dslreports logo
site
 
    All Forums Hot Topics Gallery
spc

spacer




how-to block ads


Search Topic:
uniqs
36143
share rss forum feed

jswanson

join:2008-02-24

1 recommendation

reply to jswanson

Re: [Credit Card Fraud] fraud: www.prophotosland.com & www.phot

Another one to watch out for... www.glossyeldorado.com. Gotta love that name

MGD... please add to the db!

There are other sites that talk about this scam:

»www.ripoffreport.com/reports/0/3···6667.htm

The most annoying thing for me is that my credit card company charged me $10.00 for a new card... to make sure the $9.87 doesn't turn into a recurring charge I am made to pay $10.00. I will be cancelling that card.


MGD
Premium,MVM
join:2002-07-31
kudos:9

1 recommendation

said by jswanson:

Another one to watch out for... www.glossyeldorado.com. Gotta love that name

MGD... please add to the db! ..............
Done !!

said by jswanson:

.......The most annoying thing for me is that my credit card company charged me $10.00 for a new card... to make sure the $9.87 doesn't turn into a recurring charge I am made to pay $10.00. I will be cancelling that card.
That is unbelievable !!

You are actually saving them money by telling them to cancel and reissue the card. You are not liable for fraudulent charges, it becomes their problem. The alternative is to allow these criminals to hit the card with new charges every two weeks, and let the Bank deal with them. Until such time as they catch on, and decide to re issue it at their own expense.

If this is a National or large Regional Bank, please name them. The only possibility that I am thinking of, is that they are a small credit union or something. Either way it is ridiculous to charge a customer, who through no fault of their own, becomes the victim of card fraud. I am not even sure that it is legal under Federal Law to do so. I could see it if you had lost the card, or otherwise contributed to the problem. Just on principle alone I would raise all kinds of commotion with that institution. It has to be a small non profit credit union or something, correct?. If not, they via their CSR are entirely clueless. They just don't get it.

MGD

MGD
Premium,MVM
join:2002-07-31
kudos:9
reply to jswanson

GLOSSYELDORADO.COM




A new twist on the search engine blocking, specifically line items Google:




No contact phone number, only the made up name Cristian Darrie.

And a familiar bogus GoDaddy domain registation, and GoDaddy hosting:

Registrant:
HAITAO ZHANG
426 King's Road
Hong Kong, North Point --
Hong Kong

Registered through: GoDaddy.com, Inc.
Domain Name: GLOSSYELDORADO.COM
Created on: 15-Feb-08
Expires on: 15-Feb-09
Last Updated on: 15-Feb-08

Administrative Contact:
ZHANG, HAITAO haitao.zhang44@yahoo.com
426 King's Road
Hong Kong, North Point --
Hong Kong
85281980611

MGD


Doctor Olds
I Need A Remedy For What's Ailing Me.
Premium,VIP
join:2001-04-19
1970 442 W30
kudos:18
reply to jswanson

said by jswanson:

add www.photosmix.com to your database. Phone 941-312-2213 out of Florida. Same visuals/text as photogeyser and prophotosland.com. Alex McGuire is also the contact on this one. Just looks like a different version.
www.photosmix.com

»www.photosmix.com
Snapped 2008-03-14 07:08:24


»www.photosmix.com/robots.txt

User-agent: *
Disallow:


--
What’s the point of owning a supercar if you can’t scare yourself stupid from time to time?

jswanson

join:2008-02-24
reply to MGD

Hi MGD,

It was a small credit union as you guessed and believe me, I will be talking to someone pretty high up about their policy. I will most likely also close the account as I have not been happy with their response.

Thanks for all of your work on this!



lorider680

@okheart.com
reply to jswanson

Chalk me up for Photogeyser.com. Glad I stumbled on this forum. Going to call my bank and have a new card issued.


jswanson

join:2008-02-24
reply to jswanson

Looks like photosmix.com and prophotosland.com are back up and running so beware... their site states "Our hosting provider has accidently delegated our domain to a different company... " not sure what this means as they still have the same GoDaddy logo. GoDaddy may have received enough abuse complaints that they made them change something... but obviously they are still operational. Perhaps MGD, you will know what this means.

I am guessing there will be another round of charges in the next few weeks...



Victim 1947

@comcast.net
reply to jswanson

A charge of $9.64 from a Michael P Hamilton in Maryland (213-984-4966) posted to my Chase on 3-14-08. A foreign voice recording, gave an indiscernible .com name, not Hamilton, not prophotoland, etc. Sounds like "time share" but is indiscernible. I see $9.64 has been used on previous attacks. Chase described Hamilton as an Art Dealer, but said they would do the charge back. They did not want to close/replace the card. So I asked the rep to clearly state for their recording that they were declining to close the account for fraud. They said they will investigate. I'll monitor the account daily.



deanhuff

@rr.com

Add another for MICHAEL P HAMILTON $9.64 on 03/15/2008. Bank of America gave me a new account number and re-imbursed the money.

I also had another charge for around $3 from "M BAR C RANCH" in Pending state but never posted.

I saw on the news that a local grocer called Sweetbay had a security breach and gave out a bunch of card numbers. Sure enough, I had 1 Sweetbay transaction in early December.


jswanson

join:2008-02-24
reply to jswanson

MGD,

Please add stockimagemix.com to the database. Another one with the exact same home page... unbelievable. Same bogus support name of Alex McGuire, etc.

