logo
#

Latest news with #identitytheft

Massive identity theft scheme led by illegal immigrants uncovered after raid at meatpacking plant
Massive identity theft scheme led by illegal immigrants uncovered after raid at meatpacking plant

Fox News

time3 hours ago

  • Fox News

Massive identity theft scheme led by illegal immigrants uncovered after raid at meatpacking plant

ICE has uncovered a massive identity theft scheme led by illegal immigrants and possibly tied to organized criminal networks following a workplace raid at a meatpacking plant in Omaha. According to an ICE statement, approximately 70 illegal aliens working at the plant were discovered to be using stolen Social Security numbers and identities to unlawfully obtain employment authorization, wages and benefits at the expense of over 100 victims. The statement said that the victims have faced "devastating financial, emotional and legal consequences" as a result of the identity theft. Working with other federal and state partners, ICE agents conducted a major workplace raid at Glenn Valley Foods in Omaha on June 10. The raid resulted in over 70 illegal immigrants being arrested, which sparked protests both in the community and across the country. While the arrests have sparked outrage from some in both the local community and nationally, ICE said the illegals' identity theft proves they were not innocent, hardworking members of society, as some have suggested. Another ICE representative told Fox News Digital that the illegal aliens who were apprehended at Glenn Valley Foods were behind the crime and that "some may have used organized criminal networks" to carry out the crime. The representative said that the investigation is still ongoing and that the exact number of individuals impacted is still unknown. The ICE spokesperson pointed to a few examples of those victimized by the apprehended illegals' identity theft scheme. The spokesperson said a disabled person in Texas, who was unable to work, struggled to get their Social Security disability payments because an illegal alien was fraudulently using their identity and earning wages at Glenn Valley Foods. Another victim in Colorado received a notice from the IRS to repay more than $5,000 after their income was falsely increased due to an illegal alien using their identity to work at the plant. In Missouri, a full-time nursing student lost their college tuition assistance because it was fraudulently reported that they earned too much money due to an illegal alien at Glenn Valley Foods using their Social Security number. Another person living in California has had to work for nearly 15 years to regain their identity and fix the financial damage done by an illegal who was working at Glenn Valley Foods, according to the spokesperson. Mark Zito, special agent in charge of Homeland Security Investigations Kansas City, which covers Omaha, said in a statement emailed to Fox News Digital that "the criminals who stole these identities didn't just break the law, they upended lives." "There have been individuals who have gone on the record recently referring to the identity thieves we arrested last week as 'good, hardworking, and honest,'" he said. "These so-called honest workers have caused an immeasurable amount of financial and emotional hardship for innocent Americans. If pretending to be someone you aren't in order to steal their lives isn't blatant, criminal dishonesty, I don't know what is." "These victims aren't faceless statistics; they're real people who are being denied healthcare and have lost educational opportunities," added Zito.

Aflac hacked: Social Security numbers, claims, and health data at risk in insurance firm cyberattack
Aflac hacked: Social Security numbers, claims, and health data at risk in insurance firm cyberattack

Fast Company

time5 hours ago

  • Business
  • Fast Company

Aflac hacked: Social Security numbers, claims, and health data at risk in insurance firm cyberattack

