A massive database containing over 2.7 billion records has reportedly ended up on a criminal forum. These records belong to individuals in the U.S. and were allegedly stolen from National Public Data (NPD). While the accuracy of the leaked data could not be verified, the hackers reportedly obtained sensitive information such as names, mailing addresses and Social Security numbers. The scale of this breach is so vast that if you live in the U.S., it's likely that some of your data is included.
What you need to know:
Bleeping Computer reported that the database was posted on the criminal forum Breachforums, where threat actors often post such leaks. What’s interesting is that the stolen database was up for free download. The user who posted it credited a hacker named "SXUL," saying, "There’s a new player in town." Usually, hackers sell leaked databases like this one for huge sums.
The database has been stolen from NPD, which collects data from public sources to compile individual user profiles for people in the U.S. and other countries. NPD then sells this private data to all kinds of organizations, such as background check websites, investigators, app developers and data resellers. While the database has 2.7 billion records, it’s important to note that this doesn’t necessarily mean 2.7 billion people were impacted. Many of these records are repetitive, and some are incorrect. Still, the breach affects a significant number of people in the States.
This isn’t the first time NPD data has ended up on criminal forums. Bleeping Computer noted that back in April, a hacker known as USDoD claimed to be selling 2.9 billion records with personal data from people in the U.S., U.K. and Canada, which was also stolen from NPD.
Webmaster here: This is a very good article about Home Title Theft. It is a real threat. Bad people are assuming your identity and then stealing your Home. That is why I urge you to talk to your Home Owners Insurance agent about coverage. Or, if you wish to get additional coverage, shop around for a reputable Home Title Theft provider.
I have chosen not to publish the sales pitch at the end of the article.
Home title theft is the process of changing the legal ownership of a property, without the legitimate owner’s consent or knowledge, with the intent of selling or refinancing the property for monetary gain. This is typically completed by submitting a grant deed to the county record’s office that reflects a falsified ownership change or sale. The grant deed is a legal document or mechanism that transfers real estate ownership from a seller to a buyer. Sadly, with the advancements in technology, it has become easier for criminals to falsify these documents. With only a few key strokes, thieves around the nation can have documents accepted in any recorder’s office, and with the growing enhancements in artificial intelligence (AI), this process is becoming streamlined.
The United States County Recorder a vital organization that compiles millions of documents daily. A county recorder’s job entails keeping public records of actions and transactions that are required by local, state, regional, and national governments. As noted by the California Department of Real Estate, “the county recorder is not responsible for verifying the validity, authenticity or legitimacy of the document that is recorded. In other words, the recorder is not responsible for detecting a fraudulent document, and the recorder does not look beyond the document itself. If the document meets the essential records requirements, and the proper fees are submitted, the county recorder is obligated to and will record the document.” This fact, or flaw some might say, is how and why home title theft is able to occur.
Furthermore, seller impersonation has risen drastically in recent years. In early 2024, The American Land and Title Association (ALTA) issued a warning that “sophisticated fraudsters are using the real property owner’s Social Security and driver’s license numbers in the transaction, as well as legitimate notary credentials, which may be applied without the notary’s knowledge.” The creativity the fraudsters are now using seems to be ever increasing and with the advancement of AI, where will it stop?
Once a criminal has control of a home’s title, unfortunately anything is possible. Throughout the nation there have been countless homeowners who have found their properties sold without their knowledge. Here are a few recent examples:
• Connecticut- A property owner found a $1.5 million home built on what he thought was his undeveloped land.
• Atlanta– A 77-year-old man was put in hand cuffs while he and his wife were removed from their home after a fraudulent second mortgage forced foreclosure.
• Dallas- Man poses as pastor and steals home from three different churches through deed fraud.
While these stories may seem few and far between, the truth is home title theft is happening every day and is on the rise with the recent advancements in technology. Possibly the most notable occurrence was the attempt to foreclose Elvis’ Graceland home in 2024 in which criminals claimed the Late Lisa Marie obtained a $3.8 million loan and failed to pay it back.
