or website that you can engage with. In rare cases, they might even send you some money as a fake withdrawal or dividend. 

Pig butchering scammers are ruthless – after you’ve “invested” all the money you have at hand, they will ask you to dig into retirement savings, and then try to convince you to go into borrow money and go into debt. 

If you ask for your money back, the scammers might agree but then claim they need more money to handle “tax problems” or brokerage fees.  

Once the scammer decides that the pig is thoroughly butchered, they will cut off communication. This usually happens after they’re convinced the victim has no more money to steal or the victim becomes suspicious. If the scammer can access the victim’s bank account, they will empty it.  

What to do if a pig butchering scam happens 

If you think you’re a victim, stop all contact with the suspicious person and stop investing money. Report the crime to your bank and IC3 right away. The longer you wait, the harder it is to reverse fraudulent transactions.  

To reduce the risk of being caught up in a pig butchering scheme, be mindful of what personal data you share online and follow other cybersecurity basics. 

The post What is Pig Butchering and How to Spot the Scam  appeared first on National Cybersecurity Alliance.

❌
❌