GHOST JOBS & PHANTOM SCAMS: In Medicine and Finance

By Staff Reporters.

***

***

A fake job or ghost job is a scam job posting for a non-existent or already filled position. A scam is a dishonest scheme to gain money or possessions from someone fraudulently, especially a complex or prolonged one.

Due to current economic conditions in 2025, there’s been a rise in scams related to job postings and financial relief offers, preying on people’s financial insecurities. Keep your wits about you and be wary of potential fraud in seemingly legitimate opportunities.

For example, an employer may post fake job opening listings for many reasons such as inflating statistics about their industries, protecting the company from discrimination lawsuits, fulfilling requirements by human-resources departments, identifying potentially promising recruits for future hiring, pacifying existing employees that the company is looking for extra help, or retaining desirable employees. They may also use this strategy to gather information regarding their competitors’ wages. And, there is a rising trend in employers promising remote work as “bait,” and it underscores the relative power of the employers in the job market.

GHOST NURSING: The 1982 Movie

A young woman nanny plagued with bad luck travels to Thailand to visit a friend. There, her friend suggests a visit to a sorcerer, which results in her adopting a child ghost/demon who begins to protect her, but matters soon go awry.

Impact on the Healthcare Field

This is not a 44 year old science-fiction movie. Medicine and the healthcare industry isn’t immune to the ghost job phantom trend. Some contingent labor or medical staffing agencies lack ethics and post jobs solely to bolster their database, without any intention of filling those roles. This deceptive practice misleads job seekers and wastes their time, further eroding trust in the hiring process.

If you are a nanny or caregiver, you may have your services listed on an online job site. While this is a great way to find work, it can also open you to ghost scams. One phone scam is to send you an offer of employment. The “employer” sends you a check, and asks you to send them some money to buy assistive care items needed for the job. However, the person you are talking to isn’t really interested in you. After you’ve sent the money, the check will bounce and the “employer” will ghost you and disappear. Not only do you not really have a job, you just sent money to a ghost scammer and will not be reimbursed.

Impact on the Finance Field

In finance, ghost jobs can appear for various reasons, such as companies wanting to gauge the labor market, fulfill internal posting policies, or maintain a pool of potential candidates. Consulting roles, including those in financial planning, have seen an increase in ghost jobs, with some firms keeping listings open despite slowing hiring activity. The IRS will never ghost call, but your bank might, which makes it harder to figure out if it’s the real deal; or a ghost scam. Plus, it makes sense that your bank would need to confirm your identity to protect your account. If your bank calls and asks you to confirm if transactions are legitimate, feel free to give a yes or no. But don’t give up any more information than that, says Adam Levin, founder of global identity protection and data risk services firm CyberScout and author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Some scammers rattle off your credit card number and expiration date, then ask you to say your security code as confirmation, he says. Others will claim they froze your credit card because you might be a fraud victim, then ask for your Social Security number.

If someone claiming to be your accountant, insurance agent or financial advisor calls and says you have a computer problem with them, just say no and hang up. No one is ‘watching’ your computer for signs of a virus. And, those scammers won’t fix the problem—they’ll make it worse by installing malware or stealing your account information or even money.

Promoters of cryptocurrency and other investments use complex schemes, often enhanced through deepfake videos or AI-manipulated audio, to lend credibility. According to the FBI’s Internet Crime Complaint Center (IC3), victims reported an estimated $3.9 billion in losses from investment fraud in 2024. Promises of “guaranteed returns” or requests for money transfers via crypto wallets are warning signs.

Many targets lack experience in crypto markets, amplifying risk. Do thorough research, consult official resources (like SEC.gov), and use licensed platforms if investing. Treat “sure thing” tips and unsolicited offers as red flags.

***

The Medical Executive-Post is a  news and information aggregator and social media professional network for medical and financial service professionals. Feel free to submit education content to the site as well as links, text posts, images, opinions and videos which are then voted up or down by other members. Comments and dialog are especially welcomed. Daily posts are organized by subject. ME-P administrators moderate the activity. Moderation may also conducted by community-specific moderators who are unpaid volunteers.

EDUCATION: Books

COMMENTS APPRECIATED

Like, Subscribe and Refer

***

***

QUISHING: Scams Defined

QR Code Cyber Security Scams

SPONSOR: http://www.CertifiedMedicalPlanner.org

By Cloudflare and AI

***

***

What is quishing?

Quishing, or QR phishing, is a cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites or prompt them to download harmful content. The goal of this attack is to steal sensitive information, such as passwords, financial data, or personally identifiable information (PII), and use that information for other purposes, such as identity theft, financial fraud, or ransomware.

This type of phishing often bypasses conventional defenses like secure email gateways. Notably, QR codes in emails are perceived by many secure email gateways as meaningless images, making the users vulnerable to specific forms of phishing attacks. QR codes can also be presented to intended victims in a number of other ways.

MISHING: https://medicalexecutivepost.com/2025/02/28/mishing-a-mobile-first-phishing-technique/

What are QR codes?