Unfortunately, these horrifically noteworthy occurrences often do not receive their deserved press due to underreporting, not because of lack of care, but simply because of a lack of knowledge. There are thousands of owned lots of land that are never visited and are targets for scammers. The FBI released an article touching on this very topic. Many raw landowners only become aware of the fraud after failing to receive their tax bill for the property, sometimes missing the bill for several years before realizing the issue. This devastating crime can result in an even more devastating amount of money and time needed to correct the fraud filled with daunting legal fees.
The risk for home title theft can be viewed on a sliding scale. The properties with the most risk are raw land properties owned outright, followed by investment properties owned outright. The properties with the lowest risk are homes and raw land plots with a high balance mortgage in relation to the property value. Simply put, properties lacking equity are not at risk of this financial crime and frankly have no reason to be concerned.
Statistically speaking, 55% of the population is at risk for home title theft. Properties with a lack of mortgage or substantial equity have an elevated risk associated with owner impersonation which can result in attempts to falsely sell or refinance the property. Properties at moderate risk are those with a loan between 20-50% of property value.
The are many so-called options for at risk property owners. Historically, the most common recommendation has been to subscribe to a notification service. The premise behind a notification system is exactly as it sounds: it offers the property owner knowledge of a change in title, but only after it has been recorded. The notification of change does not actually stop the financial crime from occurring; it simply notifies the rightful owner they need to take swift legal action. The homeowner continues to be at risk until they are able to regain their title through the legal system. Unfortunately, with a drawn-out legal processes and as criminals often have a sale or loan already in process, it is truly a race against the clock. While notification and monitoring systems may be beneficial for low-risk properties, these companies do absolutely nothing to prevent the financial crime of moderate to high-risk properties.
Keyless Car Theft Is On The Rise & This Is How To Protect Yourself.
Wireless key fobs were supposed to make our lives easier, but they also provide new avenues for criminal exploitation.
Webmaster here – I know it isn’t ID Theft, but it is the Theft of one of your major assets.
* Using a relay device, car thieves can amplify the signal from your wireless key fob, even if it is inside your house, and use it to unlock your car.
** Storing your key fob in a Faraday bag or using a physical steering wheel lock can help guard you from car theft.
*** As technology evolves, so do criminal methods. Staying current on information is another important way to protect yourself.
They appear like ghosts in the night, standing outside your house, one holding up an antenna while the other crouches next to the car parked on the driveway. Within seconds, your car is gone, yet another victim amid a surge in auto theft enabled by the technology designed to make it easier to unlock and start vehicles.
Auto technology has evolved and many newer cars use wireless key fobs and push-button starters instead of traditional metal keys. The fob sends a short-range signal, so when the driver approaches the car, it automatically unlocks the door. This saves you the hassle of digging out your keys when you've got your hands full with groceries.
But that technology also makes things easier for thieves. The wireless fob will continue to emit a signal even if you're not using it. Thieves prowl neighborhoods at night looking for cars parked outside so they can carry out so-called relay attacks. Using portable equipment that can pick up the faint signal from a fob inside the house or parking lot, they relay it back to a transmitter that can clone the signal.
Officials have urged carmakers to reduce the security vulnerabilities and warn owners about the risks.
So what can you do to reduce the odds that your car will be gone in 60 seconds? "It’s relatively easy for drivers to protect themselves," said Steve Launchbury, principal engineer of automotive security at Thatcham Research, a U.K.-based automotive risk intelligence company. Here are some tips:
USE A SIGNAL BLOCKER
A simple but effective way to stop auto bandits from purloining your key fob signal is to use a Faraday bag or pouch. They're lined with a conductive metal mesh that blocks the transmission of electromagnetic signals.
The pouches aren't expensive, and you can also get boxes that do the same thing. But experts advise testing to make sure they work. Just put the key fob inside and approach your car. If the doors don't automatically unlock, then the signal is being blocked.
It's also important to remember to use it whenever you leave your vehicle, and don't forget to put all of your key fobs inside, including any spares.
But ignore some advice making the rounds on the internet telling you to put your fob in the microwave or freezer. It doesn't have the same effect as a Faraday bag, and you risk damaging your key.
GET AN OLD-FASHIONED LOCK
Try an old-school solution by using a physical lock. Some police forces advise car owners to use them to make your vehicle look less tempting to steal. The reasoning is that a would-be thief might be deterred by the effort needed to cut through the lock and instead turn their attention to an easier target.
