Beware Mysterious Mandy, the New Wrong- Number Phisher

Beware Mysterious Mandy, the New Wrong- Number Phisher

wrong number scam

Over the last few weeks, more Americans are being hit with mysterious wrong-number scam text messages from a strange blonde woman, since dubbed the Wrong-Number Phisher by some media outlets. She goes by several names—sometimes Amanda, or just Mandy—and slides into your inbox with a text that appears to be to the wrong number. When the target points out the mistake, the mysterious Mandy acts embarrassed, and attempts to strike up a conversation with the target. The purpose is to convince the target to sign up for adult websites in order to view nude photos of Mandy, after which point the phishers will have all the information necessary to scam the target out of hundreds, if not thousands.

The Scam

The wrong-number scam is so organically scripted that its level of verisimilitude is almost staggering—so much so that it managed to fool one of our seasoned blog writers. Despite writing regularly on phishing scams and other black hat techniques, even the most experienced professional would initially consider this to be a genuine misunderstanding. The message starts out, “Hey is this____?” often using a variety of names, “its Amanda,,, we chatted on tnder before when I cam up to visit my aunt but we never met in person..i’m back in town rn if you wanted to actually go out this time, r you free?” From the use of commas as an ellipsis to the texting shorthand many users are familiar with, it has the earmarks of a genuine wrong-number texter The message is often accompanied by or followed shortly by a selfie of the woman, adding to the believability of the Wrong-Number Scam.

How the Wrong-Number Phisher Works

Embarrassed for Mandy, the target of the scam feels accommodating and willing to encourage a conversation with this beautiful, young woman, which subsequently leads to Mandy feigning attraction for the target and sending them a link to an adult website where they can allegedly view nude pictures of Mandy, which of course requires credit card information. As the first rule of internet safety goes, the user should never click on any suspicious or unsolicited emails/links, as they could be sophisticated tools used by phishers to steal their information. What makes the scheme easy to debunk is the phisher’s sometimes obvious inattention to detail. For instance, if the target has sent Mandy a picture, Mandy might incorrectly identify eye or hair color, or incorrectly assign male or female characteristics to the target. This is because a typical phishing or financial scam involves a team of phishers, a bank of computers, and a list of phone numbers. The scammer will have multiple windows up at once, speaking to multiple targets at once through anonymous, encrypted platforms such as WhatsApp. This prevents the source from being easily traced. With so many windows open at once, the phisher may lose track of whom they are speaking and will make mistakes. Vigilance of these warning signs, and additionally poor grammar and spelling, is crucial to protecting your information from scammers.

Is this sex-trafficking?

Since the first appearance of the Wrong-Number Phisher about a month ago, rumors have arisen that Mandy’s wrong-number scam may be a way to target and kidnap individuals for purposes of sex-trafficking. These rumors began when users on Tiktok began posting screenshots of Mandy’s communication, claiming they had been targeted for sex trafficking. An anti-conspiracy educator and survivor of sex-trafficking, Jessica Dean, took to TikTok to explain why this particular kind of scam would not be ideal for sex-traffickers, “Sex traffickers aren’t really targeting complete strangers—and this would be a really stupid way to target somebody if they wanted to kidnap a complete stranger, because there would be evidence on your phone…Sex traffickers overwhelmingly target people they already know. Sometimes those are people they met online, but it’s usually a very slow grooming process—they get to know you, they get you to like them, and then they start asking you ‘certain favors.”

Should you receive a text message from a strange blonde woman who claims she’s trying to reach a missed connection, the simple answer is to ignore the text and block the number. The more you converse with the Wrong-Number Scam and the more information you provide, the more the scammer will be convinced that you are a valuable target—particularly if you are ignoring basic mistakes in grammar and spelling, or ignoring misidentification errors. Phishers and scammers know that if a target is willing to overlook mistakes like those, the more likely that target will be to part with money.

