Be cautious of deceitful methods scammers employ when selling online.

Personal information theft scammers are lurking.

Be cautious of deceitful methods scammers employ when selling online.
Be cautious of deceitful methods scammers employ when selling online.

Online selling can be convenient as you don't need to search for customers. You can simply post an ad on websites like eBay or Facebook Marketplace and wait for potential buyers to contact you. However, with the ease of online selling comes the possibility of being scammed.

Beware of the Google Voice verification scam, which targets unsuspecting sellers by exploiting their trust and the ease of online communication. Scammers pose as potential buyers and use seemingly innocent requests to gain access to your personal information, with the ultimate goal of hijacking your phone number for fraudulent activities.

A scammer will ask you to share a Google Voice verification code they send you via text, which they will use to create a Google Voice number linked to your phone number. Once they have that, they can use your number for nefarious purposes, such as identity theft.

Allen C., a resident of Island Park, New York, recently shared his story of almost falling victim to the Google Voice scam. In this post, I will discuss the impact of such scams and offer tips on how to safeguard yourself.

Selling on the internet? Beware of sneaky tactics scammers use to trick you
A woman shopping online (Kurt "CyberGuy" Knutsson)

How scammers prey on innocent online sellers

Allen shared his contact number with the person who expressed interest in buying the item on eBay, but she later asked him to share a code.

Allen shared with me that at first he believed it was authentic, but then she requested confirmation of his existence, so she sent him a 6-digit code via Google Voice, which he was supposed to reply with.

"I was puzzled as to why she needed to verify my existence, despite not discussing the product I was selling. Upon further investigation, I discovered that she misspelled words and claimed she didn't receive the return code, which I knew she had. She pleaded with me to allow her to resend it. After conducting research, I concluded that it was most likely a scam."

Just in time, Allen recognized the scam and refused to provide his cell number, subsequently deleting the message.

Selling on the internet? Beware of sneaky tactics scammers use to trick you
A woman shopping online (Kurt "CyberGuy" Knutsson)

What happens when you give the code to scammers

If you give scammers your Google Voice verification code, they can use it to create a Google Voice number linked to your phone number, giving them control over a virtual phone number associated with your real one, which is a serious risk.

Scammers can intercept verification codes sent by banks and financial institutions, which can be redirected to their Google Voice number instead of your phone. This enables scammers to authorize fraudulent transactions, reset passwords, and gain access to your financial accounts, bypassing your security measures.

Scammers can use a number linked to your identity to engage in identity theft. They may open new credit card or loan accounts in your name, impersonate you to access other services that rely on phone verification, and exploit your phone number as a recovery option for various accounts.

Scammers can use Google Voice numbers to carry out additional scams, making it harder for authorities to track their activities.

Scammers can gain control of a number linked to your identity, which gives them a potent weapon that weakens common security measures that use phone verification. This can result in financial losses, harm to your credit score, and a complex procedure for restoring your identity and safeguarding your accounts.

Selling on the internet? Beware of sneaky tactics scammers use to trick you
A woman selling stuff online (Kurt "CyberGuy" Knutsson)

How to reclaim your Google Voice number?

If someone else is using your linked number with another Voice account, you can reclaim it by following these steps.

  • On your computer, go to voice.google.com.
  • Click Settings in the upper right corner.
  • To link a phone number, click on the "New linked number" option and enter the phone number.
  • To confirm your phone number, Google will send a six-digit code. For a mobile number, click "Send Code" to receive the code via text message. If it's a landline, click "Verify by Phone" and then call the number provided.
  • Enter the code and click Verify, then Claim

4 other ways to protect yourself from such scams

Scammers employ a range of tactics beyond using Google Voice to deceive you, including installing malware to steal your data and passwords. To avoid falling victim to these scams, follow these tips.

Be cautious of email scams when selling online. Scammers may use email to try to trick you into clicking on malicious links that can harm your device and steal your data. Avoid clicking on any links or attachments in the email and do not reply to it. You don't need to click any links to sell an item online.

To safeguard yourself from malicious links and potential access to private information, it is recommended to install strong antivirus software on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Here are my top picks for the best 2024 antivirus protection winners for your Windows, Mac, Android, and iOS devices.

Online selling scams often use a sense of urgency or panic to deceive you. Scammers may inform you of an issue with your account, claim that you owe money, suggest a problem with your listing, or offer a prize to trick you.

Be cautious when receiving requests to act quickly and provide personal information or gift cards. Don't let pressure or urgency cloud your judgment. Before responding, take a moment to consider your options and seek advice from someone you trust. Legitimate buyers or platforms will not ask for payment through gift cards, wire transfers, or cryptocurrency.

3) Be cautious of buyer or seller identity verification: When you receive a message or call from someone claiming to be a buyer, a platform representative, or an organization related to your online sale, be cautious. Scammers may use fake names, phone numbers, or email addresses to deceive you. They might also have some information about you, such as your name or listing details, which doesn't necessarily mean they are legitimate. This information could be obtained from public sources or previous scams.

Verify the identity of the person requesting information before providing any personal details. Contact the organization or platform directly using a known, official contact method. Check the organization's website for any alerts or warnings about scams.

Protecting your personal information from scammers and cybercriminals is crucial, even if you're not selling anything online. To do this, consider investing in personal data removal services. By removing your personal information from the web, you reduce the chances of scammers finding and exploiting your details. Additionally, deleting yourself from the internet ensures that scammers cannot access your personal information to call you or make you believe they have some of your credentials, making their scams seem legitimate.

Having a data removal service can be beneficial if you want to consistently monitor and automate the process of removing your information from numerous websites over an extended period of time. Here are my top recommendations for data removal services.

Kurt’s key takeaway

Be cautious when selling items online as it can be easy but comes with risks such as the Google Voice scam. If someone asks for a verification code or personal details during a sale, always verify their legitimacy and use official channels for communication. Use trusted platforms to sell anything online and take steps to protect yourself from identity theft, which can impact your finances for years.

Have you ever been scammed online? Share your experience and what you learned by writing us at Cyberguy.com/Contact.

To receive my tech tips and security alerts, sign up for my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.

Let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

by Kurt Knutsson, CyberGuy Report

tech

A revolutionary device may enable you to identify microplastics in your beverages.

A revolutionary device may enable you to identify microplastics in your beverages.

tech
Become a proficient user of Google Workspace and Microsoft Office.

Become a proficient user of Google Workspace and Microsoft Office.

tech
Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

tech
Human window washers on skyscrapers are being replaced by robots.

Human window washers on skyscrapers are being replaced by robots.

tech
A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

tech
How to safeguard your baby monitor from hackers?

How to safeguard your baby monitor from hackers?

tech
The origin of the bizarre "hello" text messages.

The origin of the bizarre "hello" text messages.

tech
Over 900,000 Medicare beneficiaries are at risk of data breach.

Over 900,000 Medicare beneficiaries are at risk of data breach.

tech
Humans can teach robots to sense human touch without the need for artificial skin.

Humans can teach robots to sense human touch without the need for artificial skin.

tech
Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

tech
Conduct a 5-minute phone privacy audit to prevent spying.

Conduct a 5-minute phone privacy audit to prevent spying.

tech
Scams and people search sites: a dangerous intersection

Scams and people search sites: a dangerous intersection

tech
Reach your destination effortlessly with this advanced self-driving sleep pod.

Reach your destination effortlessly with this advanced self-driving sleep pod.

tech
US political campaigns face increased digital attacks from Iranian hackers.

US political campaigns face increased digital attacks from Iranian hackers.

tech
A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

tech
Four effective strategies for reducing expenses.

Four effective strategies for reducing expenses.

tech