Connect with us

Technology

Timeshare terror leaves retired couple $50K in the hole after being scammed

Published

on

Timeshare terror leaves retired couple K in the hole after being scammed

The FBI is issuing a stark warning to timeshare owners about a widespread telemarketing scam linked to a violent Mexican drug cartel. This scheme targets unsuspecting property owners, leading to significant financial losses. Here’s what you need to know and how to protect yourself.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Illustration of a timeshare property (Kurt “CyberGuy” Knutsson)

The Dimitruks’ devastating timeshare scam experience

In late 2022, Mr. and Mrs. Dimitruk, a retired Canadian couple, received a call about selling their Florida timeshare. The scammers, aware of their specific timeshare details, promised a Mexican buyer willing to pay above market value. The fraudsters employed an intricate process involving a fake New York escrow company, ecurrencyescrow[.]llc. The Dimitruks were asked to complete forms and wire more than $3,000 for “administrative” and “processing” fees.

For almost a year, the scammers made additional financial demands, citing various taxes and fees. The couple even sent $5,000 to pay off their remaining timeshare balance, believing it was part of the sale process. Mr. Dimitruk, a 73-year-old retired long-haul truck driver, revealed in an interview with KrebsOnSecurity that they lost more than $50,000 to this scam. Even after this substantial loss, the scammers continued to contact them, claiming their money was waiting and urging further payments.

Advertisement

Fake New York escrow company email (KrebsOnSecurity) (Kurt “CyberGuy” Knutsson)

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME

Cartel connections to fraud schemes

The FBI has linked these timeshare fraud schemes to the Jalisco New Generation drug cartel in Mexico. According to a July 2024 warning from the FBI and the Financial Crimes Enforcement Network, these scams are part of the cartel’s efforts to diversify their revenue streams and finance other criminal activities, including drug trafficking.

Since at least 2012, the cartel and other Mexico-based transnational criminal organizations have increasingly targeted U.S. owners of timeshare properties in Mexico, particularly older adults who are often more vulnerable to such scams. The proceeds from these fraudulent activities not only support the cartel’s operations but also contribute to the manufacturing and trafficking of dangerous substances like fentanyl into the United States.

8 PHISHING SCAMS TO WATCH OUT FOR THIS HOLIDAY SEASON

Advertisement

How these scams work

The Jalisco New Generation Cartel (CJNG) has expanded its criminal activities beyond traditional drug trafficking into sophisticated scams, including timeshare fraud targeting unsuspecting individuals, particularly Americans. Here are some of the methods employed by the cartel in executing these scams:

Impersonation of legitimate entities: Scammers often pose as legitimate real estate agents, escrow companies or even officials from U.S. government agencies like the Treasury Department. This tactic is designed to instill a sense of trust and urgency in potential victims, making them more susceptible to fraud.

Targeting vulnerable populations: The cartel primarily targets elderly Americans who own timeshares in Mexico. These individuals are often contacted with offers to buy their timeshares at inflated values, but they are required to pay various fees upfront, such as taxes or closing costs, before any transaction can be completed. Once these payments are made, the scammers disappear, leaving victims with significant financial losses.

Use of call centers: The CJNG operates illegal call centers where employees, often unaware of the cartel’s true nature, engage in telemarketing schemes. These centers are strategically located in regions with high unemployment rates, providing a pool of workers who may be desperate for jobs. The call centers not only facilitate scams but also serve as a means for the cartel to exert control over local populations through intimidation and violence.

Complex fraud schemes: The scams can involve multiple layers of deception. For instance, victims may be contacted multiple times by different scammers posing as various professionals (e.g., lawyers or real estate agents) who claim they can assist with selling their timeshares or recovering lost funds. This re-victimization often leads to further financial exploitation.

Advertisement

Violence and intimidation: The cartel employs extreme measures to maintain control over its operations and silence potential whistleblowers. Reports indicate that workers attempting to quit these call centers have faced dire consequences, including murder, which serves as a chilling message to others considering leaving the cartel’s employment. This brutal enforcement mechanism not only protects their operations but also instills fear within communities.