Investigating Executives & White Collar Crime

Investigating Executives & White Collar Crime

Don’t let executive misconduct ruin your corporation…

When it comes to running a business, the executives who are the visionaries and decision-makers that shape a company should always remain above reproach. White collar crimes have the potential to pull a business up from the root with devastating consequences. Unfortunately, Americans know from media coverage and social media that there’s few things we are more attracted to than stories about high-ranking officials and the misconduct that negatively impacts their businesses—both in profits and in public relations.

Many will be familiar with the recent news of Amazon CEO Jeff Bezos’ high-profile divorce following allegations of infidelity, in which his ex-wife became the richest individual in history by virtue of divorce proceedings. The fallout from executive misconduct can leave a trail of legal fees, government sanctions, violations, and public relations-related crises that can devastate a company from the top down.

Thought to be coined in 1932, the phrase “white collar crime” now refers to a spectrum of frauds and other crimes committed by high-ranking executives and officials. The most common characteristics of white collar crime contain aspects of deceit, concealment, or violation of company policies and/or state and federal law. The motive is financial, with executives skimming off the top of a company’s profits for their own use. These crimes are sometimes thought of as “victimless crimes,” with no regard to how the fallout from a fraud or scheme can impact the company, and therefore the families of its employees. The types of fraud include, but are not limited to:

  • Bank fraud
  • Blackmail
  • Bribery
  • Cellular phone fraud
  • Computer fraud
  • Counterfeiting
  • Credit card fraud
  • Currency scheme
  • Environmental schemes
  • Extortion
  • Forgery
  • Health Care Fraud
  • Insider trading
  • Insurance fraud
  • Investment schemes
  • Kickbacks
  • Larceny/theft
  • Money laundering
  • Racketeering
  • Securities fraud
  • Tax evasion
  • Telemarketing fraud
  • Welfare fraud
  • Weights and measures

Corporate fraud and white collar crime of this nature remain one of the Federal Bureau of Investigation’s top priorities when it comes to identifying and indicating perpetrators. While involvement by government agencies may seem like the end of the line, there are ways companies can get out in front of executive misconduct by hiring a private investigator to investigate these matters.

Private investigators have a unique reputation as slick operators who fly under the radar, but they are invaluable professionals to companies in the throes of a corporate crisis because they are independent and objective. Objectivity is the priority when dealing with executive misconduct and white collar crime, as any allegations or evidence presented against the executive must be presented by an individual with no stake in the outcome of the investigation. Private investigators are independently contacted by a business or corporation to investigate the alleged executive misconduct, and can gather evidence and collect witness statements without the air of bias. Because private investigators are independent contractors, there is no fear of reprisal on behalf of coworkers and other employees at the company. This leaves no lead discounted or ignored. They can investigate employees at all levels, and determine how (if at all) the executive is receiving assistance in their fraud from subordinates. One of the most attractive qualities in a private investigator is that their objectivity makes them crucial witnesses in any legal proceedings that may result from the investigation.

Businesses and corporations should never be beholden to CEOs, presidents, and other high-ranking executives who behave badly. Executive misconduct and corruption are like aggressive weeds that must be pulled from the root in order for businesses to flourish. When it comes to rooting out bad leadership, consider hiring a private investigator to navigate a tricky investigative path that can end in quality operations and peace of mind for businesses large and small.

If you have a corporate crisis like executive misconduct, we can help. Call Lauth Investigations International, a family-owned-and-operated investigative firm with over 30 years of providing successful solutions to clients in Indianapolis and throughout the nation. Call 317-951-1100 for a free consultation, or to learn more about our services, please visit our website.

Phishers Want Your Direct-Deposit

Phishers Want Your Direct-Deposit

money lockedThe invention of direct-deposit payments in electronic banking have likely saved companies millions of dollars over the years in labor hours, materials, and fees that previously caused problems for companies. However, in an age where your paycheck is sent automatically to your checking account, phishers are seeking to exploit this automation for personal gain.

