Did you get a scary text claiming to be from the Colorado DMV? What to know about scam
A "new wave" of scam text messages impersonating the Colorado Division of Motor Vehicles prompted the agency to alert the public not to comply with the threats.
The text messages claim the recipients have unpaid tickets and threaten things like prosecution, suspension of vehicle registration and revocation of driving privileges, the division stated in a June 4 news release.
The text messages are written as if they were official communication from the division to entice the recipient "into clicking malicious links and divulging personal or financial information under the guise of settling non-existent violations," the division stated in the news release.
"These messages are not from the Colorado DMV. The DMV does not initiate contact via unsolicited text messages to demand payment for tickets or to threaten prosecution or suspension of privileges in this manner," it said.
The Colorado Division of Motor Vehicles says that exact phrasing can vary but the scam texts usually:
"State they are from the 'Colorado DMV' or a similar official-sounding entity."
"Allege outstanding unpaid tickets or violations."
"Threaten imminent legal action, such as prosecution."
"Warn of pending suspension of vehicle registration and/or driving privileges."
"Contain a link to a fake website to 'resolve' the issue or make a payment."
The Colorado Division of Motor Vehicles offered this guidance:
Don't click on links, as they "often lead to fake websites designed to steal your information," the Colorado Division of Motor Vehicle warned.
Don't share personal or financial information, including your driver's license number, Social Security number, credit card information or banking information.
Don't reply.
Contact the Colorado Division of Motor Vehicles directly through its official website, dmv.colorado.gov, or by phone at 303-205-5600. Do not use the contact information listed in the suspicious text.
"If you have not engaged in any activity that would result in a ticket or penalty, it is almost certainly a scam," the news release stated.
If you get one of the fraudulent texts, you can report it to the FBI's Internet Crime Complaint Center, www.ic3.gov, or the Federal Trade Commission, reportfraud.ftc.gov.
Colorado Division of Motor Vehicles said to include the following in your report:
The phone number or email address the message came from.
The website that the text linked to.
This article originally appeared on Fort Collins Coloradoan: Colorado DMV warns public of latest scam text messages
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Tom's Guide
35 minutes ago
- Tom's Guide
New AT&T data leak links previously exposed info to Social Security numbers, birth dates
In a trend that absolutely no one wants to get behind, another older data leak has been paired with additional customer information to get re-released as a new data leak to expose even more customer info and personal details. As reported by BleepingComputer, an old 2021 AT&T data leak which contained millions of phone numbers has been linked with Social Security numbers and birth dates of the individual users. The company has stated that cybercriminals will commonly repackage previously disclosed data for financial aim, which is what they believe is happening here, and that when they learned of the data going up for sale on the dark web they began a full investigation. While the threat actor who leaked the data onto a popular Russian-speaking hacking forum claimed it was the data stolen during the 2024 AT&T 'Snowflake' cyberattack, which is what was initially reported by HackRead. However, after BleepingComputer analyzed the exposed information, the news outlet determined it was actually from the 2021 data leak which was caused by a hacker dubbed 'ShinyHunters.' This is not the first time the 2021 ShinyHunters data has been leaked or even linked to additional personal information. For instance last year, the data was leaked along with names, addresses, mobile phone numbers, encrypted date of birth, encrypted Social Security numbers and more. This leak has cleaned up that data to remove internal AT&T information and added the unencrypted Social Security numbers and dates of birth to each customer record. There are reportedly over 86 million unique records of this nature, with more than 48 million unique phone numbers that have associated customer information. This is due to customers having multiple records with the same phone number being used at different addresses. Not sure if you were one of the customers affected by these breaches? At this point, if you're an AT&T customer, you should be taking steps to see if you've been affected and then to lock down your own data in order to keep yourself safe. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. As with all data breaches, the biggest threat will be phishing attacks and online fraud. Now that hackers can easily figure out your identity, they might try to reach out to you posing as AT&T. That means you'll need to be extra careful when checking your inbox and messages. Avoid clicking on links or downloading attachments from unknown senders as hackers often set up fake pages to steal your credentials, credit card data and other sensitive info. For this reason, you want to go directly to AT&T's page instead of clicking on any links on search results, social media or even ads that claim to take you to it. If you haven't signed up for one of the best identity theft protection services, now might be a good time to look into them. You can also consider putting fraud alerts on your files with the Big Three credit-reporting agencies Equifax, Experian and TransUnion, and even instituting a credit freeze (although doing so can complicate getting a loan or opening new payment accounts). This 2021 data leak seems to be the gift that keeps on giving for hackers, so I wouldn't be surprised if this stolen info is used in future attacks. Don't worry though as we'll be keeping a close eye on this one.
