VOLUME 3 ISSUE 4   November 2013
image
THE TRUST

HOME
About Us
About Us
Current Board of Directors
Board of Directors
Quick Links
Abilene BBB Home Page
All about SCAMS
Texas Attorney General
Check Urban Legends
Texas Govenment Home Page
FBI Fraud Alert
THE TRUST Archives
October 2013
Vol. 3 Issue 10
February 2013
Vol. 3 Issue 2
January 2013
Vol. 3 Issue 1
December 2012
Vol. 2 Issue 10
November 2012
Vol. 2 Issue 9
October 2012
Vol. 2 Issue 8
September 2012
Vol. 2 Issue 7
August 2012
Vol. 2 Issue 6
July 2012
Vol. 2 Issue 5
April 2012 || 30 April 2012
Vol. 2 Issue 4
March 2012
Vol. 2 Issue 3
February 2012
Vol. 2 Issue 2
Accredited Business News
Scammers Hijack Business name for use!
Scammers Hijack business name for use

Scammers "Hijack" Business Names For Use in Cons

10/28/2013

Bookmark & Share
  • Facebook
  • MySpace
  • Digg

Businesses are reporting that scammers are "hijacking" their names, using them for everything from fraudulent credit card purchases to scam websites. Don't let your company become a victim of this growing trend.

 

How the Scam in Action:

 

A supplier receives an order for a large purchase from an unknown company. To be cautious, the supplier decides to verify the order, and he calls the business listed on the request. When the business' owner answers, he's shocked. He claims no one in his office placed that order. He has no idea why his name and logo are on the purchase form.

 

It turns out, the order was a fake! Scammers had "hijacked" the business' name. The business owner soon learned that several other orders had been placed using his company's name, and the purchased supplies were being shipped to a storage facility in another city. The business owner alerted the police, and they are currently investigating.

 

Another Version of Hijacking:

 

Another common way scammers hijack business names is with scam websites. Scammers use a business' URL and existing site to lend credibility to their schemes. Scammers sometimes hack into websites and put up fake web forms meant to capture credit card numbers and other personal information. Other times, they upload malware to the site in order to infect visitors' computers. They've also been known to redirect web traffic to other sites selling counterfeit goods.

 

Signs That Your Business' Name Has Been Hijacked:

 

It's difficult to detect if your name has been hijacked, but periodically search for your business on the Internet. Look for any sites or activity using your name that have not been created by you. Here are other signs to watch out for:

  • You receive a request to verify orders you didn't place
  • You receive calls from someone trying to verify an address for your business that is not associated with your company
  • You receive invoices for storage or shipping services that you didn't place.

[PRINTER FRIENDLY VERSION]
THE TRUST is issued by Better Business Bureau to its accredited businesses, their employees and subscribers monthly. Reference to or mention of any company, product or service is not to be interpreted, per se, as statements derogatory of such company, product or service, but as information from sources believed to be reliable, for the confidential use of the aforementioned accredited businesses, their employees and subscribers.

(SOME CONTENTS MAY BE REPRODUCED WITH PERMISSION AND ATTRIBUTION)
Copyright © All Rights Reserved. 2011.

View THE TRUST Archives