“Purchase Order Fraud” Is the Newest Nigerian Scam

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
A new, highly complex Nigerian scam is currently aimed at retailers in the US, in what the FBI calls “purchase order fraud;” it involves honed social engineering skills and the intervention of a third party, who is also a victim of a different scam.

According to the Bureau, this type of fraud has been used against a total of 250 vendors and the financial loss is estimated at $5 million / €3.937 million since 2012, in about 400 incidents; it is important to note that not all attempts have been successful.

The scheme is more sophisticated than the cons regularly associated with the Nigerian fraudsters as it involves shipping of large quantities of items overseas, which are almost impossible to recover.

Moreover, accomplices are used to carry out the deed, recruited through other forms of deceit, such as fake employment offers or romance scams on match-making websites.
Victims are in on the scam without even knowing
The crooks register domains and create websites that are very similar to those of real organizations in the US. Additional requirements are matching email accounts and spoofed phone calls, to make them look like they are placed from the area code of the entity they impersonate, which may be a company or an educational institution.

Posing as representatives of the legitimate organization, the fraudsters contact the customer service of a retailer to collect details about the purchasing account.

The next step is to place the order, with a requirement that it be made on a 30-day credit. Since the real organization is a reputable one, vendors have no trouble complying.

The shipping address provided is located in the US and according to the FBI, it is “a warehouse, self-storage facility, or the residence of a victim of an online romance or work-from-home scam,” who is asked to re-ship the merchandises either as a favor or believing it was part of their job.

In the final part of the scheme the vendor bills the real institution and learns about the fraud and records the losses since the goods have already been shipped.

“They order large quantities of items such as laptops and hard drives,” said Special Agent Joanne Altenburg, who has been tracking the crooks since 2012. She also added that in some cases expensive and specialized medical equipment has been ordered.

Read more: http://news.softpedia.com/news/Purchase-Order-Fraud-Is-the-Newest-Nigerian-Scam-463260.shtml
 

Cats-4_Owners-2

Level 39
Verified
Honorary Member
Top Poster
Well-known
Dec 4, 2013
2,800
This is nearly unbelievable, yet as I read this aloud to my wife we were both surprised at the great lengths and complexity such unlawful schemes have evolved into; and especially learning of those recruited whom were also duped to believe their assigned "re-shipping" tasks had been honest work. Let's hope Special Agent Joanne Altenburg, together with her team, succeed in enforcing swift, firm, and effective justice.
 

echo1

Level 20
Verified
Top Poster
Well-known
Sep 18, 2014
960
This is nearly unbelievable, yet as I read this aloud to my wife we were both surprised at the great lengths and complexity such unlawful schemes have evolved into; and especially learning of those recruited whom were also duped to believe their assigned "re-shipping" tasks had been honest work. Let's hope Special Agent Joanne Altenburg, together with her team, succeed in enforcing swift, firm, and effective justice.
I agree with your comments regarding the complexity and involvement in such schemes as this. I tend to "like" the schemes that follow the KISS methodology. Little time and effort usually reaps large rewards and many times, the perps get away with it. The larger schemes tend to get too complex and fall apart or leave a trail for law enforcement.

It always reminds me of the saying"The more complex you make the plumbing, the easier it is to clog up the drain."

Have another cup of coffee, my friend. Me, I'm enjoying a large cup of Tim Horton's finest.
 

Cats-4_Owners-2

Level 39
Verified
Honorary Member
Top Poster
Well-known
Dec 4, 2013
2,800
I agree with your comments regarding the complexity and involvement in such schemes as this. I tend to "like" the schemes that follow the KISS methodology. Little time and effort usually reaps large rewards and many times, the perps get away with it. The larger schemes tend to get too complex and fall apart or leave a trail for law enforcement.

It always reminds me of the saying"The more complex you make the plumbing, the easier it is to clog up the drain."

Have another cup of coffee, my friend. Me, I'm enjoying a large cup of Tim Horton's finest.
Thank you!:rolleyes: I must sleep first, before I shall fully appreciate what "Tim Horton's" represents through providing life sustaining (habitual) necessities.:p
There is just no end to these scams and probably never will be.
That is also what keeps bringing me back here (another happy habit ;)) and to the protective knowledge our community affords in the face of this:eek: endless tide that is ever in motion.:)
 
  • Like
Reactions: frogboy and echo1

frogboy

In memoriam 1961-2018
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
I
Thank you!:rolleyes: I must sleep first, before I shall fully appreciate what "Tim Horton's" represents through providing life sustaining (habitual) necessities.:p

That is also what keeps bringing me back here (another happy habit ;)) and to the protective knowledge our community affords in the face of this:eek: endless tide that is ever in motion.:)
It is very addictive isn't it. :D
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top