Yahoo
an hour ago
- Yahoo
St. George to crack down on off-highway vehicles after fatal crash kills 9-year-old boy
ST. GEORGE, Utah () — After last month, law enforcement officials said they will start cracking down on the use of off-highway vehicles (OHV) on city streets. Earlier this week, the St. George Police Department saying they were starting a focused enforcement. From neighborhood roads to school zones, police are saying they are seeing more kids and teens riding in places that they shouldn't be. Sgt. Jeremy Needle told ABC4 these vehicles can reach freeway speeds, and officers are seeing them being driven recklessly. After four years of education and awareness for the safe use of OHVs, it was time to start cracking down. 'Now, we're at a point where we will start impounding and issuing citations not only to the juveniles but also to the parents who are allowing this,' Sgt. Jeremy Needles said. Carp chaos at Utah Lake as carp overpopulation becomes serious problem Several laws surround OHVs in St. George. For starters, OHVs, including electric motorcycles, are not allowed on any city streets, trails or sidewalks. Other laws include: Unlicensed individuals under the age of 18 must have direct supervision from an adult within 300 feet. All drivers must have an OHV Education Certificate from the State to operate an OHV. All OHVs must be registered with the DMV. Sgt. Needle said that while some parents may not be aware of the laws when it comes to using an OHV, he said ignorance isn't a defense. 'The first thing that a parent should do when they buy these types of devices is know the law,' said Needle. 'It's your responsibility as a parent to know the laws that are applicable to the devices you're buying. If you don't know those and you just let your kid go out and ride these things, you could get in trouble. Not to mention, it could cost your child's life.' Just last month, a 9-year-old boy was riding a scooter through his St. George neighborhood when . The 9-year-old was airlifted to a Las Vegas hospital in critical condition but later died from his injuries. Brigham City Peach Days vendors now free to sell beverages, Coca-Cola partnership is ended So, at the end of the day, St. George Police said cracking down on golf carts is not about ruining anyone's fun – it's about keeping everyone safe. 'Safety is paramount to us, and we don't have to tell any parent their child has passed away because they were improperly riding one of these devices,' said Needle. While St. George begins cracking down on the use of OHVs on its city streets, a city along the Wasatch Front the use of golf carts on residential roads. In early May, the Highland City Council in Utah County voted 4-1 to allow golf carts on 25 mph roads in the city. Similar to St. George, Highland has strict laws surrounding the use of golf carts on city roads, including no driving after dark, and drivers must be at least 18 years of age. St. George to crack down on off-highway vehicles after fatal crash kills 9-year-old boy Musk offers peace signal to Trump after all-out verbal war Scattered showers, thunderstorms for Utah's Friday, toasty weekend to follow Trump and Musk feud explodes in public view Race heats up to replace Connolly on powerful Oversight panel Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Yahoo
5 hours ago
- Yahoo
This Glitchy, Error-Prone Tool Could Get You Deported—Even If You're a U.S. Citizen
Sign up for the Slatest to get the most insightful analysis, criticism, and advice out there, delivered to your inbox daily. Juan Carlos Lopez-Gomez, despite his U.S. citizenship and Social Security card, was arrested on April 16 on an unfounded suspicion of him being an 'unauthorized alien.' Immigration and Customs Enforcement kept him in county jail for 30 hours 'based on biometric confirmation of his identity'—an obvious mistake of facial recognition technology. Another U.S. citizen, Jensy Machado, was held at gunpoint and handcuffed by ICE agents. He was another victim of mistaken identity after someone else gave his home address on a deportation order. This is the reality of immigration policing in 2025: Arrest first, verify later. That risk only grows as ICE shreds due process safeguards, citizens and noncitizens alike face growing threats from mistaken identity, and immigration policing agencies increasingly embrace error-prone