Support: Alex McGuire
e-mail: support@stockimagemix.com
tel: (561) 283-4229


jswanson

join:2008-02-24
reply to jswanson

MGD,

And stockimageplanet.com

Support: Alex McGuire
e-mail: support@stockimageplanet.com
tel: (941) 312-2230



pcdebb
RIP dadkins
Premium
join:2000-12-03
Brandon, FL
kudos:5
Reviews:
·Bright House
reply to deanhuff

said by deanhuff :

I saw on the news that a local grocer called Sweetbay had a security breach and gave out a bunch of card numbers. Sure enough, I had 1 Sweetbay transaction in early December.
It was their parent company "Hannaford", which Sweetbay Supermarkets is one of their stores, but I do believe many of their other chains are affected as well.
--
a time for change... | 1st & 10 | Ham is good


jim123

@cox.net
reply to jswanson

how do they get the card # ????


garys_2k
Premium
join:2004-05-07
Farmington, MI
Reviews:
·Callcentric
·callwithus

said by jim123 :

how do they get the card # ????
That's the big question. This gang gets numbers for cards that are actively in use, used VERY infrequently and some that have never been used before. They also seem to submit a fairly high number of wrong numbers that get rejected, too, so their data is far from perfect.


Doctor Olds
I Need A Remedy For What's Ailing Me.
Premium,VIP
join:2001-04-19
1970 442 W30
kudos:18
reply to jim123

said by jim123 :

how do they get the card # ????
They need more than just the card number. A card number alone is nearly useless.

Some of the data theft comes from this avenue:

»10 Largest Data Breaches Since 2000 - Millions Affected

Where there is a will, there is a way.
--
What’s the point of owning a supercar if you can’t scare yourself stupid from time to time?

MGD
Premium,MVM
join:2002-07-31
kudos:9
reply to Victim 1947

said by Victim 1947 :

A charge of $9.64 from a Michael P Hamilton in Maryland (213-984-4966) posted to my Chase on 3-14-08. A foreign voice recording, gave an indiscernible .com name, not Hamilton, not prophotoland, etc. Sounds like "time share" but is indiscernible. I see $9.64 has been used on previous attacks. Chase described Hamilton as an Art Dealer, but said they would do the charge back. They did not want to close/replace the card. So I asked the rep to clearly state for their recording that they were declining to close the account for fraud. They said they will investigate. I'll monitor the account daily.
That was a fraud charge from Imgparadise.com:




They are part of this sub group of Globus / Image / Pictures themed fraud sites laundering hijacked card data. »pictureglobus.com, imaglobus.com, and templateglobus.com now

I suspect "Michael P Hamilton in Maryland" may be a secondary merchant account, set up in a cyber mule's name after the original one was terminated for excessive chargebacks.

The phone number 213-984-4966 and the recording is definitely part of this group;

download213-984-4966.wav 453498 bytes


The reason Chase probably described them as an "Art Dealer", is from their interpretation of the vendor classification code assigned to the merchant account.

Chase will eventually have to cancel and replace your card. Yes, do keep a close eye on it, you will get more charges.

MGD

MGD
Premium,MVM
join:2002-07-31
kudos:9

1 edit
reply to deanhuff

said by deanhuff :

Add another for MICHAEL P HAMILTON $9.64 on 03/15/2008. Bank of America gave me a new account number and re-imbursed the money.

I also had another charge for around $3 from "M BAR C RANCH" in Pending state but never posted. ......
I assume the "M BAR C RANCH" appeared first, that would be a "ping" charge to validate the account. I wonder if these people »www.m-bar-c.org/ have a merchant account that was hacked.

[EDIT= They do have a merchant account: »payments.auctionpay.com/ver3/?id=w038846 ]

said by deanhuff :

.....I saw on the news that a local grocer called Sweetbay had a security breach and gave out a bunch of card numbers. Sure enough, I had 1 Sweetbay transaction in early December.
I am fairly certain that the Hannaford data would not be sufficient to be proccessed for this CNP type of fraud transactions. "IF", what Hannaford's reps stated is true, that customers names were NOT intercepted, then the data that the hackers got was the TRACK 2 card data. That would only enable them to use the data for fraudulent POS (Point of Sale) transactions. Typically that data is encoded on to white stock" and used where the card is not presented, e.g. gas stations etc. A common cheap method that they can use the stolen data for store POS fraud purchases is to clone the data on to used VISA / MC branded gift cards. That way they can be presented and swiped without causing suspicion.

I have not seen any reports yet of the specific fraud use of the 1,800 victims of the Hannaford data so far. If the type of data leaked is correct, fraud use should be limited to POS transactions.

Up until your card was replaced, you could have been the victim of fraud from that as well. However, for an online CNP transaction, the full name and address would have been needed, along with the CVV2 security code. The security code is only printed on the card, and is not embedded in any of the track magnetic data.

A merchant gateway account for an online only entiity, such as these scams, will usually require the use of (AVS) and (CVV2) to restrict fraud. »en.wikipedia.org/wiki/Address_Ve···n_System

MGD

MGD
Premium,MVM
join:2002-07-31
kudos:9
reply to jswanson

said by jswanson:

Looks like photosmix.com and prophotosland.com are back up and running so beware... their site states "Our hosting provider has accidently delegated our domain to a different company... " not sure what this means as they still have the same GoDaddy logo.....
That was no "accident", upon reviewing the domain transaction history, the most likely reason is that the payment for the original registration was charged back to GoDaddy. These criminals use hijacked victim financial data to pay for all the support and hosting services.

