FraudHIGH

Fraud - Convicted Scammer Runs Phishing Scheme from Prison

CSCyberScoop·Reporting by Matt Kapko
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, a scammer tricked athletes into giving him their online passwords from prison.

Quick Summary

A convicted scammer is back at it, running a phishing scam from prison. Professional athletes were deceived into sharing sensitive information. This case highlights ongoing vulnerabilities in digital security practices and the need for increased awareness.

What Happened

Kwamaine Jerell Ford, a 34-year-old man from Georgia, is back in the spotlight for running a phishing scam while incarcerated. The U.S. Department of Justice revealed that Ford impersonated a well-known adult film star to deceive professional athletes into sharing their iCloud login details. This scheme unfolded while he was already serving time for a similar crime, showcasing a blatant disregard for the law.

Ford's fraudulent activities included tricking athletes into providing their multifactor authentication (MFA) codes under false pretenses. He allegedly executed over 2,000 unauthorized transactions from November 2020 to September 2024, all while in federal custody for previous crimes. The indictment unsealed recently outlines a disturbing pattern of behavior that has escalated from identity theft to more severe allegations, including sex trafficking.

Who's Being Targeted

The primary victims of Ford's latest scheme are professional NBA and NFL athletes. These high-profile individuals were targeted due to their public personas and perceived wealth. Ford used social media to lure them in, claiming he would send them adult film content via iCloud. This tactic not only highlights the vulnerability of even the most successful individuals but also raises questions about the effectiveness of digital security practices.

The indictment does not disclose the names of the victims or the total amount of money Ford allegedly stole. However, the implications of his actions are significant, as they involve not just financial fraud but also the potential exploitation of individuals in vulnerable positions.

Tactics & Techniques

Ford's approach involved sophisticated social engineering techniques. He spoofed legitimate Apple customer service accounts and sent phishing messages that appeared authentic. Victims received texts that looked like they were from Apple, requesting login details under the guise of needing to access a video file.

When athletes provided their MFA codes, Ford simultaneously attempted to access their accounts. This tactic allowed him to gain complete control over their iCloud accounts, leading to the theft of sensitive personal and financial information. The FBI noted that Ford escalated his criminal behavior, moving from identity theft to coercing an OnlyFans model into non-consensual acts, further complicating the case.

Defensive Measures

This case serves as a stark reminder of the importance of cybersecurity awareness, especially for high-profile individuals. Athletes and celebrities must remain vigilant against phishing attempts, as they are prime targets for scammers. Here are some recommended actions:

  • Verify Requests: Always confirm the identity of anyone requesting sensitive information, especially via text.
  • Use Strong MFA: Implement robust multifactor authentication methods that do not rely solely on SMS.
  • Educate Yourself: Stay informed about the latest phishing tactics and scams.

As the legal proceedings unfold, it is crucial for individuals to learn from these incidents to better protect themselves against similar threats in the future.

🔒 Pro insight: This case underscores the persistent threat of social engineering, particularly against high-profile individuals, necessitating heightened awareness and security measures.

Original article from

CSCyberScoop· Matt Kapko
Read Full Article

Related Pings

HIGHFraud

Drift Hack - $285 Million Theft Linked to DPRK Operation

A major hack on Drift resulted in a staggering $285 million theft, linked to a six-month DPRK social engineering operation. This highlights the growing threat of state-sponsored cybercrime in the cryptocurrency sector. Organizations must enhance their security measures to prevent similar attacks.

The Hacker News·
HIGHFraud

Device Code Phishing - Attacks Surge 37 Times in 2026

Device code phishing attacks have skyrocketed this year, with a 37x increase. Users of IoT and streaming devices are particularly at risk. New phishing kits like EvilTokens are making these attacks easier for cybercriminals. Stay alert and protect your accounts.

BleepingComputer·
HIGHFraud

Job Scams - Coca-Cola and Ferrari Offers Are Traps

Scammers are impersonating Coca-Cola and Ferrari with fake job offers to steal your passwords. Job seekers are at high risk as these scams become more sophisticated. Protect your personal information by verifying job offers directly with companies.

Malwarebytes Labs·
HIGHFraud

FCC Proposes $4.5 Million Fine for Voxbeam's Fraudulent Calls

The FCC is proposing a hefty fine against Voxbeam for allowing fraudulent calls to reach American consumers. This could lead to stricter regulations on voice service providers. Stay alert to protect your personal information from scams.

The Record·
HIGHFraud

Windows Extortion Plot - Engineer Pleads Guilty to Charges

A former engineer has pleaded guilty to locking Windows admins out of servers in an extortion scheme. This incident underscores the risks of insider threats. Rhyne's actions could lead to a 15-year prison sentence. Companies must strengthen their cybersecurity measures to prevent similar attacks.

BleepingComputer·
MEDIUMFraud

Business Email Compromise - The New Threat Landscape Explained

A recent fraud attempt shows how business email compromise is evolving. Small organizations are now prime targets for these scams. Awareness is key to staying safe.

Cisco Talos Intelligence·