Aflac Incorporated (NYSE: AFL) was the most recent target of a 'sophisticated cybercrime group' that has led a campaign against a number of insurance companies in recent weeks, according to a statement issued by the company today. The cyberattack, which was first identified by the company June 12, was stopped within a few hours and business operations were not impacted. However, the number of Aflac insurance-holders affected by the breach is still unknown. Files containing personal information, such as Social Security numbers, health information, and insurance claims information, could have been compromised during the attack, the company said. 'We regret that this incident occurred,' the company wrote in a statement. 'We will be working to keep our stakeholders informed as we learn more and continue investigating the incident.' During the investigation, Aflac is offering credit monitoring, identity theft protection, and a two year Medical Shield policy for free to any customers who call their incident-dedicated call center. The company suspects social engineering helped the cybercrime group infiltrate its networks. Social engineering—which includes tactics like phishing emails—involves deceiving a victim into revealing personal information or providing access into otherwise secure systems. Aflac is only the latest insurance company impacted by these cybersecurity incidents. Erie Insurance and Philadelphia Insurance Companies issued statements about similar cyberattacks earlier this week, exposing a growing threat to the insurance industry. The insurance industry is a recent target of a cybercrime group called Scattered Spider, John Hultquist, chief analyst of Google's threat intelligence group, shared Monday on X. Scattered Spider, also known as UNC3944, is reportedly a group of hackers who target large organizations primarily in English-speaking countries. The group previously gained attention targeting U.K. retailers, such as Marks & Spencer and Harrods. To defend against attacks by Scattered Spider, Google's threat intelligence group suggests companies should educate employees about social engineering tactics and strengthen security measures, such as identity verification and authentication procedures. Aflac did not immediately respond to a request for comment about which social engineering tactics were used in the attack and whether additional cybersecurity measures would be put in place to ward off future attacks. After a 1.37% drop between the close of trading Wednesday and opening on Friday, Aflac's stock price is looking up as the dust settles following the incident.

Urgent Upgrade Appeal After ‘Biggest Ever' 16 Billion Hack Hits Facebook, Google, Apple And Others
Urgent Upgrade Appeal After ‘Biggest Ever' 16 Billion Hack Hits Facebook, Google, Apple And Others

Forbes

time11 hours ago

  • Business
  • Forbes

Urgent Upgrade Appeal After ‘Biggest Ever' 16 Billion Hack Hits Facebook, Google, Apple And Others

Passwords linked to accounts with Apple, Facebook, and Google as well as government services and other social media platforms are among a 'colossal" data breach, according to researchers. Front-run Donald Trump, the White House and Wall Street by subscribing now to Forbes' CryptoAsset & Blockchain Advisor where you can "uncover blockchain blockbusters poised for 1,000% plus gains!" 'This is not just a leak—it's a blueprint for mass exploitation," experts with Cybernews wrote. 'With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing.' The hack, which has been claimed to be the biggest ever and was earlier reported by Forbes writer Davey Winder, has led to the chief executive of major crypto company Tether declaring it's 'time to move beyond storing passwords in the cloud.' Sign up now for the free CryptoCodex—A daily five-minute newsletter for traders, investors and the crypto-curious that will get you up to date and keep you ahead of the bitcoin and crypto market bull run Apple, Facebook, and Google passwords are believed to be among the 16 billion leaked by hackers. Paolo Ardoino, the chief executive of dominant USDT stablecoin issuer Tether, has said the company will release a password manager called PearPass. "The cloud has failed us. Again," Ardoino posted to X alongside an ad for PearPass that pitches it as a "fully local, open-source" app, adding: 'It's time to ditch the cloud.' Hacks and data breaches, which can lead to phishing attempts, are a major concern for crypto companies that are trusted to look after users' digital assets. A recent high-profile spate of physical attacks on bitcoin and crypto holders has escalated demand for services that keep user data secret. Replacing cloud-based security with passwords and encryption keys stored on a user's device means hacks on centralized services are less likely to put user data or personal information like emails, phone numbers or home addresses at risk. Tether—which has boasted it made $13 billion in profit last year, mostly from the interest earned on the funds it uses to back its $155 billion stablecoin—is scrambling to diversify its business as looming U.S. stablecoin regulation is expected to open up the market to tech companies, Wall Street giants and even retailers like Walmart. Tether's biggest rival Circle has seen its freshly IPO-ed stock price surge this week following the passage of the Genius Act stablecoin bill by the U.S. Senate, cheered by U.S. president Donald Trump. In an interview with influencer Anthony Pompliano, Ardoino said this week he believes Tether is a $2 trillion business and also teased a new product that will be launched this year in an interview out Monday with Bankless. "If we are living in a disaster scenario, we need to be able to have technology that works locally first," Ardoino told Pompliano.

