- Spies, Lies & Cybercrime
- Posts
- 47: Beware Back To School Cyber Scams!
47: Beware Back To School Cyber Scams!
Spies, Lies & Cybercrime by Eric O'Neill
In This Issue
Title Story: I walk you through the five most dangerous scams making the rounds this school year. Each one is a trap. But don’t worry—I’ll show you how to beat them, spy hunter style.
Cybersecurity Tip of the Week: How to spot a fake website like a spy hunter.
Cybersecurity Breach of the Week: An ordinary suburban home in Arizona became the hub of a high-tech spy ring that allowed North Korean spies to infiltrate US companies.
Appearance of the Week: Two for you this week! Spend a day in my life as I prepare for my new book release AND watch my interview on morning news about online scams.
Tech of the Week: Check out my friend Dave Balcar’s new game Ctrl-Alt-Destruct.
Title Story
Beware Back To School Cyber Scams!

The School Year’s Real Pop Quiz: Can You Outsmart These Cyber Scams?
Lena thought she’d scored the deal of the year. Her 14-year-old son, Marcus, needed a new laptop for high school, and the “Back-to-School Mega Sale” site promised a top-brand model for half the price—today only. The site looked polished. The countdown clock ticked. She clicked “Buy Now,” convinced she’d outsmarted the retail markup game.
Two weeks later, Marcus was still borrowing a friend’s Chromebook, the “customer service” email bounced back, and Lena’s bank flagged three suspicious charges—one for an online casino in Malta.
That’s how scammers operate: fast, convincing, and gone without a trace.
Backpacks are packed, pencils are sharpened, and parental stress is peaking. It’s officially back-to-school season. But while you’re navigating drop-off logistics and trying to remember every kid’s schedule, guess who’s already done their homework?
Cybercriminals.
They love chaos. They love urgency. And they especially love you—frazzled, distracted, and one click away from handing over your identity.
Welcome to your cybersecurity briefing. Below are the five most dangerous scams making the rounds this school year. Each one is a trap. But don’t worry—I’ll show you how to beat them, spy hunter style.
1. The Fake Shopping Frenzy
Think Like a Spy:
It starts with a deal you can’t ignore—“40% OFF SCHOOL SUPPLIES—TODAY ONLY!” The site looks real. The deals seem perfect. And it’s just what your kid needs. So you enter your credit card number and hit “Order.” Then… nothing. The supplies never come. But your financial info? That’s already in the hands of someone with a ski mask and a VPN.
Act Like a Spy Hunter:
If it’s too good to be true, it’s probably already being sold on the dark web. Stick to retailers you know. Look for https in the URL, avoid paying with Venmo or wire transfer, and always—always—Google the store before you buy. Bonus points if you check for typos in the URL. “Stapples” isn’t a discount version of “Staples”—it’s a digital mugger.
2. The Phantom School Official
Think Like a Spy:
You get a call from the school. Apparently, tuition is late, and your kid may be dropped from classes—or worse, band. The caller ID matches the school’s main line. Panic sets in. You give them your credit card number. The voice on the other end thanks you… and promptly disappears.
That wasn’t the school. That was someone spoofing their number and impersonating an official.
Act Like a Spy Hunter:
Never give out payment info during an unsolicited call. Hang up. Look up the school’s real number and call them yourself. Real administrators don’t demand instant payment under threat of expulsion. Cybercriminals do.
3. The “Helpful” Tutor Trap
Think Like a Spy:
You’re scrambling to find someone to help your kid with Algebra II. You find a promising tutor on social media or an online forum. They ask for upfront payment. Then more money. Then they ghost you. Or worse, they accuse your kid of cheating and demand hush money.
My sympathies—you just got extorted by a fake homework helper.
Act Like a Spy Hunter:
Vet every tutor like you’re hiring for the CIA. Use verified platforms with reviews and protection policies. Don’t pay through sketchy links or agree to help from some “Math Wizard” you met in a Facebook comment thread. And if they threaten you? Report them. Then block them like your life depends on it.
4. The Social Media Overshare Trap
Think Like a Spy:
First-day-of-school photos are a rite of passage. But when you post that pic of little Jimmy holding a chalkboard sign with his full name, teacher, school, and favorite food… you’re also uploading answers to common security questions.
To a hacker, that photo is better than a cheat sheet.
Act Like a Spy Hunter:
Post the outfit, not the data. Leave the school name and classroom number off the internet. Keep the chalkboard signs for the fridge. Identity thieves love this stuff. Don’t gift wrap it for them.
5. The Student Tax Scam
Think Like a Spy:
The call is urgent. It’s the IRS. A “student tax” hasn’t been paid, and jail is looming. They tell you to pay now—preferably with gift cards or a wire transfer.
Let me say this clearly: There is no student tax. But there is a very real scam going around pretending there is.
Act Like a Spy Hunter:
The IRS does not call you. They don’t ask for gift cards. And they sure as hell don’t threaten to arrest your kid over the phone. Hang up. Report the call. And if you’re worried, go straight to the official IRS website to verify your status.
Final Mission Debrief
Lena didn’t lose hundreds because she didn’t care—she lost them because she was juggling schedules, supply lists, and the chaos of a new school year. That’s exactly when scammers pounce.
Criminals aren’t showing up with ski masks and lockpicks anymore. They’re sliding into your inbox with fake scholarship offers, DMing your teen a “job opportunity,” or impersonating school tech support. And during the back-to-school hustle, we’re all more likely to fall for it.
So remember, if what you see online is too good to be true, it’s almost certainly a scam.
Treat every unexpected email, call, or offer like a potential trap. Teach your kids the same. Think like a spy, act like a spy hunter—and you won’t just pass the test. You’ll ace it.
Cybersecurity Tip of the Week
How to Spot a Fake Website Like a Spy Hunter

