In a modern healthcare setting, the stethoscope and the blood pressure cuff aren’t the only…
Read More
An FBI announcement has warned that scammers are now directing victims to use physical cryptocurrency ATMs and digital QR codes to complete payment transactions.
What Are Cryptocurrency ATMs?
A cryptocurrency ATM is a physical kiosk/terminal/device that connects to a cryptocurrency network (e.g. bitcoin) and allows customers to purchase crypto tokens with deposited cash. Cryptocurrency ATMs are connected to the Internet and can use QR codes to send and receive tokens to users’ digital wallets. The UK, for example, already has bitcoin ATMs in many cities, for instance there are 50 in London and 10 in Manchester.
What Scams?
The FBI’s warning relates to scams that are using impersonation schemes, where the scammer falsely identifies as a familiar entity, for example the government, law enforcement, a legal office, or a utility company. Scammers are also using romance schemes (establishing a fake online relationship with a victim), and lottery schemes where scammers falsely convince victims that they have won a prize and need to pay lottery fees.
How Do The Scams Work?
According to the FBI, regardless of the scheme, the methods using cryptocurrency ATMs and QR codes appear similar. The scammer requests payment from the victim and directs the victim to withdraw money from their financial-accounts (e.g. bank or investments). The scammer then provides a QR code associated with the scammer’s cryptocurrency wallet for the victim to use. The scammer directs the victim to a physical cryptocurrency ATM to insert their money, purchase cryptocurrency, and use the provided QR code to auto-send the money. Reports indicate that the scammer is in constant contact online with the victim, providing step-by-step instructions until the payment is completed.
Why Cryptocurrency?
The reasons why the scammers are using cryptocurrency are:
– The decentralised nature of cryptocurrencies makes them very difficult to recover.
– The transfer is immediate. As soon as the victim makes the payment, the recipient instantly owns the cryptocurrency and can immediately transfer the funds to an account overseas (making it even more difficult to trace).
– It creates extra hurdles for the police/law enforcement agencies in trying to recover the funds.
Protection
Ways to protect yourself from falling victim to this type of scam include:
– Never send payments to a person you have only spoken with online.
– Don’t respond to callers claiming to be representatives of a company where you are an account holder, and who request personal information or demand cryptocurrency, or to callers from an unknown telephone number who request cryptocurrency.
– Don’t respond to anyone who says they can only accept cryptocurrency and (for example) identifies as the government, law enforcement, a legal office, or a utility company.
– Avoid anonymous cryptocurrency ATMs as they may be used for money laundering.
– Report any such calls to ‘Action Fraud.’
What Does This Mean For Your Business?
Cryptocurrency ATMs are still uncommon in the UK, but crimes such as romance fraud are quite widespread and for victims in large UK cities it’s only a short step before this type of scam is operated on a bigger scale. The story also illustrates how manipulative and ruthless scammers can be if the return is rewarding enough. Since the big increase in remote working during the pandemic, the UK has seen a huge rise in various scams. In June, for example, Citizens Advice reported that more than two-thirds of UK adults (36 million) have been targeted by a scammer since January, and that 12 per cent were offered a fake investment or ‘get rich quick’ scheme.
There was also a very sad report from Citizens Advice Consumer Service of an elderly man who contacted the charity after he sent £240,000 to an account he thought belonged to his bank. Fraudsters prefer vulnerable targets but anyone, if caught off-guard, is a potential victim. It is vitally important, therefore, that experiences of scam calls/texts/emails are shared, and suspected scams are reported to Citizens Advice and Action Fraud so that the nature of the scams can be identified which can lead to the fraudsters being stopped.
About Us
J700 Group are a Lancashire-based, family-run, professional and responsive, Managed Solutions Provider helping Businesses, the Education Sector, and the Healthcare Sector to utilise Innovative IT Consultancy Services, Cloud Solutions, Cyber Security, Microsoft 365, Telecoms, Web Design and SEO solutions to propel their organisation to the next level and beyond.
As an experienced IT Support Provider, helping businesses across Lancashire & Manchester, if you need any assistance with your IT including IT Hardware, a Disaster Recovery Policy or Managed Backup Solutions; Contact us today to see how we can help your business.