The domains were originally registered using go GoDaddy's domainsbyproxy cloaking service that hides the details of the registration for an additional fee. That service is a crime magnet, and should never be available for sites that are set up for e-commerce. The can only be a nefarious purpose in hiding the ownership of a commercial site engaged in payment processing.

On or about March 08th, GoDaddy took possesion of the photosmix.com domain and put it up for sale:


----------------------------------------
Domain: photosmix.com
.
Domain History
.
Cache Date: 2008-03-08
.
Registrar: GODADDY.COM, INC.
.
----------------------------------------
.
Registrant:
Godaddy Software
14455 N Hayden Rd
Suite 219
Scottsdale, AZ 85260
United States
.
Domain Name: PHOTOSMIX.COM
Created on: 17-Dec-07
Expires on: 18-Dec-08
Last Updated on: 07-Mar-08
.
Administrative Contact:
domains for sale, Godaddy Software
domains4sale[@]godaddy.com

Godaddy Software
14455 N Hayden Rd
Suite 219
Scottsdale, AZ 85260
United States
480-505-8800 Fax -- 480-505-8844
.
----------------------------------------


That ownership reversion indicates that payment funds were charged back. Ridiculous as it may seem, the criminals would still have an opportunity to "make good" on the funds and recover the domain. Which they apparently did around March 16th, as the domain then reverted back to a domainsbyproxy cloaked status:


----------------------------------------
.
Domain: photosmix.com
.
Domain History
.
Cache Date: 2008-03-16
.
Registrar: GODADDY.COM, INC.
.
Registrant:
Domains by Proxy, Inc.
DomainsByProxy.com
15111 N. Hayden Rd., Ste 160, PMB 353
Scottsdale, Arizona 85260
United States
.
Domain Name: PHOTOSMIX.COM
Created on: 17-Dec-07
Expires on: 18-Dec-08
Last Updated on: 12-Mar-08
.
Administrative Contact:
Private, Registration PHOTOSMIX.COM@domainsbyproxy.com
Domains by Proxy, Inc.
DomainsByProxy.com
15111 N. Hayden Rd., Ste 160, PMB 353
Scottsdale, Arizona 85260
United States
(480) 624-2599 Fax -- (480) 624-2599
.
----------------------------------------


MGD

MGD
Premium,MVM
join:2002-07-31
kudos:9

2 edits

1 recommendation

reply to jswanson

said by jswanson:

MGD,

Please add stockimagemix.com to the database. Another one with the exact same home page... unbelievable. Same bogus support name of Alex McGuire, etc.

Support: Alex McGuire
e-mail: support@stockimagemix.com
tel: (561) 283-4229
said by jswanson:

MGD,

And stockimageplanet.com

Support: Alex McGuire
e-mail: support@stockimageplanet.com
tel: (941) 312-2230
Done,

Below is a current list of the group, the current status needs to be updated as it is over a week old:


Fraud Domain Date of Reg Registrar Hosted IP Provider Status Contact N umber
----------- --------- -------- -------- ------- ----- -------- ---
.
PHOTOSMIX.COM 17-Dec-07 DomainsByProxy 72.167.110.64* GoDaddy.com Down 941-312- 2213
. back up 03/12/08 on 208.109.181.27 (03/07/08)
.
PICTURESJUNGLE.COM 27-Nov-07 DomainsByProxy 72.167.116.221 GoDaddy.com UP 706-955- 4677
.
POLISHPICTURESONLINE 30-Dec-07 GoDaddy.com 72.167.58.216 GoDaddy.com Parked 214-556- 6190
.COM
.
PHOTOGEYSER.COM 14-Nov-07 DomainsByProxy 72.167.107.98 GoDaddy.com UP 301-979- 9960
.
IMAGESPARADISE.COM 07-Feb-08 GoDaddy.com 216.69.131.90 GoDaddy.com UP 214-556- 6153
.
PROPHOTOSLAND.COM[*] 05-Dec-07 DomainsByProxy *216.69.138.250 GoDaddy.com UP 609-916- 0040
. *(Was For Sale scammers recovered)*Hosted at 208.109.165.98 Prior to 03/16/ 08
.
PHOTOSPARADISE.COM 12-Jan-08 GoDaddy.com 216.69.140.242 GoDaddy.com UP 214-717- 5031
. & 214-556- 6153
.
GLOSSYELDORADO.COM 15-Feb-08 GoDaddy.com 72.167.168.179 GoDaddy.com UP No Numbe r
.
IMGPARADISE.COM 11-Jan-08 DomainsByProxy 72.167.78.41 GoDaddy.com UP 213-984- 4966
.
IMAGLOBUS.COM 26-Aug-07 DomainsByProxy 72.167.3.161 GoDaddy.com UP 210-807- 4272
.
TEMPLATEGLOBUS.COM 16-Oct-07 DomainsByProxy* 72.167.23.251 GoDaddy.com Down**210-807- 4272
. 208.109.182.137 ** as of 03/12/08 Spam-and-abu se
.
PICTUREGLOBUS.COM 13-Nov-07 DomainsByProxy 72.167.106.230 GoDaddy.com Down 210-807- 4272
. 03/09/08
.
ZENITHGRAPHIC.COM 04-Oct-07 DomainsByProxy 72.167.27.37 GoDaddy.com UP 504-208- 4860
. & 505-350- 8506
.
STOCKIMAGEMIX.COM 18-Dec-07 DomainsByProxy 72.167.56.91 GoDaddy.com UP 561-283- 4229
.
STOCKIMAGEPLANET.COM 10-Dec-07 DomainsByProxy 208.109.174.94 GoDaddy.com UP 941-312- 2230
.
LOADOFPHOTOS.COM 05-Dec-07 DomainsByProxy 72.167.9.148 GoDaddy.com UP 870-619- 4035
.
.
C&C support sites
-----------------
.
HERMESELECTRO.COM 15-Aug-07 GoDaddy.com 208.109.138.8 GoDaddy.com UP (10)8528120 4462
.
HKC-TRADE.COM 28-Nov-07 GoDaddy.com 72.167.4.140 GoDaddy.com UP (10)8528198 0664

