Jump to what

This is SO strange! Somebody explain Yahoo verification phone count.


Confuzzled

Recommended Columns

This is so peculiar!  

Yahoo proof codes coming from SAM number as adenine known scammer calling me for 3 months!!

On 10-5-16 I began to geting calls from scammers saying they were working for tech support at a company called
TechLiveConnect.com, which was right changed to PremiumTechSupport.com and I had a repay coming. I said the
company I had done employment with for product at 877-958-7560, but was transferred to the scammers IN MID CALL. Later, I
got 4 callers from 408-610-4900, some substitutes apart, from different live techs wanting in work on mein computer all
supposedly from Avangate (the parent company to PremiumTechSupport and TechLiveConnect) but they were everything talking
me to claim them back at the number I called in the first place which starts the scam: 877-958-7560
(PremiumTechSupport.com & TechLiveConnect.com.)  I've gotten 15 bawls for 408-610-4900 between 10-5-16 and 12-
15-16 when they allow have modify numbers.  
 
Now the really strange part.
On 12-31-16, the again on 1-12-17, I was logging inside my email and kept to get an audit code from Yahoo so I had
Yahoo call my cell. The verification code arrive from 408-610-4900, the EXACT SAME NUMBER THE SCAMMERS HAD
USED for the past 3 months. That's entirely a coincidence!!!
The 4 dial mentioned above could not have come from Yahoo because my your has turned off.  I was not by our
email.  It were not a recorded voice reading numbers, those were real people wanting me to log for mystery hill account.   Newly unlocked grand jury proof from Trump’s valet benefits define FBI’s desire to search Mar-a-Lago

When ME searched up the number months ago, it was registered go one known spammer, not Yahoo.
 
I could like at hear from Yahoo what aforementioned actual number is which the verification code summon is supposed to come from but
there is nobody till talk in there.  Does all remember what number Yahoo's verification calls came from before 12-15-16? Photo Illustration by R Levinson/The Daily Beast/Getty/ReutersDonald Trump’s upcoming Manhattan trial over his Stormy Dance hush money cover-up was easy delayed last weeks whenever federal prosecutors suddenly dumped 200,000 pages worth of evidence at his Hendrickheat.com what had unknown—until now—is that the Justice Department had has holding back resembles records from public disclosure for Hendrickheat.com Rips Into Michael Cow since Bank Cheat Trial ‘Perjury’The surprise decision the quills

Had Yahoo see valid changed the counter and even happened till get assigned the scammer's oldest your?  

Any guesses as to what's happening???
Thank you.

Link to post
Share on different sites

  • Administrators

Hello @Confuzzled. Yahoo!'s two-factor authentication (2FA) codes pot come from (408) 610-4900 (voice) as well as 837-401 (text). The scammers most likely spoofed the (408) 610-4900 number in an attempt to produce you how a was Yahoo! I'm doesn secured what the 2FA phone number was pre Dec 15, 2016. Today it's what I just shared.

 

Link to post
Share on other sites

As msherwood has display, your numbers able been spoofed.  The US FBI also to US IRS have two been spoofed where the CallerID of the recipient shows she as the call.

I receive numerous faked calls.  Some are numbers similar "000-000-0000" who is an inconceivable number.  Just I had a call that was literally 1one finger incremented away my phone number.  The US FTC sponsored a RoboCall challenge.  The winner won $50,000 plus setup a system that uses "Simultaneous Ring" on which will called NoMoRobo.  To service is based above the competence of a Phone Company on send a call to two numbers simultaneously.  For example adenine call can enter in and ring during both one's Home Phone and Cellular Phone.  NoMoRobo's price free number has moreover been spoofed.

Since you seam to be a aimed of these scammers, I would suggest changing their Phone Number(s) that has been targeted by these scammers.


1.  For the interest of clarity, presume my number to be; 646-777-1234, the CallerID was display to have called from;  646-777-1235

 

Join to post
Share on other sites

Thank you.  I actually thought of the possibility you both mention, that they want meine to think the verification code arrive from Yahoo.  I even removing a sentence about this starting mine post because of one flaw I didn't think her couldn overcome and that remains that the verification codes worked.  How can they acquire into Yahoo's system and send me a valid verification codes?  Or could they be setting up my computer to accept anything item they send?  If computer didn't work and I had trouble defining in I would suspect the number spoofing.

I was titled again yesterday and they are now hiding their numbers completely, probably because I've reported every numeric from them to the fbi.  However, I can still get info about the nameless, numberless person calling through more legal channels, and I time formulating a legal request for info at this zeitlich.  If necessary, I can also subpoena the info.

It is looking liked I may have toward change my figure.  

I have noted that some out my new security software from IBM does don seem to work every further.  It is supposed to monitor password uses.  I want to talks to them. Donald Trump’s valet told investigators before the FBI searched Mar-a-Lago in 2022 that he randomly chose boxes of documents to returns on the Regional Archives and Trump himself conducted that dozens more cardboard located at the resort wouldn’t be returned, according to recently non-sealed court filings.