#tech #technews #technology #j700group #biztips #b2b #sme #lancashire #itsupport #crypto #bitcoin #fbi #cryptocurrency #cryptocurrencyATM #cybersecurity
When people hear the word cybersecurity, they often imagine complex systems, expensive software and specialist…
Read MoreAs we count down to midnight, most of us are thinking about gym memberships or…
Read MoreIt’s Christmas Eve in Lancashire. The Preston bypass is a nightmare, the last-minute dash to…
Read MoreFor many businesses, the Christmas period means quieter offices, reduced staffing and systems left running…
Read MoreOr: Why we’d like to have a word with Tim Cook this Christmas. There are…
Read MoreHackers Love Christmas: Learn Why your Business Could be at Risk This Holiday SeasonThe festive…
Read MoreIn recent months, high-profile companies like Land Rover and Co-op have made headlines due to…
Read MoreExplore 7 essential tips for effective cloud solutions comparison to find the best fit for…
Read MoreLearn how to secure business data for UK SMEs with this step-by-step guide focused on…
Read MoreCybersecurity basics explained for UK businesses—core concepts, major threats, essential safeguards, and compliance requirements. A…
Read MoreDiscover the essential role of IT support desks, core functions, key benefits, types of support,…
Read MoreDiscover 10 microsoft 365 alternatives for UK SMEs, comparing features and benefits to help your…
Read MoreDiscover the best microsoft 365 alternatives in our comparison of 10 top products to enhance…
Read MoreDiscover a business connectivity checklist with 7 actionable steps to boost IT reliability, security, and…
Read MoreDiscover 7 essential business continuity planning steps to protect your SME. Learn practical strategies for…
Read MoreSmall Business Office 365 comprehensive guide for UK SMEs: core features, setup process, security essentials,…
Read MoreSmall Business Office 365 guide for UK firms. Learn core features, setup, security, costs, and…
Read MoreSmall business Office 365 guide covering essential features, security, costs, local support, and practical benefits…
Read MoreFollow this cybersecurity checklist for SMEs to secure your business in Lancashire and Manchester. Step-by-step…
Read MoreFollow this cybersecurity checklist for SMEs to boost protection, reduce risks, and secure business data…
Read MoreCloud security explained: A comprehensive guide for UK businesses covering threat types, protection strategies, compliance,…
Read MoreData protection strategies for UK SMEs—types, key components, GDPR compliance, business risks, and best practices…
Read MoreWhy cybersecurity matters for UK businesses: core concepts, main risks, common threats, legal requirements, and…
Read MoreComprehensive guide to IT issues Lancashire businesses face, including security threats, system downtime, cloud solutions,…
Read MoreComprehensive guide on cyber security threats in the UK. Learn common types, key characteristics, real-world…
Read MoreFollow this IT security checklist for a step-by-step process to secure your business effectively in…
Read MoreExplore the benefits of managed IT services for businesses in Manchester and Lancashire, enhancing efficiency…
Read MoreExplore the role of cybersecurity in business. Understand its importance, how it works, and key…
Read MoreDiscover 7 key advantages of Microsoft 365 for SMEs that can enhance productivity, collaboration, and…
Read MoreExplore why use managed IT services and how they benefit businesses. Gain comprehensive insights on…
Read MoreComprehensive guide explaining cyber threats, focusing on their importance, how they work, and the key…
Read MoreDiscover what is business continuity and why it matters for your business's resilience, sustainability, and…
Read MoreDiscover effective ways to secure business data through a step-by-step process, ensuring the safety and…
Read MoreDiscover 7 key advantages of Microsoft 365 that can enhance your business operations and productivity…
Read MoreExplore local IT services explained in detail, focusing on their importance and how they work…
Read MoreExplore cloud application hosting, its importance, how it operates, and the key concepts behind it…
Read MoreExplore why choose cloud solutions for your business. Discover how they work, their importance, and…
Read MoreExplore cyber security services for small business, their importance, and how they protect against online…
Read MoreFollow this IT support checklist for a systematic approach to IT maintenance. Ensure smooth operations…
Read More