Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

FBI Warns of Spoofed IC3 Website

Threat actors likely spoofed the official government website for personal information theft and monetary fraudulent activity.

FBI Hacked

The FBI on Friday issued an alert on threat actors spoofing the official Internet Crime Complaint Center (IC3) government website.

The FBI’s IC3 website is the central hub for reporting cybercrime-related activities, such as online extortion, hacking, identity theft, money laundering, and ransomware attacks. Launched in 2000 as the Internet Fraud Complaint Center (IFCC), it was renamed in 2003.

Spoofed websites, the FBI explains, can be used for the theft of personal information and to facilitate monetary fraud or other illicit activities.

To deceive users into accessing the spoofed websites, threat actors rely on alternative spelling of words, or use a different top-level domain than the legitimate site.

Individuals could access a spoofed FBI IC3 website when attempting to find the official domain to submit a complaint, the FBI explains.

“Threat actors create spoofed websites often by slightly altering characteristics of legitimate website domains, with the purpose of gathering personally identifiable information entered by a user into the site, including name, home address, phone number, email address, and banking information,” the Bureau notes.

Advertisement. Scroll to continue reading.

To avoid accessing the spoofed websites, the FBI recommends that users navigate to the legitimate IC3 website by typing www.ic3.gov in the browser’s address bar. Users are also advised to avoid clicking on the sponsored results when using a search engine to find the domain, and ensure that the IC3 site they visit ends in [.]gov.

Additionally, the FBI recommends that users avoid clicking on URLs that differ from the legitimate IC3 site, that they do not click on links with suspicious artifacts or graphics, and that they never share sensitive information unless they are sure that the website is legitimate.

“IC3 will never ask for payment to recover lost funds, nor will IC3 refer someone to a company requesting payment for recovering funds,” the agency notes.

The Bureau also notes that the IC3 does not maintain social media accounts and encourages users to report any incidents.

Related: Noise Storms: Massive Amounts of Spoofed Web Traffic Linked to China

Related: Sophisticated ‘VastFlux’ Ad Fraud Scheme That Spoofed 1,700 Apps Disrupted

Related: A Key US Government Surveillance Tool Should Face New Limits, a Divided Privacy Oversight Board Says

Related: Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Sumo Logic has named Jeremy Powell as CISO and Ben Cody as SVP of Product Management.

Bitdefender has appointed Frank Koelmel as Chief Revenue Officer of Business Solutions Group.

John Hernandez has joined BlueVoyant as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.