Massive data breach exposes 16 billion login credentials including those related to Apple and Google
Massive data breach exposes 16 billion login credentials including those related to Apple and Google

Phone Arena

timea day ago

  • Phone Arena

Massive data breach exposes 16 billion login credentials including those related to Apple and Google

Stealing personal data has become such a lucrative crime. Swiping passwords and other credentials allow criminals to break into victims' apps allowing these cybercrooks to wipe out financial accounts via banking and trading apps. This information can also lead to more sophisticated crimes using SIM swaps and identity thefts. The latest news from Cybernews is downright frightening as a record 16 billion login credentials have been exposed. The report says that the Cybernews team has discovered 30 exposed datasets with each one containing anywhere from tens of millions to 3.5 billion records in each dataset. Yes, it all adds up to the aforementioned 16 billion login credentials that were outed. Interestingly, only one of the datasets had been reported earlier in the media. As we told you at the time, that breach consisted of 184 million login credentials which were publicly accessible with no password or encryption protecting it. That breach included logins for Apple, Google, Facebook, and Microsoft users. Information stolen in the breach included credentials from online services connected to Apple, Facebook, Google, GitHub, and Telegram. Data from users of various government services was also made public. Researchers say that this data can be used to drive phishing campaigns, power attacks created to take over online accounts, generate ransomware attacks, and more. One dataset with 455 million records was named to indicate that it originated with the Russian Federation. One with 60 million records was named after the cloud-based Telegram messaging service. At this point, it is unknown who owns the leaked data although it would appear that at least some of the massive collection of data came from cyber criminals. Top 020 leaked datasets from the theft of 16 billion login credentials. | Image credit-Cybernews Researchers say that most of the data exposed in the breach "is a mix of details from stealer malware, credential stuffing sets, and repackaged leaks." Since there were overlapping records, it is impossible to determine exactly how many individuals were impacted by the data breach. Having said that, the stolen data follows a particular order with the URL first followed by login credentials and then passwords. According to Cybernews, modern infostealers, defined as malicious software stealing sensitive information, collect data in this order verifying that the data collected was stolen. Here's the scary part. Even if the attackers who owned the data were able to get login credentials from only 1% of the victims, that would leave over 1 million individuals some of whom could be vulnerable to getting fooled into giving up even more information. What you should do is change your passwords to strong ones often. Don't tap on links found in emails or texts; be suspicious. Assume every text or email is a scam and do not give away personal information. Secure your connection now at a bargain price! We may earn a commission if you make a purchase This offer is not available in your area.

Never Share These 7 Details Online, Warns A Former Detective
Never Share These 7 Details Online, Warns A Former Detective