QR codes, or Quick Response codes, are two-dimensional barcodes that can be scanned easily with a camera or a code reader application. The main component of a QR code is data storage. QR codes have the capability to store significant amounts of information including URLs, product details, or contact information. Scanning technology allows smartphone cameras or code readers to easily and quickly access the website to which the URL points.

SMISHING: https://medicalexecutivepost.com/2025/01/08/smishing-beware-scams/

How does quishing work?

In a quishing attack, the attackers create a QR code and link it to a malicious website. Typically, the attacker will embed the QR code in phishing emails, social media, printed flyers, or physical objects, and use social engineering techniques to entice the victims. For example, victims might receive an email urging them to access an encrypted voice message via a QR code for a chance to win a cash prize.

Upon using their phones to scan the QR code, victims are directed to the malicious site. The site may prompt victims to enter private information, such as login information, financial details, or personal information. In the example above, the site may request the user’s name, email, address, date of birth, or account login information.

Once this sensitive information is captured, attackers can exploit it for various malicious purposes, including identity theft, financial fraud, or ransomware.

COMMENTS APPRECIATED

Like and Confirm

***

***

SCAM BAITING: Defined

By Staff Reporters

***

***

Scam baiting (or scambaiting) is a form of internet vigilantism primarily used towards advance-fee fraud, IRS impersonation scams, technical support scams, pension scams and consumer financial fraud.

Scambaiters pose as potential victims to waste the time and resources of scammers, gather information useful to authorities, and publicly expose scammers. They may document scammers’ tools and methods, warn potential victims, provide discussion forums, disrupt scammers’ devices and systems using remote access trojans and computer viruses, or take down fraudulent webpages, while some scam baiters simply call scammers to annoy them and waste their time dealing with a scam baiter, therefore allowing scammers less time to scam potential victims.

Some scambaiters are motivated by a sense of civic duty, some simply engage for their own amusement, or a combination of both.

COMMENTS APPRECIATED

Refer and Subscribe

EDUCATION: Books

***

***

SCAMS: Pig Butchering

By Staff Reporters

***

***

What Is a Pig Butchering Scam?

Pig butchering scams get their colorful (and gory) name from the process of fattening hogs before slaughtering them. Except in this case, it’s a scammer making friends with you before taking your money. These cons have four distinct phases:

  1. Initial contact is made by a scammer. The scammers are often enslaved by organized crime rings who force them to contact potential victims through social media platforms, dating apps, online networking sites, and job boards.
  2. Fattening, a phase where the scammer gets to know and builds trust with a victim. They may pretend to be romantically interested in the victim, befriend the victim, or offer the victim a job.
  3. Slaughter refers to the phase where the con pays off. Scammers may persuade victims to send them money, invest in a fake company or cryptocurrency, or reveal sensitive personal information that can be used for identity theft. Over time, scammers ask for large sums of money threatening to end contact if victims refuse to pay.
  4. Shaming and disappearance. Scammers will continue their relationship with the victim until the victim is unable to pay or catches onto the scam. Scammers may taunt their victims to shame them into silence, or they may simply vanish along with any accounts, websites, or apps they’ve been using.

How to Avoid Pig Butchering Scams:

To avoid becoming a victim of a pig butchering type scam, watch for these red flags and know how to protect yourself:

  • Unexpected contact: Never respond to unsolicited messages from unknown contacts, even about seemingly benign topics, especially via text message and on encrypted messaging applications.
  • Refusal to participate in video chats: If someone you’ve been messaging with consistently declines to interact face-to-face, they likely aren’t the person from the profile photo.
  • Request for financial information: Don’t share any personal financial information with individuals you’ve never met in person. If a new virtual friend or romantic connection starts making financial inquiries, put the brakes on the relationship.
  • Invitation to invest in specific financial products: Be wary of any unsolicited investment advice or tips, particularly from someone you’ve only spoken to online and even if they suggest you trade through your own account. Always question what a source has to gain from sharing tips with you and whether the transaction fits with your financial goals and investment strategy.
  • Unknown or confusing investment opportunity: Carefully evaluate the product, as well as the person and/or company requesting your investment. Along with a basic search, try adding words like “scam” or “fraud” to see what results come up. Consider running recommendations by a third party or an investment professional who has no stake in the investment, and use FINRA BrokerCheck to see if the promoter is a registered investment professional.
  • Unfamiliar trading platforms: Do extensive research before moving any money, particularly in an emerging market like cryptocurrency, which has hundreds of exchanges and new avenues for trading continuing to evolve. Who controls the platform? What security measures are in place? How can you withdraw funds if needed? If you don’t know the answers to those questions, don’t put your assets there.
  • Exaggerated claims and elevated emotions: Take a closer look at any investment that offers much higher than average returns or is touted as “guaranteed.” Fraudsters will also often use their knowledge about you to appeal to your emotions—something like, “Don’t you want to have money to send your kids to college?”
  • Sense of urgency about an upcoming news announcement or share price increase: Remember that insider trading is illegal, and you should never trade in shares of a company on the basis of material, nonpublic information.