Digital infrastructure: The CJNG utilizes a network of fraudulent websites and domains that appear legitimate at first glance. These websites often mimic real escrow and real estate firms, making it difficult for victims to discern the authenticity of their interactions. Many of these domains have been linked back to a central hub that manages multiple scam operations simultaneously.

By understanding these operational tactics, you can better appreciate the complexities and dangers associated with scams perpetrated by organized crime groups like the Jalisco New Generation Cartel. This knowledge is crucial for potentially preventing future victimization.

Government warning (U.S. Department of the Treasury’s Office of Foreign Assets Control) (Kurt “CyberGuy” Knutsson)

THE AI-POWERED GRANDMA TAKING ON SCAMMERS

Advertisement

Protecting yourself from timeshare scams

To avoid falling victim to similar scams, it is crucial to take proactive steps to safeguard your financial interests:

1) Verify the buyer’s identity and offer legitimacy: Always confirm the identity of any potential buyer and the authenticity of their offer. Contact the timeshare company directly to validate any claims made by the buyer.

2) Research any company that contacts you: Conduct thorough research on any business reaching out to you. Look for reviews, complaints and verify their credentials through reliable sources.

3) Be wary of upfront fees: Legitimate transactions typically do not require upfront fees for administrative or processing purposes. If a company requests such payments, exercise caution.

4) Use secure communication channels: Avoid sharing personal or financial information over unsecured methods such as phone calls or emails. Opt for secure communication channels whenever possible.

Advertisement

5) Do not click on links: Avoid clicking on any links or downloading attachments from unsolicited emails. Scammers often use these tactics to steal your personal information. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6) Consult with professionals before proceeding with transactions: Seek advice from a real estate attorney or a trusted financial advisor before engaging in any transactions. Their expertise can help you navigate potential pitfalls.

7) Report suspicious activity to authorities: If you suspect you’ve been targeted by a timeshare scam, don’t hesitate to promptly report it to local authorities, the FBI’s Internet Crime Complaint Center at ic3.gov or the Federal Trade Commission. Reporting can help protect others from falling victim to similar schemes.

8) Invest in personal data removal services: While the advice provided is valuable, the most crucial step in protecting yourself from such scams is to minimize your online presence. By reducing the amount of personal information available on the web, you make it significantly harder for scammers to target you. No service promises to remove all your data from the internet. However, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Advertisement

Kurt’s key takeaways

Here’s the deal. These timeshare scammers are clever, they’re persistent, and they’re backed by some seriously bad dudes. But don’t let that scare you into inaction. Remember, knowledge is power. By staying informed and skeptical, you’re already one step ahead of these fraudsters. Trust your gut. If something feels off, it probably is. And don’t be afraid to ask for help or report suspicious activity. Let’s make life a whole lot harder for these scammers and keep your hard-earned money where it belongs: in your pocket.

What additional steps do you think authorities should take to combat telemarketing scams targeting vulnerable populations? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

Slay the Spire II is even better with a friend

Published

on

Slay the Spire II is even better with a friend

Slay the Spire II launched in early access last week, and it’s already an excellent sequel to one of the best roguelikes of all time. In many ways, it’s very similar to its predecessor. Like Hades II and Hollow Knight: Silksong, Slay the Spire II mostly iterates on an already superb foundation. But it does add online co-op with up to four players. While multiplayer changes the familiar rhythms of Slay the Spire just a bit, it’s still a great way to tackle the arduous climb up the spire.

A round of Slay the Spire II plays essentially the same as the original: In each run, you navigate three different acts across a winding map, slowly making a build by crafting your deck and picking up various perk-giving relics, and fighting enemies, elites, and bosses along the way. Slay the Spire II retains the deliberate, turn-based style of play, meaning that when it’s your turn, you have as much time as you want to decide what to do. Since you can see exactly what your enemies are planning for their next turn, there’s a lot of strategy in deciding how much damage to do and how much defense you might need to set up. Multiplayer adds a slight twist: When it’s your turn, everyone can play simultaneously. That opens up all sorts of new opportunities for planning, but it also requires communication to make sure everyone is using their cards effectively.

