Positions Vacant!

Several vacancies are open for several very clever, and very bad people who, though cunning in the ways of duplicity and exploiting job candidates in dreadful ways, were not clever enough when to know precisely the right time to pack up and leave. The time to pull out was long before October 2012.

A gang of fraudsters have been jailed for stealing hundreds of thousands of pounds from job hunters using fake online adverts for companies in the UK including Harrods and Argos.
The group of five men and one woman included one of the UK’s first home-grown financial malware writers to be convicted for targeting banks, the National Crime Agency (NCA) said. They targeted people looking for work on internet sites such as Gumtree and posted bogus job adverts for reputable companies like Blue Arrow. They themselves called it the “Gumtree Fraud”.
Adjibola Akinlabi, 26, Damilare Oduwole, also 26, and Michael Awosile, 27, who all lived in South London, were each jailed for seven years. Malware writer Tyrone Ellis, 27, was jailed for four and a half years, while Temitope Araoye, 29, was given a two-year prison sentence. Nadine Windley, 26, who pleaded guilty to using her position as an employee of Santander bank to provide the gang with customer account data, was handed a two-year suspended sentence. Babatunde Akinlabi, 28, who previously pleaded guilty to a 2008 offence of fraud with his brother Adjibola (after they used illegally obtained bank details to obtain cash from online bank accounts) will also leave a vacancy.
Here’s some of the ways they managed the heist. The group targeted people looking for jobs. Locating what looked like reputable UK organizations, including Harrods, Securestore, and Argos, they posted job adverts, even apparently masquerading as a reputable Employment Agency, Blue Arrow-(amongst others), over what appears to be a number of years. Therein lies the mistake, as they came to the attention of the UK Police force, who combined intelligence to hunt and gather.
One of the technical tools the criminals used was HT-F41 – The Crossbill SpyEye Malware-a very naughty virus which started live as the ZeuS banking Trojan. The SpyEye toolkit is similar to Zeus in a lot of ways. It contains a builder module for creating the Trojan bot executable with config file and a Web control panel for command and control (C&C) of a bot net.
Applying online, the applicants were then asked to “fill in that application pack for further consideration.”-then the magic happens, via this nasty ass (or more correctly задница) program called SpyEye which uses a variety of tricks to stay hidden.

It can inject itself in DLLs, or dynamic link libraries — code libraries used by applications — that are legitimate-even deleting its own installation files! Once infected, users who clicked the job link inadvertently downloaded the computer malware which recorded their keystrokes, capturing their private financial and personal data, and transmitting it back to the criminal gang.
The fraudsters used personal data to telephone banks claiming to have lost their credit or debit card. They would request a new pin number and credit card, and then wait outside the victim’s address where they would intercept the postman before he delivered the letters, the NCA said (!)
They also defrauded the emergency cash systems of several banks by providing illegally obtained security passwords, at which point the bank issued them with a special code so they could obtain £60 from cash machines.-all very clever. Mobile phone and online chat records apparently showed the group had made more than £300,000 from their fraud, but officers believe this figure could be much higher – possibly more than £1million, maybe even an amount so embarrassing as to be almost surely censored, as the group were sprung late in 2012 after a long multi-agency hunt.
The idea has spawned some interesting copycat crime, according to the Australian Financial Review.
In Shanghai, China recently, fake job adverts, with fake jobs, fake addresses, and all purporting marvellous jobs with great companies are simply trolling for resumes, which are then on-sold!
One Australian executive working in human resources in China said recruiters used well-known foreign companies to lure high-achieving job applicants to websites. They could on-sell their database of resumes to companies in the industry concerned. (AFR) Fascinating?
So what can we do to prevent online fraud? Well, if a job looks too good to be true, it usually is. Use known recruiters, and known job boards. Stay aware-if the site looks dodgy do some further investigation. Use a post office or private box. Keep your antivirus up to date-and then some!
In the long run there is no certainty, no absolutes. Learn resilience. For example, monitor your bank accounts. Any money stolen is probably going to be returned by the bank-it’s what they do, but you must report the money stolen, and so on….all resilient strategies designed to ensure you bounce back in this uncertain world full of clever thieves who live in grey as well as dark worlds.

Bot Bird

Robots are Free






This entry was posted in Rumour Control Central, Underneath the Radar. Bookmark the permalink. Follow any comments here with the RSS feed for this post. Post a comment or leave a trackback: Trackback URL.

Post a Comment

Your email is never published nor shared. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

  • CareerCafé is always on the hunt for ICT (Information Technology & Computing) specialists.

    Equipped with a good resume, we can approach clients who have an “open” specification lodged with us as a requirement.

    All applications are treated with dignity, respect, and privacy.

    Please note: we cannot assist those without a full “work-ready” visa - not a holiday visa or a variant of a 457 – sorry!