Locks, in the shape of a disk or a long bar, clamp onto the steering wheel and make it difficult to steer. There are also versions that prevent the car from being put in gear. The downside is you'll need extra time to attach or remove it whenever you aren't driving.
CHANGE UP YOUR SETTINGS
For many cars, it's possible to deactivate the wireless setting so that you can't open the door remotely. For Fords, Hondas and Audis, use the touchscreen menus. If you own a Toyota, you can temporarily disable the signal by holding down the fob's lock button and at the same time pressing the unlock button twice. If you've done it correctly, the fob's indicator light should blink four times. Be aware that the next time you press any button, remote unlocking will be reactivated.
The method will vary depending on make and model so consult your owner’s manual for the exact process. If it sounds complicated, there are YouTube videos that walk you through it. Don't forget that in most cases you’ll now have to manually press the fob's unlock button.
Automakers have started adding motion sensors to key fobs. If the sensor doesn't detect recent movement because it's been, say, left on the kitchen counter after you come home, the fob goes into sleep mode and stops transmitting. If it lacks this capability, check with your dealer whether it's possible to upgrade it.
If you buy a used car, some experts also advise getting the keys reprogrammed, just in case the previous owner kept one of the fobs.
WATCH OUT FOR NEW METHODS
Researchers have uncovered a new auto theft technique that doesn't target radio signals. The controller area network, or CAN, is "a feature of modern cars which allows different components and systems to communicate, (and) has recently been targeted and exploited by thieves," said Thatcham's Launchbury.
The network allows sensors and control modules to talk to each other directly, instead of going through a central node. Thieves take advantage by accessing the network from the car’s exterior, usually by removing a headlight and connecting a device that can "inject" a signal, tricking the car into unlocking and starting.
While automakers work on improving CAN security, "there are steps drivers can take today to add layers of security and deter criminals," such as using a physical lock, Launchbury said.
Aftermarket electronic immobilizer systems "should render a criminal’s theft tool useless," and might even get you a discount on auto insurance, he said. Thatcham and other companies offer them but the downside is they can be quite pricey.
How to Protect Yourself From Check (Theft) Fraud
By Bill Lindsey For the Epoch Times April 04, 2024
Printed checks are convenient, but at the risk of thieves stealing them to drain bank accounts. Some preemptive caution is a wise move.
Every year, enterprising thieves find new ways to separate people from their money. In many cases in the United States, this involves several methods of check fraud, which occurs when thieves use a personal or business check to steal money, services, or goods. The Boston Fed reports that the United States Federal Reserve System collected a total of 19 billion in 1993. By 2022, the number of checks collected had declined to approximately 3.4 billion.
This smaller, yet still significant number leaves many opportunities for thieves, who steal mail from residential and United States Postal Service blue mailboxes. They sort through stolen mail, searching for personal and business checks, as well as bank account and routing numbers. The USPS reported 38,500 mail thefts in 2022, and 25,000 in the first half of 2023.
Despite the use of checks becoming less common, due largely to the ease of online banking, the incidence of check-related crimes continues to increase. According to a report issued in 2023 by the Federal Reserve Bank of Boston, the number of checks collected on an annual basis over the past 30 years by the Federal Reserve declined by 82 percent. There were approximately 680,000 reports of check fraud in 2021, double the amount reported in 2020. A 2024 NASDAQ report indicated just over $21 billion in check fraud.
The term “check fraud” covers a lot of territory, but the one factor all variations have in common is that an innocent person loses money or goods.
One example is called paperhanging, in which a person writes a check from an account they opened, knowing there are insufficient funds on deposit to cover the amount. Other frauds include check washing, forgery, the use of counterfeit checks, and overpayment.
In check washing, thieves remove the ink from the check, often by applying acetone, then write in a new date, amount, and payee information.
Forgery involves intercepting and stealing new checks from mailboxes or collection boxes when they are being mailed to the account holders, then forging the signature to use them to drain bank accounts.
According to RelyCo.com, a business check printer, more than 500 million checks are forged each year in the United States alone. Due to the sheer volume of incidents, only 25 percent of the cases are prosecuted.