.
Let me know if there are any missing from that list.

The last two that you posted, both have the robots.txt file set to block search engine archiving:

»www.stockimagemix.com/robots.txt

User-agent: *
Disallow:

STOCKIMAGEPLANET.COM


STOCKIMAGEMIX.COM



I am positive that the names listed on any of these sites are fictitious. Not long after the first generation "globus" sites were posted by Doctor Olds See Profile in this post »pictureglobus.com, imaglobus.com, and templateglobus.com now I ran searches on the names through the Texas division of corporations, and did not find any relevant business registrations under the related names:

CONTACT NAME: MGD

SESSION STATUS: Open

DATE: 020108KBDNCR

2/1/2008 2:04:31 PM

------------------------------------------------------------

Client Reference Document Number Document Type Status Received Date Document Fee
[ NONE ] 201976250002 Corporations - Names Availability (No decision making) {globus} Processed 2/1/2008 2:07:05 PM $1.00
[ NONE ] 201976250003 Corporations - Find by Assumed Name {imaglobus} Processed 2/1/2008 2:13:41 PM $1.00
[ NONE ] 201976250004 Corporations - Find-Global {pictureglobus} Processed 2/1/2008 2:18:50 PM $1.00
[ NONE ] 201976250005 Corporations - Find by Registered Agent {Robertson} Processed 2/1/2008 2:20:37 PM $1.00
[ NONE ] 201976250006 Corporations - Find by Registered Agent {eric Robertson} Processed 2/1/2008 2:22:17 PM $1.00
[ NONE ] 201976250007 Corporations - Find {Atala} Processed 2/1/2008 2:25:22 PM $1.00
This fraud division is probably the most egregious example of failure in the merchant account vetting process seen so far.

We have sites where not only are the domain registrations cloaked, but there is also invalid contact information listed on the sites. Nothing more than a bogus name, and a cell phone number.

The major security flaw in the merchant account vetting process, and one of obvious malfeasance, is that there is no check to make sure that the domain is actually registered by the business entity applying for the merchant account. In theory a business registered as Igor Cyber Scammer LLC. could open a merchant account for homedepot.com or Sears.com. Just the fact alone that an e-commerce site with no B&M location has a hidden domain registration should be enough to set alarm bells ringing. That's before we even get to the fact that an e-commerce site is hiding its existence from every search engine. The fact that there are no folders containing graphic images "the intangible product for sale", is just icing on the cake.

We do know who the merchant account provider is, yes, as usual it is Authorize.net / cybersource. That has been established from data supplied from victim debriefings. Credit issuing notifications sent to victims who complained, came from the authorize.net account control panel:

From MICHAEL ALLISON "REDACTED" 2008
Return-Path:
Authentication-Results: mta116.mail.re3.yahoo.com from=ghg.net; domainkeys=neutral (no sig)
Received: from 64.94.119.18 (EHLO anetrelay2f.authorize.net) (64.94.119.18)
by mta116.mail.re3.yahoo.com with SMTP; Mon, 21 Jan 2008 12:37:10 -0800
Received: from extta5f.authorize.net [64.94.118.194]
by anetrelay2f.authorize.net (StrongMail Enterprise 3.2.2.2(3.00.287)); "REDACTED" -0800
Received: from mail pickup service by extta5f.authorize.net with Microsoft SMTPSVC;
"REDACTED" -0700
From: "MICHAEL ALLISON" MIKEALLISON@ghg.net
To: "REDACTED"
Subject: TEMPLATEGLOBUS.COM Customer Receipt/Purchase Confirmation
Date: "REDACTED" -0700
Importance: Normal
Message-ID:
Content-Length: 572
Sent: "REDACTED", 2008 "REDACTED"
Subject: TEMPLATEGLOBUS.COM Customer Receipt/Purchase Confirmation

=========
GENERAL
INFORMATION
=========

Merchant
:
TEMPLATEGLOBUS.COM
Date/Time
:
"REDACTED"
"REDACTED"
PM
Transaction
ID
"REDACTED"
=========
ORDER
INFORMATION
=========
Type
:
REFUND
Though GoDaddy is on record at the beginning as refusing to shut the hosting operation down without legal action, which is out of character of their normal trigger happy removal behavior. They have now done so to at least one of the sites. By doing so, they have also unmasked the original cloaked domain registration, which is SOP.

TEMPLATEGLOBUS.COM is showing terminated as of 03/12/08 for "Spam and Abuse".