Forbes

timea day ago

  • Forbes

Never Share These 7 Details Online, Warns A Former Detective

Criminals use the internet. Your oversharing could be putting you in danger. If you're building your personal brand by showing up online and sharing your story, you should think carefully before you include specific details. If you're posting when you're on vacation, where you work, and what car you drive, every update builds their roadmap to target you. Paul Alex is a former detective who spent seven years working in law enforcement. At 26 he graduated from the police academy and worked patrol in Oakland, CA. At 28 he became a narcotics detective making $180k/year. Alex has since left to become a founder, stating "no work life balance" as the reason, but his advice holds true since his professional detective days: stay private and stay safe. If you're building your personal brand, you need to have this in mind. Most people treat social media like a diary. They broadcast their location, flex their purchases, and share every detail of their daily routine. Meanwhile, identity theft affected 42 million adults in the U.S., with fraud losses reaching $52 billion in 2021. Many of these incidents trace back to oversharing on social platforms. You can share your story and grow your following without putting yourself at risk. The key is knowing what to share and what to protect. Here's what Paul Alex learned catching criminals for seven years, and why you need to protect your privacy before it's too late. "Robbers, violent criminals, and even human traffickers use social media too," Alex warns. "I actually used to catch people this way. If you want to share your whereabouts, always delay it." The detective hunting criminals used their own posts against them. Now those same criminals use your posts to hunt you. You want to share the details of the high life to build your brand. But post your beach photos after you're back home. Share restaurant experiences the next day. Tag locations only after you've left. This simple delay removes the real-time tracking that criminals depend on. Set up your phone to strip location data from photos automatically. Your memories stay intact, but your safety comes first. "Don't share hotel names or addresses online until after," Alex insists. Burglars love travel posts. In the UK, 78% of burglars admitted using Facebook and Twitter to find empty homes. Your dream vacation becomes their shopping opportunity. Skip the airport selfies and boarding pass photos. Never post countdowns to your trip. Share general excitement about upcoming adventures without specifics. Save the detailed travel content for after you return. Create anticipation without creating opportunity for thieves. "Avoid becoming an easy target for criminals," Alex states. 'Don't flex money, expensive jewelry, or designer clothes online' Every luxury post paints a target on your back. Criminals shop social media like a catalog, choosing victims based on what they display. Show your success through your work and impact, not your possessions. Share knowledge, wins, and transformations instead of watches and wallets. If you must showcase material items, keep them subtle and occasional. Your value shows through what you create, not what you consume. "People can easily find your personal information through your plate," Alex explains. "And your car becomes an easy target for thieves who usually have buyers before they even steal it." Professional car thieves work with shopping lists. Your post might be adding your car to that list. Use photo editing apps to blur plates before posting. Cover identifying features like custom modifications or parking permits. Never show your regular parking spots or garage. Keep your ride private to keep it yours. "When you stay private about your success, people don't know what to attack," Alex notes. Public wins attract private haters. The less people know about your specific achievements, the less ammunition they have against you. Celebrate milestones without revealing exact figures. Share lessons learned instead of dollar amounts earned. Focus on the journey rather than the destination. Your supporters care about your growth and how you do it, not your bank balance. Let success speak through your consistency, not your screenshots. "Some people may pretend they want to help you, but sometimes they just want entertainment, drama, and gossip," Alex warns. "Privacy removes these people from your life." Energy vampires disguise themselves as supporters. They ask questions to gather intel, not to offer assistance. Share challenges only with proven allies. Keep your struggles within your trusted circle. Test people with small vulnerabilities before revealing bigger ones. Watch who celebrates your wins versus who minimizes them. Privacy filters out fake friends automatically. "Tell someone not to share your secrets and of course they're going to share it," Alex states bluntly. Your secrets become someone else's social currency. People trade private information for attention and connection. They don't care about your brand or your security. Assume everything you share will be repeated. Only reveal what you're comfortable becoming public. Keep your deepest plans and biggest moves completely silent until they're complete. Trust takes years to build. Don't hand it out like business cards. If you have a deep urge to overshare, you'll keep doing it. Alex's tips go beyond safety to inner calm and mental wellbeing. "Privacy teaches you how to disconnect from drama, bad energy, and noise around you and how to enjoy time alone," Alex shares. The constant need to share creates constant stress. Breaking free from that cycle brings unexpected peace. Start with one day per week completely offline. No posts, no scrolling, no updates. Use that time to think, create, or simply exist without documentation. You'll find clarity in the silence. Your best ideas come when you stop broadcasting and start listening to yourself. "Privacy teaches you how to stop seeking validation from others and stop caring about people's opinions," Alex explains. "You learn how to simply mind your own business." External validation is a drug that needs constant doses. Privacy breaks the addiction. Measure progress privately first. Set goals without announcing them. Achieve milestones without posting them. Find satisfaction in the work itself, not the likes it generates. When you stop needing applause, you start building real confidence. "Lastly, a private life is a good life," Alex concludes. "Watch how much more peaceful your life becomes when people don't know everything about you." Mystery creates respect. Privacy creates power. Choose what parts of your story to share strategically. Keep the rest for yourself and your inner circle. Build your brand rules around value, not vulnerability. You can inspire without exposing everything. Paul Alex spent seven years watching criminals exploit oversharing. Now he's building his own brand and business. He knows your online presence is a goldmine for people with bad intentions. Every post, every update, every photo gives them more information to use against you. You don't need to disappear from the internet. But share smarter. Delay location posts. Blur identifying details. Celebrate privately. Build trust without oversharing. Create boundaries that protect your peace. Don't risk the fallout of sharing too much. Privacy is power.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store