“Residential mailboxes are fertile grounds for scammers,” Zulfikar Ramzan, Chief Scientist and EVP of Product and Development at Aura, a digital safety platform that protects people against scams, told The Epoch Times. “Do not leave your mail unattended; send checks via a post office collection box when at work, or hand them directly to your carrier.”
He advised, “Whenever possible, eliminate the use of paper checks altogether.”
Writing Checks: Precautions to Take
Mr. Ramzan offered a clever yet simple tip to help avoid falling victim to stolen checks, “Use indelible black gel ink pens. The Better Business Bureau (BBB) urges consumers to sign their checks with long-lasting (indelible) black gel ink. This ink is particularly tough to scrub off, making it nearly impossible for scammers to erase the original contents of the check.”
Michael Scheumack, chief innovation officer at IdentityIQ, a private firm providing identity protection for consumers, suggested restricting the check. That way, it can only be deposited in the bank account of the intended recipient. “To do this, you should write ‘For deposit only’ on the back of the check where the signature goes.”
Additionally, “You should never include additional personal details, such as your date of birth, driver’s license number, or Social Security number, on the check,” Mr. Scheumack said.
Monitor your checking account. “Use your online banking features. Be on the lookout for any discrepancies in amounts paid out, or any overdraft notices, reconciling the records every 30 days,” Mr. Ramzan said.
He further advised consumers, “Always shred sensitive documents such as unused or canceled checks, pre-approved credit notices, and bank statements before discarding them.”
“Scammers can steal these out of the trash and ‘wash’ them,” he explained. “Make a point to examine your check supply regularly, and report any missing checks to your bank. And never write checks payable to ‘cash’ or ‘bearer’ since anyone can take that money.”
As a final word of caution, Mr. Ramzan advised using a bank that provides checks with at least one of the following features:
- A mixture of visible and invisible fibers that can be seen under close examination or by exposure to UV light.
- A 3D, reflective holostripe made of metal that makes counterfeiting almost impossible.
- High-resolution microprinting as a font around the border of the check, which is difficult for scammers to replicate.
- Watermarks that are only visible at certain angles, and can’t easily be copied.
- Chemical voids that produce the word VOID if photocopied or exposed to “washing” chemicals.
While high-tech thieves can overcome many anti-counterfeiting measures, the idea is to make it as difficult as possible.
Counterfeit Scams: When It’s Too Good to Be True
The common factor in most “too good to be true” scams is how they use the lure of “easy money” to deceive victims. Thieves with access to advanced graphics programs and printing equipment can create very authentic-looking counterfeit checks. In one instance, scammers convince unwitting victims to cash or deposit the counterfeit checks. Then they ask the victim to refund some portion of the amount very quickly, or forward it to another person in the form of cash, a prepaid debit card, a personal check, a bank electronic wire transfer, or a person-to-person transaction like Zelle. When the victim becomes aware of the fraud, they can never reclaim the funds they sent.
Here are some examples of scams:
•   You were hired as a mystery shopper after responding to an online ad, and were sent a check as initial payment before doing any work, with instructions to deposit it and send a portion to another mystery shopper. This is a scam designed to steal the amount forwarded.
Research any companies offering employment as a mystery shopper. Look up the company’s contact info yourself. Don’t use any information provided in the email, letter, or call. If the offer came via email, check the postmark against the city listed on the letterhead or email signatures and email addresses.
•  You’ve been advised you won a lottery or other cash prize. As a “winner,” you are asked to deposit the check, then send funds to cover taxes and processing fees.
These prize money scams rely on the victims sending the money before the bank discovers the check is fake. In addition to being defrauded of the money they sent to the scammer, the person depositing the counterfeit check can be held liable by the bank for the full amount.
•   Someone purchases goods from you. You are overpaid by the buyer, and asked to send a check for the difference.
“Do not accept overpayments,” said Mr. Ramzan. “Receiving a check in the mail for an item more than your asking price usually turns out to be some form of bank scam.”
“Do not deposit these checks, or checks from unknown senders, or checks associated with out-of-town banks.” He also advised closely scrutinizing the check date, sender name, and financial institution for errors or dubious characteristics.