The original TEMPLATEGLOBUS.COM cloaked domain registration:

Registrant:
Domains by Proxy, Inc.
DomainsByProxy.com
15111 N. Hayden Rd., Ste 160, PMB 353
Scottsdale, Arizona 85260
United States

Domain Name: TEMPLATEGLOBUS.COM
Created on: 16-Oct-07
Expires on: 16-Oct-08
Last Updated on: 28-Nov-07

Administrative Contact:
Private, Registration TEMPLATEGLOBUS.COM@domainsbyproxy.com
Domains by Proxy, Inc.
DomainsByProxy.com
15111 N. Hayden Rd., Ste 160, PMB 353
Scottsdale, Arizona 85260
United States
(480) 624-2599 Fax -- (480) 624-2599

Domain servers in listed order:
NS29.DOMAINCONTROL.COM
NS30.DOMAINCONTROL.COM
Once the site violated the TOS and was shut down around 2008-03-12, that cloaking service also ceased. The domain reverted to the actual data entered at the time of the original registration.

Registrant:
ERNEST TAYLOR
29159 PERCH LAKE RD
WATERTOWN, New York 13601
United States

Domain Name: TEMPLATEGLOBUS.COM
Created on: 16-Oct-07
Expires on: 16-Oct-08
Last Updated on: 28-Nov-07

Administrative Contact:
TAYLOR, ERNEST templateglobus@yahoo.com
29159 PERCH LAKE RD
WATERTOWN, New York 13601
United States
(315) 629-5442 Fax --

Domain servers in listed order:
NS1.SUSPENDED-FOR.SPAM-AND-ABUSE.COM
NS2.SUSPENDED-FOR.SPAM-AND-ABUSE.COM
Good reason to want to hide it, there are no records of an Ernest Taylor at that address. A reverse check of the street address shows a different first and last name. That phone number is not even for that locale, the number shows for a party in Evans Mills, NY 13637.

Clearly, with a little lobbying Godaddy could be motivated to pull the hosting on the entire operational group. Fraud and cyber crime are TOS violations, and there is more than ample evidence to confirm that they are all fraudulent.

In addition, the terms of service page on all the fraud sites are hijacked word for word from the legit gettyimages.com »www.gettyimages.com See: »www.gettyimages.com/Corporate/Terms.aspx

In fact on zenithgraphic.com they did not even remove Getty Images name:
»www.zenithgraphic.com/index.php?action=terms

If those terms are unique to Getty Images and not generic, then Getty would have a cause for action for copyright violations.

Some pressure applied to GoDaddy now to pull the rug from this criminal operation, should be effective. To continue to host this obvious fraudulent enterprise would amount to knowingly aiding on ongoing criminal enterprise. Victims of this fraud might well consider that actionable.

EDIT= Added LOADOFPHOTOS.COM to master list 03/29/08

MGD

jswanson

join:2008-02-24

MGD,

I have reported these sites to godaddy, both to president@godaddy.com and abuse@godaddy.com. I am not satisfied with their response:

From godaddy:

"If you were, in fact, fraudulently charged through use of one or more of these sites, we can only recommend that you contact local law enforcement.

We have forwarded this to our Abuse Department for further investigation of potentially illegal activity. Of course, we cannot guarantee that any action will be taken, but we appreciate that you have brought this matter to our attention."

I would add to the steps to take if you are a victim of this fraud to contact both president@godaddy.com and abuse@godaddy.com. Perhaps if they get enough complaints they will do what you advise and shut these guys down. A few policy changes to verify legit entities is all it would take to stop this fraud.

Again, thanks for all of your work. BTW, I did get a chargeback that stated "fraud adjustment". Can I get my credit card company to give me the details of the chargeback?



Doug55

@comcast.net
reply to jswanson

Please add LoadOfPhotos.com to the list. I was charged $9.87 today. Contacted BofA to reverse charge and get me a new card. Also had a pending charge from Michael P Andrew that has since been canceled. Load Of Photos is same site with Alex McGuire name and GoDaddy registration. Reported to IC3.



stockimagemixcom

@sbcglobal.net
reply to jswanson

I just recieved my cc statement and noticed the unauthorized charge from stockimagemix.com for $9.87. I called the number listed next to the charge and of course, it is not a working number. I immediately reported the fraud to my cc company. They credited the charge,flagged the account,cancelled the card/account number. I also filed a complaint with the Better Business Bureau (»www.bbbsoutheastflorida.org) and ic3.gov.

Without an address, I had to list the provided phone number(SE FL prefix)and URL. An address is required -- simply "Unknown" those areas of the form. Definitely provide the URL for this forum in your complaint.

I highly recommend that all victims follow up and do the same -- with enough pressure, HOPEFULLY, something will happen and these awful creatures will be stopped.


madneon

join:2003-12-22
Holloman Air Force Base, NM

Yes I too am a victim of Loadofphotos.com for 9.87 I have also replaced my card. I am VERY careful with my card any clues on how these people are getting hold of them and is loadofphotos a real web site because it it still up and running.


jswanson

join:2008-02-24
reply to jswanson

I would suggest to all victims who filed their fraud complaint only via the telephone to follow up with a letter addressed to the fraud department of your credit card company.

A physical letter addressed to you credit card company's fraud department will insure that your complaint is investigated as fraud vs. secretly "disputed" and swept under the rug. I would also suggest that in the letter you state that you have also filed a complaint through ic3.gov. After receiving my letter my credit card company immediately changed my charge reversal from "adjustment" to "fraud adjustment".

