Connect with us

News

E-ZPass Phishing Scams Surge as Scammers Target Drivers Through iMessage and SMS

Published

on

<p class&equals;"" data-start&equals;"334" data-end&equals;"514">A flood of scam texts mimicking toll agencies like E-ZPass and FasTrak is hitting phones across the U&period;S&period;&comma; as fraudsters ramp up efforts to steal personal and financial information&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"516" data-end&equals;"880">The wave of phishing messages has reached a new level of persistence&period; Victims report receiving several messages a day&comma; often filled with fake urgency about overdue tolls or threatened license suspensions&period; And these aren’t your typical spam — they&&num;8217&semi;re cleverly designed&comma; bypassing anti-spam filters and using official-sounding language to reel in unsuspecting users&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"882" data-end&equals;"934">Scammers Are Getting Smarter&comma; and More Aggressive<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"936" data-end&equals;"1236">What’s scary isn’t just the content — it’s how slick the whole thing is&period; Messages look like they’re from E-ZPass or even the DMV&period; They hit your phone with statements like&comma; &OpenCurlyDoubleQuote;Your toll payment must be settled by April 4&comma; 2025&comma;” and throw in threats of suspended driving privileges to push you to click&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1238" data-end&equals;"1338">And they don’t stop at one&period; Some users report getting up to seven of these messages in a single day&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1340" data-end&equals;"1557">These aren’t just regular SMS blasts either&period; Most of them are sent using encrypted messaging like iMessage or RCS&comma; which not only masks the sender but helps evade standard filters that would normally catch this stuff&period;<&sol;p>&NewLine;<p data-start&equals;"1340" data-end&equals;"1557"><a href&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;04&sol;ezpass-phishing-scam-text-example&period;jpg"><img class&equals;"aligncenter size-full wp-image-57174" src&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;04&sol;ezpass-phishing-scam-text-example&period;jpg" alt&equals;"ezpass phishing scam text example" width&equals;"828" height&equals;"590" &sol;><&sol;a><&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"1559" data-end&equals;"1601">Why This Scam Works — and Keeps Growing<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"1603" data-end&equals;"1764">Let’s be real&colon; most of us have used toll roads&comma; and most of us don’t keep tabs on every single bill&period; That’s what makes this scam hit so hard&period; It feels plausible&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1766" data-end&equals;"1870">Scammers are exploiting that uncertainty — and they’ve made some technical tweaks too&period; The messages now&colon;<&sol;p>&NewLine;<ul data-start&equals;"1872" data-end&equals;"2112">&NewLine;<li class&equals;"" data-start&equals;"1872" data-end&equals;"1936">&NewLine;<p class&equals;"" data-start&equals;"1874" data-end&equals;"1936">Come from random email addresses&comma; making them harder to trace&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1937" data-end&equals;"2002">&NewLine;<p class&equals;"" data-start&equals;"1939" data-end&equals;"2002">Prompt users to reply so that iMessage enables clickable links&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"2003" data-end&equals;"2109">&NewLine;<p class&equals;"" data-start&equals;"2005" data-end&equals;"2109">Direct you to fake websites that look nearly identical to the real thing — only the URL gives them away&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p class&equals;"" data-start&equals;"2113" data-end&equals;"2285">This phishing page doesn’t even load on a desktop&period; It’s mobile-only&period; Which&comma; honestly&comma; is a smart move on the scammers&&num;8217&semi; part — most people open texts on their phones anyway&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"2287" data-end&equals;"2340">The Toll of a Growing Phishing-as-a-Service Market<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"2342" data-end&equals;"2489">There’s another layer to all this — a darker one&period; These scams aren&&num;8217&semi;t just one-off efforts by solo cybercriminals&period; They&&num;8217&semi;re part of something bigger&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2491" data-end&equals;"2758">Security researchers have tied some of these messages to platforms like Lucid and Darcula — services that specialize in phishing-as-a-service &lpar;PhaaS&rpar;&period; Think of them like the Shopify for scammers&colon; offering templates&comma; tools&comma; and messaging systems to bad actors&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2760" data-end&equals;"2789">These platforms are built to&colon;<&sol;p>&NewLine;<ul data-start&equals;"2791" data-end&equals;"2924">&NewLine;<li class&equals;"" data-start&equals;"2791" data-end&equals;"2825">&NewLine;<p class&equals;"" data-start&equals;"2793" data-end&equals;"2825">Automate massive message blasts&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"2826" data-end&equals;"2876">&NewLine;<p class&equals;"" data-start&equals;"2828" data-end&equals;"2876">Send encrypted messages that avoid carrier fees&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"2877" data-end&equals;"2924">&NewLine;<p class&equals;"" data-start&equals;"2879" data-end&equals;"2924">Help scammers track engagement and responses&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p class&equals;"" data-start&equals;"2926" data-end&equals;"3083">A recent report linked Lucid to similar campaigns&comma; though no direct confirmation ties them to this E-ZPass wave&period; Still&comma; the mechanics are strikingly similar&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"3085" data-end&equals;"3145">FBI Raised the Alarm Last Year&comma; But It’s Not Slowing Down<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"3147" data-end&equals;"3345">This scam isn&&num;8217&semi;t exactly new&period; The FBI flagged it in April 2024&comma; issuing guidance for people who might receive suspicious toll messages&period; But here’s the thing — despite the warning&comma; it’s worse