MORE:

Learn more about how to protect your money from fraud and get more insight from the FBI and the Financial Crimes Enforcement Network (FinCEN) on pig butchering schemes involving cryptocurrency.

If you think you’ve been a victim of a pig butchering stock scam, submit a regulatory tip to FINRA. If you think you’ve been the victim of internet fraud, file a report with the FBI’s Internet Crime Complaint Center.

COMMENTS APPRECIATED

Refer and Subscribe

***

***

SMISHING: Beware Scams!

***

***

Smishing is a form of phishing that uses Short Message Service (SMS), commonly known as text messages, instead of email. Typically, the scammer poses as a legitimate institution, such as a bank, a service provider or a reputed company. The text message they send creates a sense of urgency or threatens consequences if the victim doesn’t respond immediately. It downloads malware on the phone or includes a link to a fraudulent website designed to look like the legitimate organization’s site. When victims reach that site they are tricked into entering their personal information.

Seven Types of Smishing Scams

1. Impersonation Scams: The attacker pretends to be a known organization or individual. The attack could be via a message pretending to be from a bank, government agency or a reputable company.
2. Tech Support Scams: Attackers pose as representatives from tech companies, claiming that the victim’s device or account has been compromised and that they need sensitive data to fix the problem.
3. Account Suspension Scams: These messages claim that an account (bank account, social media or any other service) has been suspended and prompt the victim to verify their identity by providing sensitive information.
4. Missed Delivery Scams: Attackers send messages claiming that the victim has missed a package delivery, and they need to provide personal details or a fee to reschedule the delivery.
5. Prize or Lottery Scams: Messages claiming that the victim has won a prize or a lottery, and they need to provide personal details or make a payment to claim the winnings.
6. Charity Scams: In these attacks, scammers impersonate a charitable organization, asking for donations, usually following a large-scale disaster or during holiday seasons.
7. Malware Link Scams: Messages containing a link, which when clicked, installs malware on the victim’s device, allowing the attacker to steal information or gain control over the device.

Attackers are constantly innovating and finding new ways to exploit human trust, so it’s crucial to be skeptical of any unsolicited or unexpected message that asks for sensitive information or prompts to click a link.

COMMENTS APPRECIATED

Refer and Subscribe

***

***

Stay Alert for Investment Scams Involving Cryptocurrency

By Charles Schwab

***

***

Stay alert for investment scams involving cryptocurrency
 
At Schwab, we’re committed to helping you protect your assets. One way we do that is by raising awareness of the increase in fraudulent investment schemes (“scams”) involving cryptocurrencies and digital assets. While investing involves taking some risks, being scammed shouldn’t be one of them.
What do scams look like? Investment scams target investors by promising quick, guaranteed returns. Although “investment pitches” vary, using fraudulent cryptocurrency investment opportunities to entice targets is a common approach.

Once targeted investors indicate interest, they are often instructed to wire funds abroad or to a third party’s personal account, or to transfer cryptocurrency. Fake websites and/or applications often create the illusion of a legitimate trading or investment platform and gain trust. However, once funds have been transferred, they are difficult to trace and retrieve.
5 Investment Scam Red Flags 
Guaranteed” high investment returns, supposedly with little or no risk, and sounding too good to be true.
Unlicensed or unregistered sellers. Use Investor.gov to check out the background of anyone offering you an investment in securities.
Skyrocketing account values. Investments that appear to rapidly increase in value are often fake.
Fake testimonials. Scammers often pay people to provide fake reviews, so never rely solely on testimonials in making an investment decision.
Fake contacts. Take caution if someone approaches you through social media with an investment opportunity. Pretending to be a friend or to have a mutual acquaintance is a common tactic used to gain trust.

***

COMMENTS APPRECIATED

Thank You

***

MORE: https://medicalexecutivepost.com/2022/02/22/cryptocurrency-trades-and-income-taxes-2021/

IT: https://www.amazon.com/Dictionary-Health-Information-Technology-Security/dp/0826149952/ref=sr_1_5?ie=UTF8&s=books&qid=1254413315&sr=1-5

***

PODCAST: DECEPTIONS, EXPLOITATIONS & SCAMS in Healthcare

32 EXAMPLES

By Eric Bricker MD

***

***

YOUR COMMENTS ARE APPRECIATED.

Thank You

***

***

Risk Management, Liability Insurance, and Asset Protection Strategies for Doctors and Advisors : Best Practices from Leading Consultants and Certified Medical Planners™ book cover

RISK MANAGEMENT: https://www.routledge.com/Risk-Management-Liability-Insurance-and-Asset-Protection-Strategies-for/Marcinko-Hetico/p/book/9781498725989

***

INVESTMENT SCAMS: https://medicalexecutivepost.com/2015/03/29/top-ten-investment-scams/

***