I know it is a lot of effort for $10 but if the credit card companies are forced to report this as fraud they will eventually work towards stopping the criminal operation.

Also, on the security forum there is more information on the Hannaford data breach. The credit card information was intercepted at the store during the transaction and then sent overseas...

»www.boston.com/business/articles···_grocer/


MGD
Premium,MVM
join:2002-07-31
kudos:9
reply to Doug55

said by Doug55 :

Please add LoadOfPhotos.com to the list. ...
Thank You, I have added them to the original list on the previous page

said by madneon:

Yes I too am a victim of Loadofphotos.com for 9.87 I have also replaced my card. I am VERY careful with my card any clues on how these people are getting hold of them and is loadofphotos a real web site because it it still up and running.




No they are a 100% fraud, fake site, just a front operation used to launder hijacked card data into cash. They are a subset of the larger: »Ebook websites, fraud charges, Devbill/DigitalAge/Pluto same modus-operandi.

It is very difficult to know for sure the source of the card data. It is doubtful that the data is coming from any recent e-commerce transactions since many of the cards are pre pinged before the charge. That tells us that they are testing the validity of the data before submitting the actual fraud charge. If the data was tied to actual recent transactions, that would not be necessary, since they would be known good data.

Somewhere behind this operation is a domestic cyber-mule who would have set up the merchant and banking accounts to process the fraud payments. What makes this this criminal operational group so disturbing is the complete lack of any vetting process whatsoever. The ability to set up and intergrate with the financial card processing system with such obvious fraudulent credentials is outrageous.

The websites are registered using GoDaddy's cloaking "hide a criminal" service called "Domainsby Proxy". That enables them to mask a clearly fraudulent domain registration. The sites contain no contact info, such as the business name that the merchant account was set up as. Just a bogus individuals name and voice mail phone number. Combine that with the fact that they are supposed to be selling an "intangible product", nothing to ship, and it just SCREAMS FRAUD. There isn't even any folders on the sites that contain graphic images that they are supposed to be selling. being blocked form search engines so no one could find them is just icing on the fraud cake.

We can go back and look at one of the earlier failed sites for an example of the deliberate obfuscation of the business registration chain.

The domain itself was cloaked via GoDaddy. they also own the cloaking service Domains by Proxy, Inc:


Registrant:
Domains by Proxy, Inc.
.
DomainsByProxy.com
15111 N. Hayden Rd., Ste 160, PMB 353
Scottsdale, Arizona 85260
United States
.
Registered through: GoDaddy.com, Inc.
Domain Name: ZENITHGRAPHIC.COM
Created on: 04-Oct-07
Expires on: 05-Oct-08
Last Updated on: 04-Oct-07


On this one only, the contact detail on the website included the name of the related LLC:




listed under the bogus names was:


Support: Alex McGuire
e-mail: support@zenithgraphic.com
tel: (504) 208-4860
.
General: Edris Hoover
info@zenithgraphic.com
tel: (505) 350-8506
.
Jupiter, LLC -------> LOOK
8210 Robin Ave NE
Albuquerque, NM 87110


So the suspected recruited cyber-mule would have registered a cover LLC from that 8210 Robin Ave NE, Albuquerque, NM 87110 address. A check of the New Mexico Division of Corporation's database confirms this:


New Mexico Public Regulation Commission
----------------------------------
JUPITER, LLC
SCC Number: 2937704
Tax & Revenue Number:
Organization Date: SEPTEMBER 18, 2007, in NEW MEXICO
Organization Type: DOMESTIC LIMITED LIABILITY
Organization Status: EXEMPT
Good Standing:
Purpose: N/R
----------------------------------
.
ORGANIZATION DATES
Taxable Year End Date:
Filing Date:
Expiration Date:
.
SUPPLEMENTAL POST MARK DATE
Supplemental:
----------------------------------
MAILING ADDRESS
8210 ROBIN AVE NE ALBUQUERQUE , NEW MEXICO 87110
PRINCIPAL ADDRESS
8210 ROBIN AVE NE ALBUQUERQUE NEW MEXICO 87110
PRINCIPAL ADDRESS (Outside New Mexico)
----------------------------------
.
REGISTERED AGENT
BUSINESS FILINGS INCORPORATED
.
123 EAST MARCY STREET SANTA FE NEW MEXICO 87501

Agent Designated:
Agent Resigned:
----------------------------------
.
COOP LICENSE INFORMATION
Number:
Type:
Expiration Year:
----------------------------------
.
ORGANIZERS
BUSINESS FILINGS INCORPORATED
----------------------------------
.
DIRECTORS
Date of Election of Directors:
----------------------------------

.
Since there are no reports of fraud charges under the zenithgraphic.com name, I assume the cyber-mule who registered Jupiter on behalf of the criminals dropped out before it got off the ground. All of the other sites hide that business information in order to preserve the fraud. No merchant account provider performing even minimal vetting would not authorize an account set up based on this configuration format.

It is bad enough that consumer's card data cannot be kept secure, but to then provide open door access to the merchant financial system so that the hijacked data can be readily laundered into cash, is nothing short of incredible negligence.