now&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3347" data-end&equals;"3542">Part of the issue&quest; These messages keep changing&period; The urgency&comma; the phrasing&comma; even the toll agency being impersonated — all of it shifts constantly&period; It’s hard to pin down&comma; and even harder to block&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3544" data-end&equals;"3630">Here’s what a few real examples look like&comma; according to reports from BleepingComputer&colon;<&sol;p>&NewLine;<ul data-start&equals;"3632" data-end&equals;"3794">&NewLine;<li class&equals;"" data-start&equals;"3632" data-end&equals;"3730">&NewLine;<p class&equals;"" data-start&equals;"3634" data-end&equals;"3730">&OpenCurlyDoubleQuote;You have an unpaid toll balance&period; Failure to pay by 04&sol;04&sol;25 will result in license suspension&period;”<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"3731" data-end&equals;"3794">&NewLine;<p class&equals;"" data-start&equals;"3733" data-end&equals;"3794">&OpenCurlyDoubleQuote;E-ZPass&colon; Pay now to avoid late fees&period; Click the secure link&period;”<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p class&equals;"" data-start&equals;"3796" data-end&equals;"3929">Even the URLs are crafted to mimic toll authority sites&comma; swapping in slight changes that are easy to miss if you&&num;8217&semi;re scanning quickly&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"3931" data-end&equals;"3983">How to Protect Yourself — and What to Avoid Doing<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"3985" data-end&equals;"4211">If you get one of these messages&comma; don’t panic — but don’t interact with it either&period; The FBI recommends filing a complaint at IC3&period;gov&comma; but there are also some quick practical steps you can take right away&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"4213" data-end&equals;"4318">First things first&comma; don’t reply&period; Responding&comma; even to say &OpenCurlyDoubleQuote;Stop&comma;” just confirms your number is active&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"4320" data-end&equals;"4374">Here’s what cybersecurity experts say you <em data-start&equals;"4362" data-end&equals;"4370">should<&sol;em> do&colon;<&sol;p>&NewLine;<ul data-start&equals;"4376" data-end&equals;"4599">&NewLine;<li class&equals;"" data-start&equals;"4376" data-end&equals;"4416">&NewLine;<p class&equals;"" data-start&equals;"4378" data-end&equals;"4416">Block the number or email address&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"4417" data-end&equals;"4466">&NewLine;<p class&equals;"" data-start&equals;"4419" data-end&equals;"4466">Report it to Apple if it came via iMessage&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"4467" data-end&equals;"4518">&NewLine;<p class&equals;"" data-start&equals;"4469" data-end&equals;"4518">Delete the message without clicking anything&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"4519" data-end&equals;"4599">&NewLine;<p class&equals;"" data-start&equals;"4521" data-end&equals;"4599">Check your actual toll account by logging into the official site directly&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p class&equals;"" data-start&equals;"4601" data-end&equals;"4686">Just for context&comma; here’s a quick comparison of scam signs vs legit toll agency texts&colon;<&sol;p>&NewLine;<div class&equals;"overflow-x-auto contain-inline-size">&NewLine;<table data-start&equals;"4688" data-end&equals;"5362">&NewLine;<thead data-start&equals;"4688" data-end&equals;"4800">&NewLine;<tr data-start&equals;"4688" data-end&equals;"4800">&NewLine;<th data-start&equals;"4688" data-end&equals;"4712">Feature<&sol;th>&NewLine;<th data-start&equals;"4712" data-end&equals;"4757">Scam Texts<&sol;th>&NewLine;<th data-start&equals;"4757" data-end&equals;"4800">Real Toll Agency Messages<&sol;th>&NewLine;<&sol;tr>&NewLine;<&sol;thead>&NewLine;<tbody data-start&equals;"4913" data-end&equals;"5362">&NewLine;<tr data-start&equals;"4913" data-end&equals;"5025">&NewLine;<td>Sender<&sol;td>&NewLine;<td>Random email or unknown contact<&sol;td>&NewLine;<td>Official toll agency or short code<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"5026" data-end&equals;"5138">&NewLine;<td>Link URL<&sol;td>&NewLine;<td>Suspicious domain &lpar;e&period;g&period;&comma; ezpass-pay&period;net&rpar;<&sol;td>&NewLine;<td>Verified domain &lpar;e&period;g&period;&comma; ezpassny&period;com&rpar;<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"5139" data-end&equals;"5250">&NewLine;<td>Language<&sol;td>&NewLine;<td>Threatening&comma; urgent<&sol;td>&NewLine;<td>Informative&comma; clear<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"5251" data-end&equals;"5362">&NewLine;<td>Response Prompt<&sol;td>&NewLine;<td>Asks for replies to activate links<&sol;td>&NewLine;<td>No replies needed<&sol;td>&NewLine;<&sol;tr>&NewLine;<&sol;tbody>&NewLine;<&sol;table>&NewLine;<&sol;div>&NewLine;<h2 class&equals;"" data-start&equals;"5364" data-end&equals;"5401">So Why Hasn’t It Been Stopped Yet&quest;<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"5403" data-end&equals;"5512">The short answer&quest; It’s complicated&period; The scammers are exploiting the way modern messaging platforms are built&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5514" data-end&equals;"5718">iMessage&comma; for instance&comma; disables links from unknown senders — but if you respond&comma; the app assumes you trust them&period; That’s how the link suddenly becomes clickable&period; It’s a loophole&comma; and the bad guys know it&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5720" data-end&equals;"5923">There’s also the fact that encrypted messaging means these campaigns are tougher to trace&period; Unlike old-school SMS scams&comma; there’s no easy digital breadcrumb trail for telecoms or law enforcement to follow&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5925" data-end&equals;"6076">One cybersecurity analyst BleepingComputer spoke to summed it up&colon; &OpenCurlyDoubleQuote;They’re organized&comma; they’re evolving&comma; and the barrier to entry has never been lower&period;”<&sol;p>&NewLine;

An engineering graduate, Harry turned to writing after a couple of years of experience in core technology field. At The iBulletin, Harry covers latest updates related to trending apps & games on the app store.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

TRENDING