home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   MOBILE      I think its to discuss tablet/app stuff?      945 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 895 of 945   
   August Abolins to All   
   bank shirks responsibility   
   25 May 23 22:15:00   
   
   MSGID: 2:221/1.58@fidonet 08c501c8   
   PID: OpenXP/5.0.57 (Win32)   
   CHRS: ASCII 1   
   TZUTC: -0400   
   Kinda mobile related since mobile tech "security" was at play..   
      
   I can't believe that someone fell for this:   
      
   https://www.cbc.ca/news/canada/montreal/phone-bank-fraud-montreal-1.6853465   
      
   And yet..   
      
   "Although he filed a complaint with TD, his request for reimbursement was   
   denied as was his appeal. He'll have to pay back the $13,000 cash advance in   
   full. The bank offered three months interest free, then it goes back up to 30   
   per cent interest."   
      
   It is disturbing that the bank is refusing to take ANY responsibility. The   
   original fraud was committed by the scammers who managed to take out a cash   
   advance from the victim's credit card and deposit that money into the victim's   
   chequing account.   
      
   This part is disturbing..   
      
   "In a letter explaining the decision not to reimburse Shattah, the bank said   
   its investigation showed a "one-time passcode was sent to your device with   
   your Easyweb password being changed."   
      
   "Shattah said he never requested a password change and believes the scammers   
   requested it. Typically, an alert is sent to a customer's phone asking them if   
   they asked for the change. Shattah never received one and believes the   
   scammers may have redirected the alert."   
      
   So.. how could the scammers have commandeered the request to have a temp pw   
   changed and routed to a new phone number?  Something at the bank went horribly   
   wrong and they ALLOWED the transaction. The bank SHOULD be responsible.   
      
   --    
     ../|ug   
      
   --- OpenXP 5.0.57   
    * Origin:  (2:221/1.58)   
   SEEN-BY: 15/0 103/705 106/201 124/5016 153/143 149 757 7715 203/0   
   SEEN-BY: 218/700 221/1 6 360 226/30 227/114 229/110 112 113 307 317   
   SEEN-BY: 229/426 428 470 664 700 240/1120 250/8 266/512 280/464 291/111   
   SEEN-BY: 292/854 8125 301/1 310/31 317/3 320/219 341/66 234 396/45   
   SEEN-BY: 423/81 460/58 633/280 712/848 770/1 2320/105 3634/12 24   
   PATH: 221/1 280/464 153/757 770/1 317/3 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca