BNMC Blog

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Scammers are Using Economic Impact Payments to Phish People

Scammers are Using Economic Impact Payments to Phish People

It may not be a surprise to you that hackers and other scammers are trying to get between you and your stimulus money. Using the COVID-19 pandemic to prey on unsuspecting or ill-prepared people, they have already made off with more than millions of the $290 billion that the U.S. government has earmarked for its citizens. Let’s look at how you can avoid being another unfortunate victim of the modern cybercriminal. 

The stimulus is not the first time that the U.S. Government has distributed stimulus checks, but as online banking has become more commonplace, the treasury has been distributing millions of checks via direct deposit and it has given online scammers the opportunity to try and steal money that by right will come to you. Here are five ways that they are going about scamming people:

  1. Avoid anything that has you sign up for stimulus money - Chances are that you don't have to sign up to receive stimulus dollars, so be wary of anyone who contacts you claiming that you need to fill out information to enroll you.
  2. Scammers don’t just act online - There has been evidence of people getting postcards in the mail with a password printed on it and addressed to an individual. The card asks the user to go online to “access” or “verify” the individual’s payment information (bank account, routing number, etc.) Similar scams have been sent through traditional phishing messages via email, however, so read your correspondence thoroughly. 
  3. You can’t get your money faster - Scammers have also contacted people promising that for a small fee, they can get their money to them faster. Reputable tax companies have services like this around tax time, so it may be just enough to fool some people. 
  4. No, you aren’t getting more - There have also been reports of scammers sending people checks for more than they are owed. Later the scammer will call to apologize for the mistake and ask the person to return the difference in cash, gift cards, or a wire transfer. If the check isn’t coming from the U.S. Treasury, and you weren’t expecting another check, it is surely a scam. 
  5. IRS correspondence - It’s true that some people have had to fill out forms on the IRS website in order to get their checks sent to them or deposited in their bank accounts. Scammers have set up webforms much like the ones on the IRS’ Economic Impact Payment website. The IRS typically contacts people through the mail, so if you get a message or an email from the IRS asking you to take action, it’s best to ignore it.

Knowledge is the best defense against scammers. If you haven’t yet received your CARES Act stimulus money, you need to go to the official IRS website to find out why (or more likely when) you will receive your stimulus check.

Have you seen any scams looking to steal people’s money? Leave your story in the comments below and check back to our blog for more information about cybersecurity, and the practices you need to know to avoid being a victim of cybercrime.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 07 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Email Network Security Microsoft Hosted Solutions Software Hackers Computer Malware Business Efficiency Data Communication Google Small Business Workplace Tips IT Services Mobile Devices IT Support Tech Term Cloud Computing Hardware Internet Managed IT Services Data Recovery Backup Innovation Ransomware Smartphone Outsourced IT Users Upgrade Windows Smartphones Mobile Device Android Saving Money Miscellaneous Information Data Backup Disaster Recovery VoIP communications Server Windows 10 Facebook Phishing Browser Microsoft Office Business Management Business Continuity Productivity Cybersecurity Office 365 Managed IT Services Network Social Media Windows 10 Data Management Passwords Internet of Things Word Gmail Gadgets App Vulnerability Remote Monitoring Managed Service Apps Encryption Quick Tips Chrome Artificial Intelligence Infrastructure Mobile Office Access Control VPN Save Money Applications Remote Workers Router Analytics Employer-Employee Relationship Virtual Reality Settings Company Culture Managed Service Provider Tip of the week Money IT Support BYOD Website Networking Information Technology Maintenance BDR Google Drive Employee-Employer Relationship Collaboration Firewall Content Filtering Bandwidth IT Management Data Security Robot Big Data Apple Virtual Private Network Automation Education Storage Paperless Office Government Hacker Data storage Avoiding Downtime YouTube Computers Antivirus Development Unified Threat Management WiFi Risk Management Display HIPAA Office Tips Administration Managed Services Best Practice Laptop Vendor Management Mouse Monitors Mobile Security The Internet of Things Document Management Chromebook Going Green Server Management OneNote Business Technology Solid State Drive Touchscreen Business Intelligence Data Breach Wireless Windows 7 Downtime Managed IT IT End of Support Printing Software as a Service Training Marketing Tablet Social Network Password Hard Disk Drive Remote Computing Augmented Reality SaaS MSP Two-factor Authentication Wi-Fi Managing Stress Holiday Managed IT Service Virtualization Customer Relationship Management Scam Spam Computing iOS Data loss Outlook Retail Alert Bring Your Own Device Operating System Telephone Systems desktop LiFi Break Fix Social Hosted Solution Conferencing Search Humor Office Samsung Licensing Dongle Current Events Utility Computing Sports Servers Google Calendar Health Private Cloud Wires Updates Virtual Desktop Emergency Peripheral Device Reducing Cost Network Management Tech Support Solar Mixed Reality Dark Web Shadow IT Assessment Work Migration Consulting Spyware Cyber Monday Memes Smart Tech Cryptocurrency LED Threats Uninterrupted Power Supply Social Engineering Cooperation IT solutions Service Level Agreement Laptops Computer Care IBM Legislation Voice over Internet Protocol Google Docs PowerPoint File Sharing Internet Exlporer Hacks Mobility Batteries SharePoint Websites Compliance Microsoft Excel Gamification Hotspot Cybercrime Techology IT Technicians Optimization Google Wallet Identity Theft Smart Technology Connectivity Bitcoin Co-Managed IT Safety Staff Leominster Managed Services Provider Corporate Profile Statistics Modem Business Growth FinTech Onboarding GDPR How To Lenovo Language Value Print Toner G Suite Myths Downloads Regulations Legal Slack Automobile Hard Disk Drives Mail Merge Blockchain COVID-19 Content Huawei Dell VoIP Unified Threat Management Mirgation Unified Communications Recycling Drones Messaging Shortcut Distributed Denial of Service Holidays Network Congestion IoT Windows 8 Superfish K-12 Schools Entertainment Vendor WannaCry Bluetooth Comparison Distribution Cookies Digital Signage Data Warehouse Cabling Firefox Computing Infrastructure Professional Services Mobile Device Management Shortcuts Mobile Management Halloween Social Networking Deep Learning Monitoring Solid State Drives Google Maps Address Permissions Remote Work Writing Streaming Processor User Error Chatbots eWaste Employee-Employer Relationships Patch Management Payment Card Star Wars Wearable Technology Network upgrade Hybrid Cloud Specifications Logistics Dark Data Update Nanotechnology Alt Codes Troubleshooting Business Analysis Alerts USB Security Cameras Profiles Scary Stories Heating/Cooling Multi-Factor Security Motherboard Cables Spying National Security Human Error Memory Running Cable Time Management Printer Politics Identity Continuity Budget Analysis Students Digital Payment Inventory Fraud Cost Management Work/Life Balance Smart Office Scalability Digital Buisness Black Friday Asset Management Customer Service Screen Reader Typing Charging Virus Disaster Cleaning CCTV Black Market Law Enforcement Regulation Webcam Notifications Electronic Medical Records Physical Security Error Twitter Financial Ben McDonald shares Upgrades Gadget Emoji Point of Sale Crowdsourcing Travel Personal Information Botnet 3D Printing Supercomputer CrashOverride Cortana Staffing Motion Sickness Processors Taxes Machine Learning Administrator Web Server what was your? Unsupported Software IT Budget GPS Mobile Computing IT Consultant Computer Repair Relocation Cameras Mobile Data How To Tracking Recovery Printers Meetings

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3