The Internal Revenue Service has reported an upswing in various types of fraud that directly target a company’s payroll. While the ruses come in many forms, one of the most popular is phishing emails disguised as legitimate correspondence from an employee or upper management. It’s always an instruction to alter payroll information so that funds would be rerouted to the scammer’s bank account. Once the deed is done, the money is withdrawn and the company is responsible to replace the missing funds. While the FTC and the IRS are constantly reevaluating their strategies for containing these types of fraud, this particular scheme is hard to detect and often goes unreported. The email can outsmart security measures set down by the company or within a company’s email server, and scammers take amounts that can just be written off as unfortunate missteps on behalf of personnel.

Frauds such as these have gone through an evolution as security technology becomes more sophisticated and what we know about internet culture continues to grow. Internet frauds used to be about volume and inattention to detail—thus the birth of phishers, who sent emails rife with spelling and grammar mistakes out to mile-long email lists, casting a wide net throughout the web. Education about fraud has forced scammers to be more cautious. Today, companies who have seen this scam in its newest form remark that these phishing emails look so authentic that there may not be a question in their mind before obliging their request. Security measures that have risen from the nucleus of electronic banking combat wire fraud every day in the United States. Large sums in wire transfers now throw up giant red flags. Phishers and scammers are getting more bang for their buck by taking smaller amounts with more frequency, lurking below the radar. This does not require sophisticated hacking skills. Just the ability to open a Gmail account. Phishers make the account look cosmetically convincing, then throw out the lure. One of the most targeted entities is non-profit organizations, because of the benevolent nature of their business. The idea of someone ripping off a charity or relief organization is horrifying, but the simplicity of scams like this make the opportunity too lucrative to pass up.

It’s frightening how simple the fraud is to pull off, but there is recourse for businesses who are vulnerable to such a scam. One of the non-profits who fell prey to this scam was KVC Health Systems, an agency for child welfare in Kansas City. Their IT director, Erik Nyberg, says it starts with comprehensive education on company procedures, “The CEO is never going to email you out of the blue and ask you for any deposit changes. And if you have any sliver of a doubt, call the person who is making the request.” He goes on to discourage executives and upper management employees from using their personal email accounts to send staff correspondence, and to set email filters that will catch suspicious incoming messages. Social media managers are also cautioned against posting any company information to their pages that could serve to bolster a phisher’s credibility.

If your business has been the target of this wire fraud scam, you are encouraged to report them to the Federal Bureau of Investigation’s IC3 tip line.

Investigating Non-Compete Violations

Investigating Non-Compete Violations

non-compete violationWhen growing a business, executives and owners have to go the extra mile when it comes to protecting trade secrets. In the pursuit of their company’s business, a common practice for corporations of all sizes is implementing non-compete clauses in their employees’ contracts. This ensures, should an employee leave the company for any reason, they cannot utilize trade secrets for the purpose of building a similar business of their own. It’s in a business owner’s best interest to be preemptive in protecting themselves from client poaching, theft of company secrets, and possibly even slander when it comes to current and former employees who violate their non-compete agreements.

Though they go by several names and the laws concerning them vary state to state, non-compete agreements are generally a legally-binding contract between an employer and an employee, whereupon acceptance of a job offer by a company, an individual agrees during their employment and following their termination they will not enter into any competing business for a predetermined period of time. Whether it’s working for a company’s top competitor, or striking out in their own business, non-compete agreements protect trade secrets, sensitive company information, and prevent competing businesses from poaching successful employees with promises of a handsome pay-raise in exchange for the expertise they might have gleaned from their time at their previous position. This kind of information can range from client bases to business operations to future products and services. The duration of the non-compete agreement following an employee’s termination have to be well within reason, as no employer can permanently preclude a former employee from any line of work.

Not every company experiences difficulties by virtue of a former employee violating their non-compete agreement, and some companies do not see the need for non-compete agreements at all, but the consequences of trade secrets being used to steal a company’s business can have devastating effects, ending in the worst possible circumstances with a business closing and an owner in debt. Even if a company is able to quash a non-compete violation in court, the cost to the company in legal fees can be astronomical, especially for smaller businesses. That’s why it’s important for owners and executives to be preemptive and proactive when it comes to potential violators. Luckily, a private investigator can help at all stages of a non-compete violation investigation.