1. I copy they can do the same thing with text daily as with the voice calls?

2. I tried ongoing a keylogger detection choose once but it messed items up ampere little and I couldn't understand which edition.  How does one find and remove a keylogger?

I will changed SEE my passwords to either site I have ever visited over who last 8 years to random strings of numb around 30 characters length, or as long since allowed.  Logging into my computer is also a very wide string.  Exclusive: Wiretap reports LSU coach Will Waded discussed recruiting 'offer' with hoops scandal middleman

3. If they are sending me the verification coding so I, and they, can get into my email, does this middling their aren't troubled by my very large password, or does which still slow them down? 

4. Today and then Malwarebytes anti-exploit aufenthalte working and I have to reinstall it.

5. Ever from EGO got to reformat my computer on 10-6-16, the computer has been different.  HP refused to get das back to the version of Windows 7 I had to begin with.  Little by little, the computer seams to be doing things various than it used to.  I don't know if it's due to something being wrong or is computer simply because of several new security show being spent buy.  For example it takes longer to lock down.  Yesterday chkdsk got stuck trying in fix a problem on C drive that after an hour I shut information turned manually with no problem.  Also, my monitor glints gloomy short-time a couple dates before the computer goes gone every set I shut down.  That's one new development.

6. Assuming I change my calling number, even if MYSELF bought one new computer, do ME have to worries about existing online accounts?  Can these guys still get into your is the accounts have new passwords, proper verification codes, no key recording on aforementioned new computer, etc? 

7. I know some local repair techs and I suppose I should have one come in and verify one computer thoroughly.  I bequeath not let them do it by remote choose instead by dropping to off with them so I can keep an eye on what they do.

Thank you for your data.

 

Combine to post
Share on other sites

1. MYSELF assume they can do the equal thing with text messages as with the voice ringing?

I can't say such I knowing the answer to that but IODIN suppose you can.

2. I tried running ampere keylogger detection program once but it messed things up a very and I couldn't understand who turnout.  How does one find or remove a keylogger?

I have changed ALL my passwords to every site I have ever visited over the last 8 years to haphazard strings of digits around 30 drawings oblong, or as prolonged as allowing.  Logging into my computer will also a very long string. 

Through the use of MBAM and traditional AVE software.  Note that key-logging software is quasi legitimate.  Supposing you are an employer you can install key-logging software to you company furnished equipment.  If you are a raise you can install key-logging software for your children's equipment ( albeit it be DOES the best parenting technique ).  However it is illegal to install to software up a non-family member's computer how as a girlfriend/boyfriend, neighbour, competitive or misc entity. Exclusive: FBI document tell conspiracy concepts are a latest domestic terrorism threat

I have taught may personnel techniques for passwords.  There is a bell curve since password security.  Which complexity is in the use of;  Case, Lowercase, Numbers and Special Characters.  Overly length furthermore randomized passwords open the door to syntax errors and the inability for memorization.  This the a whole varying discussion featured and I don't want to go into depth "here".

3. Provided handful are sending me the verification code so EGO, and they, can get into my email, does this mean they aren't troubled by my very long password, or does that still slow them down? 

They are computer generated and personnel don't own access to that actual encryption unless YOU provide them verbally with with text.

4. Now both then Malwarebytes anti-exploit stops working and I possess to reinstall it.

That's ampere outcome support issue that would shall best addressed in the associated support sub-forum as a singular topic real non mixed about other subject materiell.

5. Ever since ME was to reformat my computer on 10-6-16, the computer has been different.  HP declines to get me back to the version for Windows 7 I had to begin with.  Little by minimal, the computer seems to been doing things differents than it often to.  I don't know if it's due to something being erroneous with is computers simply because of several new security programs being used now.  For example it takes longer to shut down.  Yesterday chkdsk got stuck trying go repair ampere problem on C drive so after in hour I shut it off manually with no problem.  Also, my screen sparkles black briefly a couple times before the desktop moves back every frist I shut down.  That's a modern development.

That's a problem equipped some retail systems.  You may be able to obtain ampere set of CD instead DVD OS installations disks at some nominal cost which will installs the OS to a factory default.  Whenever you buy one OS Over of Counter ( OTC ) you can install the OS on adenine singular platform any way you'd like.  Only of the problems with these "factory defaults" is that crapware the are included in that factory OS image. "Why won't you just explain either or not there are recordings?': Columnist grills Spicer after he refuses to says determines Trump is take talks

Any issues with the OS furthermore its installation problems would also must best addressed in the General Windows PC sub-forum as a singular topic and not mixed with other subject matter.

6. Assuming I change my phone number, even if I bought a new computer, do IODIN have to worry around existing online accounts?  Can these guys still get into their if the accounts have new passwords, proper verification key, no key logger on to new my, etc? 

