info@cyberwyoming.org
www.wyocan.org
www.cyberwyoming.org
307-223-1265, PO Box 2332, Laramie, WY 82073

Texted Tickets? DMV Impersonation Scam Alert:

A Wyoming resident received a fraudulent text impersonating the “Wyoming DMV”. The message claimed the recipient had an unpaid parking citation and threatened vehicle registration suspension, driver’s license suspension, additional fees, and legal or credit consequences. It instructed the recipient to pay through an “official” link that appeared to be a Wyoming government site within the URL but actually used a “[dot]bond” domain. CyberWyoming Note: Reports of these scam text messages are increasing across Wyoming. Do not click links, reply, or provide personal information. The real Wyoming Department of Transportation (WYDOT) has put out a warning saying that they do not send such texts, collect ticket fees, call itself “the DMV,” or use foreign phone numbers. Always verify driver license or ticket information through official WYDOT Driver Services websites: http://www.dot.state.wy.us/driverservices and mvds.onewyo.gov. Suspicious messages can be reported to the FTC via WYDOT’s scam alert page: https://www.dot.state.wy.us/home/news_info/scam-watch.html.

Google Meet Gamble:

A Laramie resident received a phishing email disguised as a Google Meet invitation. The email appeared legitimate but came from a suspicious .net domain instead of Google. It included typical Google Meet details such as a meeting link, phone number, PIN, and RSVP options, making it look authentic. The subject referenced a project update scheduled that day, and the email even mimicked Google Calendar formatting. CyberWyoming Note: This scam has been reported by multiple people, including several within the same organizations and households. After investigation, all links in the email were found to redirect to a cloud alerting services domain, which is unusual. Searching the sender’s email revealed it is associated with a phishing scam exploiting Google Calendar to steal credentials or financial information. Legitimate Google Meet invitations come directly from the organizer’s email address or from calendar-notification@google.com. Recipients are advised not to click any links, verify invitations with the organizer through trusted channels, report suspicious messages, and ensure two-factor authentication is on all Google accounts.

Texts Targeting Job Seekers:

A Laramie resident received a scam text from a (346) Texas area code. The message contained only an image ad featuring a stock photo of a worker, claiming to be from an Indeed recruiter. It offered multiple remote positions with flexible hours, daily wages of $100–$500, and a guaranteed weekly minimum of $1,000. CyberWyoming Note: Avoid clicking on links or responding to unsolicited job offers, especially those promising unusually high pay. Legitimate recruiters rarely contact candidates via text ads. Always verify job postings directly on official company websites.

Why Platforms Keep Failing Fraud Victims:

Online platforms often fail to protect fraud victims because their automated systems struggle to detect sophisticated scams, reporting tools remove crucial context, and fraud prevention is deprioritized compared to engagement-driving features. Section 230 of the U.S. Communications Act shields platforms from liability for user-generated content, creating a structural misalignment: platforms face little legal risk for scams, so investment in detection is inconsistent. Repealing Section 230 could backfire, leading to over-censorship and fewer survivor-safe spaces. Experts suggest conditional immunity, transparency, and trauma-informed reporting as better solutions, shifting incentives so platforms must actively prevent fraud rather than leaving victims to bear the burden.
– Brought to you by FightCybercrime.org
https://fightcybercrime.org/blog/why-platforms-keep-failing-fraud-victims-and-what-section-230-has-to-do-with-it/

Iran-linked Hackers Claim Responsibility for Attack on US Medical Device Maker Stryker:

An Iranian-linked hacking group called Handala claimed responsibility for a disruptive cyberattack on U.S. medical device company Stryker, causing system outages and access limitations, though the company said the incident is contained and not linked to ransomware or malware. The attack reportedly wiped some devices and appeared alongside the group’s logo on login pages, though this wasn’t independently verified. The incident comes amid rising tensions and fears of Iranian cyber retaliation following U.S.-Israeli airstrikes, with experts warning it reflects a growing trend of destructive cyber operations tied to geopolitical conflicts.
– Brought to you by Reuters
https://www.reuters.com/technology/stryker-shares-fall-after-report-suspected-iran-linked-cyberattack-2026-03-11/

FBI Investigating Hack on its Wiretap and Surveillance Systems:

The FBI is investigating a reported hack into its internal networks, with sources saying the breach affected systems used to manage wiretaps and foreign intelligence surveillance warrants. While the agency confirmed it detected and responded to suspicious activity, it has not shared further details. The incident comes amid a broader wave of cyberattacks on U.S. institutions and companies, including past breaches linked to Chinese and Russian hackers targeting government agencies, courts, and major telecommunications firms such as AT&T and Verizon.
– Brought to you by TechCrunch
https://techcrunch.com/2026/03/05/fbi-investigating-hack-on-its-wiretap-and-surveillance-systems-report/

Interested in cybersecurity business training?

The Made Safe™ Cybersecurity Training Program is a one-on-one program designed specifically for micro-businesses to reduce cyber risk and relieve anxiety around cybersecurity. Thanks to CyberWyoming’s members and sponsors, scholarships are available for Wyoming companies. Learn more at https://cyberwyoming.org/cyber-training/ or email info@cyberwyoming.org.

MS-ISAC and CISA Patch Now Alert:

The Multi-State Information Sharing and Analysis Center (MS-ISAC) or the Cybersecurity & Infrastructure Security Agency (CISA) has published a patch now (update your software) alert for Google Chrome. If you use this product, make sure the software (or firmware) is updated.

Data Breaches in the News:

Stryker, Michelin Tire, Roblox, Telus Digital, and Intuitive Surgical. Note: If you have an account with these companies, be sure to change your password and consider placing a credit freeze on your accounts through the three credit reporting agencies: TransUnion, Experian, and Equifax.

Please report scams you may experience to phishing@cyberwyoming.org to alert your friends and neighbors.

Other ways to report a scam:

  • File a complaint with the Federal Trade Commission at reportfraud.ftc.gov
  • Get steps to help at www.IdentityTheft.gov
  • Report your scam to the FBI at www.ic3.gov/complaint
  • Reported unwanted calls to the Federal Trade Commission’s Do Not Call Registration. Online at donotcall.gov/report.html or call 1-888-382-1222, option 3
  • Office of the Inspector General: oig.ssa.gov
  • If you believe someone is using your Social Security number, contact the Social Security Administration’s (SSA) fraud hotline at 1-800-269-0271.
  • AARP Fraud Watch Network (any age welcome) Helpline 877-908-3360
  • IRS: report email scams impersonating the IRS to phishing@irs.gov
  • Call the Wyoming Senior Medicare Patrol (SMP) for assistance with potential Medicare fraud, abuse, or errors at 1 800 856-4398
  • Victim Support: The AARP Fraud Watch Network and Volunteers of America (VOA) created a new, free program to provide emotional support for people impacted by a scam or fraud, called ReST. Visit www.aarp.org/fraudsupport to learn more about the free program and register

Other Blogs