MGD


GINAH

@bledsoe.net
reply to MGD

Thank you for this information! Same thing happened to me. I had a charge on my bank account via my debit card from Michael P Hamilton for $9.64. Thanks to your post I understand better how this sort of thing works. I had a charge about six days ago from wiseegoods, llc with phone number 954-603-7710. I emailed the Fla. Attorney General's office and filed a complaint. I then found out that the Miramar Police Dept is investigating Wiseegoods and will likely be a federal case. So I am guessing that Wiseegoods and Michael P Hamilton are scams run by the same or similar crooks. Folks, please watch out for Wiseegoods also. Thanks again!!!



zippertrain

@covad.net
reply to jswanson

another victim...I check my credit card account on line and was surprised to see the charge, especially since I was at a funeral all day out of state...I have called visa and canceled my card and had a new card reissued. They have turned this over to their fraud department. I will also put a fraud alert with all the credit reporting companies and urge others to do so as well.


MGD
Premium,MVM
join:2002-07-31
kudos:9

2 edits
reply to GINAH

said by GINAH :

Thank you for this information! Same thing happened to me. ........... I had a charge about six days ago from wiseegoods, llc with phone number 954-603-7710. I emailed the Fla. Attorney General's office and filed a complaint. I then found out that the Miramar Police Dept is investigating Wiseegoods and will likely be a federal case. ........
You are welcome, and glad that you posted.

You are the first victim whose fraud charges actually tie this Globus / Pic / image scam subset back to the main template Ebook group »Ebook websites, fraud charges, Devbill/DigitalAge/Pluto You have one fraud charge from each division. I assume they were on the same card, though there are victims who get hit on two different cards.

Thanks again, as this is the first time that I have seen a reference to Wiseegoods. Which apparently has been around since January of 2007, and is hosted on GoDaddy. I can confirm that they are in fact part of the main group, as there are several victim reports who also had additional fraud charges from other sites in the main group, Interactive designs, etc.

The domestic based portion of wiseegoods was set up by a duped US cyber-mule who was recruited via an employment offer.

wiseegoods.com AKA WISEEGOODS.COM LLC 954-603-7710
.



The domain is registered to the cyber-mule, which fits the pattern of the template group.


[wiseegoods.com IP 68.178.254.16]
.
Registration Service Provided By: NameCheap.com
Contact: support@NameCheap.com
.
Domain name: wiseegoods.com
.
Registrant Contact:
WiseEGoods.com LLC
Basil Lynch (thewisemanster@gmail.com)
+1.6109563936
Fax: +1.5555555555
16781 S.W. 36 Court
Miramar, FL 33027
US
.
Status: Locked
.
Name Servers:
ns1.secureserver.net
ns2.secureserver.net
.
Creation date: 15 Jan 2007 07:56:35
Expiration date: 15 Jan 2009 07:56:35


In addition, Mr. Lynch would have registered an LLC in order to obtain a business bank account, and merchant processing account which uses Authorize.net / Cybersource.
.


.

Florida Limited Liability Company
WISEEGOODS.COM LLC
.
Filing Information
Document Number L07000001015
FEI Number 113800709
Date Filed 01/03/2007
State FL
Status ACTIVE
.
Principal Address
16781 S.W. 36 COURT
MIRAMAR FL 33027
.
Mailing Address
16781 S.W. 36 COURT
MIRAMAR FL 33027
.
Registered Agent Name & Address
LYNCH, BASIL
16781 S.W. 36 COURT
MIRAMAR FL 33027 US
.
Manager/Member Detail
Name & Address
Title MGRM
LYNCH, BASIL
16781 S.W. 36 COURT
MIRAMAR FL 33027
.
Annual Reports
Report Year Filed Date
2008 03/07/2008


As usual, wiseegoods.com was set up exclusively to launder hijacked card data into cash, so it needed to be hidden from the rest of the internet, by blocking search engine archiving:




The cyber-mule, Mr Lynch, obviously would have been totally unaware of what he was setting himself up for. Once he is alerted, the merchant account should be closed immediately, the bank account frozen, and any recent foreign wire transfers of the fraudulent funds should try and be recovered. All communication with the crime syndicate should be stopped at once.

MGD

MGD
Premium,MVM
join:2002-07-31
kudos:9

1 edit

1 recommendation

reply to jswanson

Hermes Electro AKA hermeselectro.com was first discussed in the original forum thread on the "globus" group here: »pictureglobus.com, imaglobus.com, and templateglobus.com now In that thread it was identified as a Command & Control hub site, because it was from that domain that victims were sent the bogus records of how their cards were used for account enrollments. Hong-Kong Content Trade AKA hkc-trade.com was subsequently identified earlier in this thread as an identical second C&C hub site.

They both list addresses in Hong Kong along with local voice mail telephone numbers. It has not been determined if those numbers are relaying calls elsewhere, or if there is a local management mule fielding calls on behalf of the criminals. There is little doubt that the real criminals operating this division, are also located in Russia and/or the Ukraine.

New evidence for this image / pic group show that people with online resumes are being directly targeted for cyber-mule recruitment. Here is an actual unsolicited pitch sent from online resume trolling.

quote:
From: hzhang@hkc-trade.com

Subject: Job.com Position offered to VICTIM NAME - $70k/year - Independent Representative Position

Dear "Potential Cyber-Mule"

My name is Haitao Zhang. I work as a Local Advisor for Honk-Kong Content Trade Company.

Your resume, found on job.com has been chosen by our HR department, and I would like to offer you the position of an Independent Representative we currently have available at our company.

Bellow I have provided some general information about our company and position description.

----------------------------------------------------------------------
About Versum Electro Company
----------------------------------------------------------------------
Honk-Kong Content Trade is a fast growing company working on the international market since 2002. We are proud to announce that it has been over 5 years of our successful operation. During this relatively short period of time we managed to build strong business relationships with all of our clients as well as created a bright team of motivated professionals.