My multiplayer partner was my wife, the biggest Slay the Spire fan I know, and on our second run we got a thrilling victory. I played the new Necrobinder character, a necromancer, while she played as the returning Silent, which can make decks built around flurries of shivs. Over the course of the run, we accidentally settled into a strategy where I focused on applying the Vulnerable status to as many enemies as possible before my wife would rain down shivs upon our foes.

Slay the Spire II doesn’t encourage teamwork only in battles. At a campfire rest stop, you can choose to mend a friend’s health to help them out. (Some of the new enemies are tough, so I’m glad this is an option.) You each get a vote on which path to take next on the map. Everyone can draw on the map, too — as I learned many times after seeing the doodles my wife made when I would spend too long in the shop.

Since we had to communicate so much, our winning run took about an hour and a half, slower than how fast I could blast through runs in the first game. When we finally defeated the Act 3 boss, though, it was even more satisfying than most of my solo wins because we did it together. My one complaint is that co-op requires you to each play online on your own copy of the game, and that, because there’s no couch co-op, we each had to play on separate devices even though we were sitting on the couch right next to each other.

Advertisement

Those are annoying tradeoffs, but multiplayer is such a fun addition to Slay the Spire that I don’t mind. I can’t wait to try another multiplayer run and see what challenges — and doodles — are in store for me.

Continue Reading

Technology

Android fixes 129 security flaws in major phone update

Published

on

Android fixes 129 security flaws in major phone update

NEWYou can now listen to Fox News articles!

Most people never think about Android security updates until a headline like this appears. Suddenly, your phone, the device you use for messages, banking, photos and work, becomes part of a global cybersecurity story.

That is exactly what happened this week. Google released its latest Android security updates, and they fix a massive 129 vulnerabilities. Even more concerning, one of them is already being exploited by attackers.

The flaw targets a component connected to Qualcomm graphics hardware, and researchers say it has already been used in limited targeted attacks. If you use an Android phone, this is the kind of update you want installed as soon as possible.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

Advertisement

GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK
 

Google’s March Android security update fixes 129 vulnerabilities, including a zero-day flaw already exploited in targeted attacks. (Firdous Nazir/NurPhoto via Getty Images)

Android security flaw already targeted by attackers

One vulnerability in particular has security researchers paying close attention. The flaw is tracked as CVE-2026-21385. Google says there are signs it is already being used in targeted attacks. That makes it a zero-day vulnerability.

In simple terms, attackers discovered the flaw before many devices received a fix. According to Qualcomm, the problem is tied to the graphics processing component inside many of its chipsets. Specifically, the issue involves something called an integer overflow. That technical term means a calculation error can cause memory corruption inside the system. Once that happens, attackers may gain a foothold on the device.

Advertisement

Qualcomm says the flaw impacts 235 different chipsets, which means a large number of Android phones could be affected. Google’s Threat Analysis Group discovered the issue and reported it through coordinated disclosure practices. Qualcomm then worked with device makers to release patches.

Why the Android security vulnerability is dangerous

Several of the patched vulnerabilities allow attackers to execute code remotely or gain elevated privileges on a device. One issue inside the Android System component is especially concerning. Google says it could allow remote code execution without any user interaction.

That means an attacker may exploit the flaw without the victim tapping a link or installing an app. In cybersecurity terms, that type of vulnerability ranks among the most dangerous.

The March Android bulletin addresses ten critical flaws across the System, Framework and Kernel components. These parts sit at the core of Android, so any weakness there can ripple across millions of devices.