technology, especially facial recognition. Last month, it was revealed that Customs and Border Protection requested pitches from tech firms to expand their use of an especially error-prone facial recognition technology—the same kind of technology used wrongly to arrest and jail Lopez-Gomez. ICE already has nearly $9 million in contracts with Clearview AI, a facial recognition company with white nationalist ties that was at one point the private facial recognition system most used by federal agencies. When reckless policing is combined with powerful and inaccurate dragnet tools, the result will inevitably be more stories like Lopez-Gomez's and Machado's. Studies have shown that facial recognition technology is disproportionately likely to misidentify people of color, especially Black women. And with the recent rapid increase of ICE activity, facial recognition risks more and more people arbitrarily being caught in ICE's dragnet without rights to due process to prove their legal standing. Even for American citizens who have 'nothing to hide,' simply looking like the wrong person can get you jailed or even deported. While facial recognition's mistakes are dangerous, its potential for abuse when working as intended is even scarier. For example, facial recognition lets Donald Trump use ICE as a more powerful weapon for retribution. The president himself admits he's using immigration enforcement to target people for their political opinions and that he seeks to deport people regardless of citizenship. In the context of a presidential administration that is uncommonly willing to ignore legal procedures and judicial orders, a perfectly accurate facial recognition system could be the most dangerous possibility of all: Federal agents could use facial recognition on photos and footage of protests to identify each of the president's perceived enemies, and they could be arrested and even deported without due process rights. And the more facial recognition technology expands across our daily lives, the more dangerous it becomes. By working with local law enforcement and private companies, including by sharing facial recognition technology, ICE is growing their ability to round people up—beyond what they already can do. This deputization of surveillance infrastructure comes in many forms: Local police departments integrate facial recognition into their body cameras, landlords use facial recognition instead of a key to admit or deny tenants, and stadiums use facial recognition for security. Even New York public schools used facial recognition on their security camera footage until a recent moratorium. Across the country, other states and municipalities have imposed regulations on facial recognition in general, including Boston, San Francisco, Portland, and Vermont. Bans on the technology in schools specifically have been passed in Florida and await the governor's signature in Colorado. Any facial recognition, no matter its intended use, is at inherent risk of being handed over to ICE for indiscriminate or politically retaliatory deportations. At state and local levels, however, there is a way to fight back. For example, there is a package of 'Ban the Scan' bills in the New York State Legislature and New York City Council to curb the use of facial recognition: by police (S5609/A1045), by landlords (A6363 and Intro. 425), by public accommodations (A6211 and Intro. 217), and to make permanent the ban on its use in schools (S3827/A6720). And while New York, the most surveilled city in the country, has the opportunity to lead the way, legislative protections against the risks of facial recognition must proliferate nationwide to fully protect our communities. The only way to completely prevent Trump—or any future authoritarian—from allowing this tech to do his and ICE's bidding is to prevent the use of facial recognition in the first place. Because of the immense power of facial recognition to target political enemies and indiscriminately deport any of us, and because the system's racially biased inaccuracy is already causing wrongful arrests, banning facial recognition is an essential step toward preventing authoritarian overreach. The New York State Legislature can and should pass the Ban the Scan package of facial recognition bills, and the rest of the country should follow suit in protecting communities from this force multiplier for tyranny.