Human resource employees are the salt of the earth, and can have a great influence on how a company develops based on the individuals they select for their workforce. However, human resource employees are not lie detectors, and do not always have access to legitimate, comprehensive background screening tools. Background screenings and checks are among the most common service associated with private investigators. If there is something suspect in a candidate’s past, licensed private investigators have the tools and experience to find it out. Private investigators can pull a candidate’s criminal history, financial history, and interview persons in their lives who can speak to character and work ethic. They can also spot patterns in a person’s work history or lifestyle that could be high-risk factors in a hypothetical non-compete violation—things like transience, long periods between positions, or financial destitution.

Some malingering employees can’t wait to be terminated before violating their non-compete agreements. It’s not uncommon for these individuals to exploit trade secrets for their businesses own gain while on company time and dime. While on a business trip, an individual might use company per diem to buy drinks for a person who could be a potential investor in their new business. Employees might use company supplies to supplement their project, such as printers, fax machines, computers, and other equipment. Private investigators can conduct diligent investigations within a company’s workforce to root out the source of the theft. Private investigators can interview witnesses, including upper management and other staff, review vital documents like bank records, and conduct surveillance of the company’s operations as needed to expose the perpetrator. Their objectivity makes them an ideal candidate to conduct such an investigation because they do not have a stake in the outcome.

There are many circumstances under which a business owner might come to suspect a former employee has violated their non-compete agreement. Word might have traveled through business circles that a similar business is starting up. Employees might start disappearing in clusters. Clients may suddenly decide to sever business ties in favor of a new contender in the competition. Whatever transpires, one thing is certain—documenting and exposing this exploitation is imperative, because the consequences can be costly. Retaining a qualified private investigator who specializes in corporate crises is crucial to resolving non-compete violations quickly, before the exponential costs begin to erode profits. Private investigators can perform surveillance on suspected former employees to document their movements, record with whom they met, and collect evidence such as pictures of a brick and mortar establishment, marketing materials, vital documents, and filings with the Secretary of State. Private investigators can send undercover operatives to infiltrate a workforce to get information the business privy only to employees. They can also enlist the aid of a confidential informant—an individual already within the company to provide information. This requires quality interviewing skills and developing a natural rapport with potential witnesses, both important qualities in a qualified investigator.

When non-compete violations are at their ugliest, not only do violators seek to siphon off their former employer’s business by exploiting trade secrets and knowledge of their operations, but they can also play dirty by exposing this information publicly. Another method involves deliberately spreading lies about the competition in order to drive business towards the former employee’s company. That’s known as slander and it’s legally actionable. Documenting the perpetuation of these lies and proving they are in fact false are crucial in these cases. Diligent fact-finding is the cornerstone of any private investigator’s expertise. Private investigators can conduct cyber investigations to track down the users behind profiles that post false negative reviews, follow rumors back to their roots, and forensically track how information left the competition and made its way into the former employee’s business nucleus. They can implement many of the strategies aforementioned: surveillance, interviewing witnesses, documenting evidence. Slander cases tend to have a divisive they-said, they-said narrative, which is where a private investigator’s objectivity becomes invaluable once more. Private investigators have no stake in the solution of an investigation. Their independence coupled with their expertise and resume make them spectacular witnesses in any subsequent litigation.

When a company has a non-compete agreement in place, it’s important that executives and owners are proactive when performing a risk assessment on a potential employee. It’s important that a healthy company culture fosters good comradery, honesty, and a policy of “if you see something, say something.” Building a case against a former employee who violated their agreement can be time consuming at the expense of company resources. Dealing with the fallout from litigation can bring a reliable business to its knees. Private investigators can assist in all phases of any non-compete agreement violation, and retaining their services will go a long way towards a body of objective evidence and testimony that can resolve a company’s crisis.

If you have suspicions that a current or former employee has violated their non-compete agreement, contact Lauth Investigations International today for a free consultation on how we can help you! Call 317-955-1100 or find us online at www.lauthinvestigations.com. 

Carie McMichael is the Media and Communication Specialist for Lauth Investigations International. She regularly writes on investigations, missing person, and other topics in the criminal justice system.