Advertisement

ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP
 

Android users are urged to install the latest security patch as manufacturers roll out updates across devices. (Barrington Coombs/PA Images via Getty Images)

Why some Android phones get security updates faster

Google released two patch levels for this update:

  • 2026-03-01 security patch level
  • 2026-03-05 security patch level

The second update includes everything in the first, plus fixes for additional hardware components and third-party software. Google Pixel devices typically receive updates immediately. However, many Android users must wait longer.

Phone manufacturers such as Samsung, Motorola and OnePlus often test the patches before releasing them for specific models. Carriers may also delay updates while they verify compatibility. As a result, some users receive security patches quickly while others wait weeks.

Advertisement

How to protect your Android phone from security threats

Security vulnerabilities are a reality in modern software. The good news is that there are several simple steps that can greatly reduce your risk.

1) Install Android updates quickly

Check for updates regularly and install them as soon as they appear. On most devices, go to Settings, tap Security and privacy or Software update, then select Check for updates and install the latest version if one is available. Security updates often fix vulnerabilities that attackers may already be trying to exploit.

2) Avoid apps from unknown sources

Advertisement

Only download apps from trusted stores like Google Play. Third-party app stores pose a higher risk of malware.

3) Keep Google Play Protect enabled

Google Play Protect, which is built-in malware protection for Android devices, scans apps for malicious behavior and warns you if something suspicious appears. It also automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices.  Therefore, we recommend strong antivirus software because it adds another layer of protection by using deeper threat detection, real-time monitoring and broader malware databases that can catch suspicious apps or files that Google Play Protect may overlook. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

4) Use strong device security

Set a strong passcode on your phone and turn on fingerprint or face unlock if your device supports it. This helps keep strangers out of your phone if it is lost or stolen.

Advertisement

5) Be cautious with suspicious links

Many attacks still start with phishing messages. Avoid tapping unknown links in texts, emails, or social media messages.

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT
 

A critical Android zero-day tied to Qualcomm chipsets could allow attackers to gain a foothold on affected devices. (Donato Fasano/Getty Images)

The bigger picture behind Android security updates

Advertisement

This Android update also highlights how modern mobile security works behind the scenes. Google’s Threat Analysis Group frequently discovers vulnerabilities that may already be used in real-world attacks. Those findings trigger coordinated responses involving chip manufacturers, phone makers and security researchers. In this case, Qualcomm received the report in December and provided fixes to device makers in early 2026.

By the time the public bulletin arrived, patches were already moving through the Android ecosystem. The process may look slow from the outside. In reality, it involves dozens of companies working together to prevent widespread exploitation.

Kurt’s key takeaways

Security updates rarely feel exciting. Yet they play a critical role in protecting billions of smartphones around the world. This latest Android update proves that point clearly. A zero-day flaw tied to Qualcomm graphics hardware was already being targeted before many users even knew it existed. Installing updates quickly remains one of the simplest ways to protect your device and your personal data. Most of the time, the update only takes a few minutes. Those few minutes can block attacks that might otherwise compromise your phone. So the next time your Android device prompts you to install a security patch, the better question may be this:

When your phone asks for a security update, do you install it immediately or tap remind me later? Let us know by writing to us at Cyberguy.com

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading

Technology

Apple smart home display rumors now point to a fall launch with iOS 27

Published

on

Apple smart home display rumors now point to a fall launch with iOS 27

The rumored “HomePod with a screen” we’ve heard so much about was reportedly lined up for launch in 2025, and then this spring, and now, according to the latest updates, it’s on the shelf until this fall. Leaker Kosutami posted as much on X last week, and today, Bloomberg reporter Mark Gurman followed up with similar information, saying its robot arm-equipped cousin is now planned for launch in 2027.

That was supposed to be ready by now, but it is now predicted to arrive later this year, along with the iPhone 18 Pro plus 2027 updates for iOS, macOS, and all the rest. He describes a silver aluminum-cased device with a 7-inch screen and USB-C power port running a version of tvOS 27, while new versions of the HomePod speaker and Apple TV 4K box are also waiting in the wings for that Siri update, and a smart home sensor is in the works, too.

Continue Reading

Trending