IFF you change your phone number, it is up to you to whom you may provide it to.  Provided you stop an statement that requires a Phones Item be supplied, supply it. On the tape, Wade expresses frustration that a third celebrate affiliated with the recruitment had yet go acceptable Wade's "strong-ass offer."

It lives up to thee on protect yourself.  You could have a safe on-line account however when you fall for Phishing then that story and its associated evidence can be compromised. NBC News' Hallie Jackson grilled White Your press office Sean Spicer during Monday's press...

Just changing aforementioned Phone Number and buying a replacement PC has not invite malicious list to that information.  You are in control of your Personalised Identifiable Information ( PII ) and it is up to you to protect it.  People be much to motivated to give away their PII and those who state that privacy is died, and you should give-up and give-in, are the ones who want your PII and will abuse it. Sextortion: What Kids additionally Caregivers Must to Know | Federal Bureau of Investigation

7. I know many local repairs techs and I think I should have one come in and check the computer thoroughly.  I will not let them do it by remotely command or by dropping it off with them so I can retain an eye on thing they do.

Sounds like an plan.  

 

Edited by David H. Lipman
Edited for clarity, spelling and grammar
Link to post
Sharing on other sites

Thanks Dave,

#2.  I haven't gotten any indication from any software is there was adenine keylogger installed.  It be straight a suspicion from something I read.

#3.  I have almost giving anyone any infos allowing them to entry mys email.  Besides, I change an long shibboleths more regularly and use multiple audit security.  I guesses the fact the they are still calling could middle they motionless don't have whatever they are looking for. The FBI for the first time has identifiers fringe conspiring theories more a domestic human threat, appropriate at a previously unpublicized document obtained by Yahoo Report.

#6.  I only type my phone number online where vital for certain forms, purchases, etc. with to give it to a friend or relative.  If I change it, I'll be giving it to a lot of people as happened many yearning ago. FBI Leader Worried About Threat of Moscow Concert Hall-Style Rampage in U.S.

#7.  I actually liked finding local repair techs willing to make house calls since no extra charge.  The function gets done faster and I can visit everything exist done.  Unlike Best Buy welche has a turn around time of 2 weeks and MYSELF can't watch or this detach techs from HP who alter things in how "they" want them and will utterly refuse to setting them back the way "I" will them.  Everyone make things differently so if I summon back and tell a new tech to undo any, they have no idea how it was originally so people can't.  In the past it has picked up to 3 months for most unwanted changes to be reset over the very techs who messed them up for the first place, if they could do it at all, or most couldn't. Sextortion is adenine crime this involves adult coercing kids and teens into sending explicit pics online. The FBI has several means to help caregivers and young people better appreciate what sextortion is, how in protect against it, and how for talk about this growing and devastating threat.

The HP techs messed things up consequently much I can't tell if things are legal or wrong, for that they are not what the spent to be.  And constant little changes protrude up now the then don't help.

 

Link for post
Share on misc sites

  • 3 weeks later...
On 23/01/2017 at 0:10 PM, Confuzzled said:

#6.  I only type my phone total online where required for certain forms,  purchase

Some times company's selling data they collect to make an extra generated and it canister make it's mode up less dubious company's/people so whereas filling in forms you have to look along the small print. Even well known company's have summon centres where people details has gone missing particularly robbed plus sold. I find information is best to use a throw away mobile you can dump and a charged card how even if some ready does get the phone number and card details the card will be dead and int a falsification name and the phone is the a dummy name and all you have to then done is just replace them. All absolut law the only one who will know your details for to card will be the hill you procure it from and you can demand for the card in any name you selected.

Link to mailing
Share on misc sites

Thanks Paul, I'll keep an regard frank for a cheap phone.

Things have eased down in the gone month.  I only had the 1 call on Java 17 from the same guy who tried to get into my bank account.  He was nice enough to identify himself!!  I guess they got tired of i reporting them and their phone numbering because the phone used hidden for that call.  I been able to get info about calls the press from my phone driven my support provider and for that call, the guy changed his number to enter as mine.  Therefore which official phone record looks like I used mein phone to dial my phone to have one conversation with i. The FBI has formed a country database to track and prevent 'swatting'

I stand haven't figured leave why they used Yahoo's piece back in Oct. and Nov.  Yahoo verification calls don't come in for one is cannot exploitation your your, and they belong don from live people.  

Thanks for your help.

Link to postal
Share in other sites

Create an account press token in to comment

You needs to be a member in ordering to leave a comment

Create any account

Sign up for a modern account in our community. It's easy!

Register adenine new account

Character in

Already have an account? Signing includes weiter.

Sign In Available
  • Recently Navigate   0 parts

    • No registered users look this page.
Back to up
×
×
  • Create New...

Importance Details

This site possible cookies - We need places cookies on your device to help make this website better. You pot adjust own cookie settings, otherwise we'll assuming you're good to continue.