
Scammers prey on Richmonders with missing pets
A new scam is targeting local pet owners who've lost their pet and posted online about it, the Richmond SPCA tells Axios.
Why it matters: This might be the cruelest scam in history.
How it works: Fraudsters are finding online missing pet posts and calling the owners to tell them their pet has been found, but is injured, Richmond SPCA spokesperson Tabitha Treloar tells Axios.
They're using spoofed phone numbers so the call looks like it's coming from the Richmond SPCA.
The scammer, impersonating someone from the shelter, says the injured fur baby needs urgent surgery.
And the shelter, the fraudster says, needs immediate payment via Venmo, Zelle or another payment platform to cover the cost, which is usually thousands of dollars.
What they're saying: "It's really devastating for pet guardians to be targeted this way — people are understandably vulnerable when a pet is missing," Treloar says.
Threat level: It's not just the Richmond SPCA, which has gotten at least four calls from locals targeted by the lost pet scam in recent weeks.
The Richmond Animal League had reports of two identical incidents last month, RAL spokesperson Allana Maiden tells Axios.
Richmond Animal Care & Control posted about three incidents in which its number was spoofed for a similar scam in February.
And it's happening nationwide, according to a post from Professional Pet Tracker, a Virginia-based pet finding service.
Zoom in: In one of the incidents at RAL last month, a couple was told they needed to pay $2,000 to cover surgery for their injured and missing cat, Maiden says.
They negotiated to pay just over $1,000 up front and the rest when they picked up their cat.
When they showed up at the Chesterfield shelter to bring their kitty home, RAL had to break the news: they'd been scammed. And their cat was still missing.
RAL never heard back from them to find out if their bank was able to reverse the charges, or if they found their cat.
The bottom line: No shelter would ask for money to treat a pet over the phone, per their posts.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
3 hours ago
- Yahoo
Four wounded, one killed in southern Virginia shooting
June 2 (UPI) -- Five people were shot, including one person fatally, in a shooting that erupted at a large outdoor gathering in southern Virginia over the weekend, authorities said. According to preliminary information, the early Sunday shooting involved gunmen in a Chrysler sedan and individuals at a party in the 100 block of Carver Drive in Danville, a city of about 42,000 near the Virginia-North Carolina border. The Danville Police Department said in a statement that the shooting occurred shortly before 1:30 a.m. local time Sunday. Officers dispatched to the area following reports of shots fired found a deceased man, later identified as Jay'Shaun Tiejae White, 22, in the front passenger seat of a Chrysler sedan with gunshot wounds to his upper body. Officers found the suspected driver of the vehicle, identified as a 26-year-old man, suffering from a gunshot wound on an adjacent street. The victim was then transported by ambulance to Sovah Health Danville. Three additional victims later arrived on their own at the health center with injuries from the gunfight, the police department said. The victims have been identified as two men, ages 31 and 25, and a 19-year-old woman. The woman has since been treated and released, while the three men have been transferred to other medical facilities, police said. Juwan Montel Baker, 26, of Danville, has been arrested in connection with the shooting. Police said he was a passenger in the sedan, and he has been charged with three counts each of discharging a firearm from a moving vehicle, malicious wounding and use of a firearm in the commission of a felony. According to The Gun Violence Archive, there have been at least 127 mass shootings involving four or more people shot so far in the United States this year.
Yahoo
4 hours ago
- Yahoo
Gloucester County warns residents of fake Virginia DMV scam
GLOUCESTER COUNTY, Va. (WAVY) — The Gloucester County Sheriff's Office is warning citizens of a scam using texts posing as the Virginia Department of Motor Vehicles to target victims. Residents are receiving text messages claiming to be from the Virginia DMV, stating, 'Final Notice: Enforcement Penalties Begin on June 4.' The message included a link for residents to make payments for an outstanding traffic ticket to avoid having their license and vehicle registration suspended. See an example of the text below: GSCO warn the text is a scam and are advising people to ignore the message. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.


