Fraudsters are using public planning records to target permit applicants
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要理解文章的内容。文章讲的是网络犯罪分子利用申请规划或 zoning 许可证的过程进行钓鱼诈骗。他们伪装成政府工作人员,发送看似真实的邮件,要求受害者通过难以追踪的方式支付费用。 接下来,我得提取关键点:钓鱼邮件、伪装政府、索取费用、支付方式难以追踪、建议验证信息来源。然后,把这些点浓缩成一句话,确保不超过一百字。同时,避免使用“文章内容总结”这样的开头。 可能的结构是:网络犯罪分子利用规划许可流程进行钓鱼诈骗,伪装政府机构索要费用,建议验证信息来源。这样既涵盖了主要信息,又简洁明了。 </think> 网络犯罪分子利用规划许可流程中的繁琐环节实施钓鱼诈骗,伪装成政府工作人员发送看似真实的邮件索要费用,并建议通过难以追踪的方式支付。 2026-3-12 18:31:52 Author: www.fortra.com(查看原文) 阅读量:0 收藏

If you're in the middle of applying for a planning or zoning permit, there is some unwelcome news: cyber-criminals have found a way to exploit the bureaucratic tedium of the process against you.

A warning from the FBI's Internet Crime Complaint Center (IC3) has alerted the public about an emerging phishing scheme in which fraudsters impersonate city and county planning staff to demand fees from people with active permit applications.

According to the IC3, victims across the United States have been targeted by fraudsters using the method.

Rather than blasting out generic emails in the hope that they end up in a likely victim's inbox, the fraudsters are discovering in advance who has submitted a permit application (a matter of public record), what their property address is, their case number, and even the names of the officials handling their application.

Armed with this information, the scammers send emails timed perfectly to coincide with when the applicant is likely to be genuinely in correspondence with their local authority.

The carefully crafted emails appear professional, use the city letterhead and official seals, and discuss details such as planning commission review processes and relevant local ordinances. In other words, they read exactly like the real thing.

The targeted victims are then instructed to pay fees via wire transfer, peer-to-peer payment platforms, or cryptocurrency — methods that are deliberately chosen because of the difficulty of reversing the transaction after the payment has been made.

Notably, IC3's warns that the fraudulent invoices actively direct their intended victims away from picking up the phone, instructing applicants to request payment instructions via email instead, claiming that this ensures "a reliable audit trail."

Many unsuspecting members of the public may find that explanation perfectly reasonable, but - of course - the real reason is that one phone call to the legitimate planning office would immediately expose the fraud.

As is so often the case, victims are encouraged to pay promptly, being told that failure to make a timely payment could delay the permit application.

The FBI's IC3 offers some simple advice:

  • Do not assume an email is legitimate just because it features the right logos, letterhead, and official names. All of that information is publicly available and easily copied by a scammer.
  • Check the full email address and confirm it matches the official you have actually been corresponding with.
  • If you receive an unexpected invoice, go directly to your city or county's official website and call the phone number listed there — do not trust that the number provided in the email is legitimate.

If you believe you have been targeted, you are encouraged to report what you have experienced to the FBI.

Never forget, if you ever receive an unexpected payment request via email or text message, always verify through official channels before handing over a penny.


Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor and do not necessarily reflect those of Fortra.


文章来源: https://www.fortra.com/blog/fraudsters-are-using-public-planning-records-target-permit-applicants
如有侵权请联系:admin#unsafe.sh