The main activities of the company in Europe include but are not limited to:

- Electronic wholesales and retailing
- Online e-content sales
- E-business systems development

----------------------------------------------------------------------
Independent Representative Position
----------------------------------------------------------------------
In connection with forthcoming expansion into the United States market we are hiring an honest, punctual candidate for the Independent Representative position.

The primary role of the Independent Representative:

Provide support for contract and agreement registration, required for on-line trade platforms. Manage funds and organize profit distribution.

The position which is being offered implies both part-time and full-time involvement thus allowing you to adjust your schedule and allocate enough time to complete the required tasks. We will be helping and assisting you during the entire work process, providing all the necessary information, technical support and expert guidance.

The salary consists of two parts and will grow depending on your performance.
1. Base salary of $2000.00 (three thousand) US
2. 1% from sales (may grow up to 5%)

On average you will be receiving 4-5 thousand dollars each month during the first few month of your work.

Payments are made twice a month.

If you are interested in this offer and would like to receive more information, please send your resume and motivation letter to resume@hkc-trade.com

You can contact me about this position by:
Email: hzhang@hkc-trade.com
Phone: (+10) 852 8198 0664

You are also welcome to visit our website at: »www.hkc-trade.com

Your prompt response on this offer would be greatly appreciated.

Sincerely,

----------------------------------------------------------------------
Haitao Zhang
Local Advisor
Honk-Kong Content Trade Inc.
hzhang@hkc-trade.com

Phone: (+10) 852 8198 0664
»www.hkc-trade.com

.

The fraudulent funds from accounts set up in this pic/image/ globus group are confirmed as being laundered via these recent wire transfers out of US banks

One routing sends the stolen funds to FBME Bank Ltd (Federal Bank of the Middle East Ltd) headquartered in Nicosia, Cyprus, with foreign branches loacted in Russia and Tanzania. »www.fbme.com/ and »www.fbme.com/index.cfm?id=104

The fraudulent proceeds were routed out of the country via Deutsche Bank Trust Company, New York, »www.db.com/index_e.htm

The specific wire transfer details are:



Beneficiary Account: Name: VIDESS S.A No.: 073725
IBAN: CY2011501002073725USDCACC001
Beneficiary Bank: FBME BANK Limited,
Nicosia, Cyprus
Swift Code: FBMECY2N
Correspondent Bank: Deutsche Bank Trust Company,
New York, USA Swift
Code: BKTRUS33
Account No: 04-053-863



Note the beneficiary name VIDESS S.A from non other than the Ukraine:




A single web page, appears to be a jack of all nefarious trades website.

VIDESS S.A, AKA »videss.org just oozing with legitimacy:

quote:
"VIDESS" was founded during 2003 with professional staff, making custom graphic, web and 3D design, for the Internet Industry and over. We have a great experience and huge creative potential. The central "VIDESS" office is in Ukraine, but our ties and works are successfully used with the companies all over the world.

The videss.org domain has a cloaked registration:


Whois Record
Domain ID:D104264057-LROR
Domain Name:VIDESS.ORG
Created On:23-Apr-2004 20:03:36 UTC
Last Updated On:11-Mar-2008 23:52:19 UTC
Expiration Date:23-Apr-2012 20:03:36 UTC
Sponsoring Registrar:EstDomains, Inc. (R1345-LROR)
Status:CLIENT DELETE PROHIBITED
Status:CLIENT RENEW PROHIBITED
Status:CLIENT TRANSFER PROHIBITED
Status:CLIENT UPDATE PROHIBITED
Registrant ID:PP-SP-001
Registrant Name:Domain Admin
Registrant Organization:PrivacyProtect.org
Registrant Street1:P.O. Box 97
Registrant Street2:All Postal Mails Rejected, visit Privacyprotect.org
Registrant Street3:
Registrant City:Moergestel
Registrant State/Province:
Registrant Postal Code:5066 ZH
Registrant Country:NL
Registrant Phone:+45.36946676
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant Email:


They are hosted in New Jersey on Net Access Corporation (NAC.NET) on IP 64.21.13.112

A second recent transfer of funds from the fraudulent card billing of this group was sent to the account of BETA-METAL LTD located in Kyev, Ukraine, via a bank in Riga, Lativa called JSC Rietumu Banka »www.rietumu.com/eng.nsf/page?Rea···00372683



Beneficiary Name: BETA-METAL LTD
Beneficiary Address: Grushevskogo 28/2, Kyev, Ukraine. 01021
IBAN: LV55 RTMB 0006 0380 6245
(multicurrency)
Bank: JSC Rietumu Banka
Bank address: 54 Brivibas street, Riga, LV-1011,
LATVIA S.W.I.F.T.: RTMBLV2X



So far the only reference to BETA-METAL LTD that I can find is this: »64.233.169.104/search?q=cache:6L···=1&gl=us

Clearly, the names and addresses of the C&Cs in Honk Kong are a distraction, intended to throw the focus away from the real location. Find and follow the money !!

MGD
EDIT= formatting

SSSR

join:2005-04-30
Homer Glen, IL

I just got hit on 3/26 from STOCK IMAGE PLANET COM for $9.87 and I also have a temporary hold from WISEE GOODS LLC for $2.95. I'll be calling my bank to report this fraud.