Business of Fashion
4 hours ago
- Business of Fashion
Explainer: How Retailers Can Fight a New Wave of Cyberattacks
Last week, Victoria's Secret went dark. On May 28, the lingerie giant shut down its website following a 'security incident,' the company said in a statement. (It did not confirm what caused the disruption). While the site was only down for two days, it likely cost Victoria's Secret millions in sales, adding another hurdle to its ongoing turnaround plan under new leader Hillary Super. The company's stock dropped as much as 8 percent the day it closed its site. It was just the latest technological dustup in a wave of cyberattacks on some of fashion's biggest brands and retailers. Bloomberg reported that in January hackers accessed some of Dior's customer data, then in April, UK-based high street retailer Marks & Spencer was forced to stop taking online orders after a security breach and in May, Harrods briefly restricted website access after hackers attempted to break into its systems. For years, the threat of security breaches — where individuals and organisations hack systems to access customer data such as contact information and credit card details — have haunted companies across industries, from Target to MGM Resorts. The frequency of these attacks is only growing: In 2024, the number of individuals and groups targeting companies' systems that cybersecurity consultancy S-RM engaged with across 600 incidents grew 96 percent year over year. These attacks can be extremely detrimental to a company's bottom line: Marks & Spencer still hasn't reopened its e-commerce operations, and doesn't expect to do so until July. The incident will likely end up costing the company as much as £300 million ($404 million) in lost profits. But the impact can be even further-reaching. Many cyber criminals require companies to pay multi-million dollar ransoms to regain access to their networks and even once the attack is over, retailers must work to avoid sustaining lasting reputational damage. The recent uptick in activity puts an extra burden on retailers to tighten existing cybersecurity processes or invest in additional tools that could chip away at profits. 'From a business perspective, it's nothing if not unfair [to the companies impacted by it],' said Simeon Siegel, managing director and senior analyst of retail and e-commerce at BMO Capital Markets. In the event of a cyber attack, companies have 'to balance short term fixes, while ensuring they don't have [long-term] implications,' he added. BoF breaks down what leaves fashion businesses vulnerable to cyberattacks and how they can protect themselves. How does this happen? Cyberattacks are typically orchestrated by groups that find and exploit a company's technological shortcomings. The culprit can often be difficult to trace, because even when law enforcement tracks them down, individuals can splinter into other smaller organisations. Criminals can also act individually by finding hacking tools on the dark web, said Christian Beckner, vice president of retail technology and cybersecurity at NRF. The tactics range in their level of sophistication. One of the common ways hackers infiltrate a company's systems is through 'phishing' — the dreaded emails where, posing as a company executive, they encourage employees to click a link that, if opened, can give them access to an organisation's entire data network. They can also use employee voice impersonation tools to target a company's customer service call centres, Beckner said. 'If one employee accidentally clicks a link in an email, it may not matter how protected and up-to-date your technology is,' Siegel said. 'Human error can supersede the most advanced technology.' Cyberattackers will target any industry with high transaction volumes, making fashion an appealing target. Plus, because most retail giants operate their e-commerce storefronts on years-old custom platforms that are likely outdated, they are particularly vulnerable, said Juan Pellerano-Rendón, chief marketing officer at e-commerce software start-up Swap. 'A lot of times these larger conglomerates have IT teams, and they're updating their website regularly, but security might not always be at the top of their list,' Pellerano-Rendón added. Retailers that operate with thin margins have historically been slower to invest in cybersecurity over tools like a website redesign that can immediately drive revenue, said Sam Rubin, senior vice president of consulting and threat intelligence for Unit 42 at cybersecurity firm Palo Alto Networks. 'You could spend several million dollars on cybersecurity and feel safer and be safer, but what's going to show up on your P&L is greater operating expenses without a necessarily highly visible tangible benefit,' Rubin said. 'Sometimes that does get neglected in favor of driving top line growth in business.' How should retailers respond? When a company is hacked, they often have no choice but to shut down services until they can find the culprit and boot them out of their network. Preventing an initial cyberattack can be a near impossible task as cyber criminals' tools become more advanced and accessible. Many retailers have increased cybersecurity measures in recent years, specifically around payment processing, Beckner said. Customers' financial information wasn't compromised in many of the recent attacks, which is the scariest violation for many customers and therefore a natural priority for companies to prevent. To lower the risk of repeat offenses, retailers have to 'assess where there might be existing vulnerabilities in your IT systems and services, and patch and upgrade those where they existed,' Beckner added, including adding multi-step authentications for company log-ins and conducting additional training for employees across the organisation. The latest run of cybersecurity hiccups could also push major retailers to make big personnel changes such as hiring heads of security (if they don't have them already), according to Pellerano-Rendón. They might also consider using more e-commerce services from software giants like Shopify that routinely update their software, making it more difficult to infiltrate, he added. Companies can institute drills where they work with third party firms to simulate an attack to better assess the strength of their existing systems and what additional processes they need to implement, said Steve Ross, director of cybersecurity, Americas at S-RM. In the aftermath of an attack, retailers also must do damage control in order to make sure their customers feel safe buying from them again. Shoppers today are aware that technology violations occur and are outside of a company's control, 'and not necessarily that Victoria's Secret or Marks & Spencer has betrayed their trust in any way,' Pellerano-Rendón said. Still, retailers need to tell customers whose personal information may have been compromised exactly which steps they've taken to protect their data down the line. 'It really comes down to making sure you're communicating … and having that plan in place to quickly bounce back,' Beckner said.