Can you spot a fake website?
Fake websites are the digital equivalent of a con artist in a tailored suit—polished enough to look trustworthy, but built to strip you of your personal and financial data. The best spy hunters know that what’s missing is often more telling than what’s in plain sight. That’s why you should inspect every URL like it’s a forged passport, watch for sites that behave like street hustlers (pop-ups, redirects, flashing urgency), and run suspicious links through your own intel tools like VirusTotal or Google’s Transparency Report.
And don’t let a shiny padlock icon lull you into handing over sensitive info—cybercriminals use HTTPS too. Instead, dig into the site’s backstory: search the company name, scan for legitimate reviews, and check if it leaves a real footprint. Real businesses leave trails. Fake ones leave traps. Think like a spy, act like a spy hunter, and you’ll spot the scam before it spots you.
Cybersecurity Breach of the Week
North Korea’s AI-Powered “Laptop Farm” Blitz
An ordinary suburban home in Arizona became the hub of a high-tech spy ring. Christina Chapman—orchestrator of what the DOJ dubbed a “laptop farm”—helped North Korean operatives pose as remote IT workers for over 300 U.S. companies, using stolen identities and fake résumés. Authorities seized 90 laptops, and Chapman—now facing 8 years in prison—helped funnel an estimated $17 million to the DPRK.

Spies in the strangest places
CrowdStrike’s 2025 Threat Hunting Report reveals this isn’t a one-off—it’s a growing battleground. In the year ending June 30, they investigated 320+ cases of North Korean operatives securing remote jobs via fraud—a staggering 220% increase year-over-year. These fraudsters harnessed generative AI to automate everything—from crafting résumés and LinkedIn profiles to deepfaking video interviews and coding assignments. Many juggle multiple jobs simultaneously, using AI to stay ahead.
The Bigger Picture
This threat extends far beyond one scheme. Global firms—including Fortune 500s—now acknowledge they’ve likely hired at least one North Korean IT operative unknowingly.
Remote work opens doors—but so do bad actors. When AI meets espionage, your next remote hire might be a well-disguised operative. Don’t just fill positions—question them.
Appearance of the Week
Spend a day with me as I prepares for the launch of my new book Spies, Lies, and Cybercrime available on October 7, 2025 wherever books are sold (or listened to).
Media Interview of the Week
Watch my interview with Chicago’s WGN Channel 9 where I share tips and tricks to keep your family’s data safe as well as an inside look at the current scams going around. Modern travel traps range from phishing texts and sketchy QR codes to fake Wi-Fi networks and card skimmers.
Tech of the Week
Check out my friend Dave Balcar’s new game Ctrl-Alt-Destruct
Ctrl-Alt-Destruct is a card based, multiplayer game designed for: Cybersecurity meetups, Company off-sites, Hacker conventions, Tech on-boarding sessions or Team building with memes & mayhem.
Preorder Spies, Lies, and Cybercrime
My new book releases on October 7, but you don’t have to wait to make sure you are one of the first to get it delivered into your hands! Preorder now with this link.
Spies, Lies and Cybercrime will appeal to every person curious or frightened by the prospect of a cyberattack, from students and retirees to the C-Suite and boardroom.
Join me and take up arms in the current cyber war instead of fleeing while the village burns. Only then can we begin to move the needle toward a world safe from cyber-attacks.
Like What You're Reading?
Don’t miss a newsletter! Subscribe to Spies, Lies & Cybercrime for our top espionage, cybercrime and security stories delivered right to your inbox. Always weekly, never intrusive, totally secure.
Are you protected?
Recently nearly 3 billion records containing all our sensitive data was exposed on the dark web for criminals, fraudsters and scammers to data mine for identity fraud. Was your social security number and birthdate exposed? Identity threat monitoring is now a must to protect yourself? Use this affiliate link to get up to 60% off of Aura’s Cybersecurity, Identity monitoring and threat detecting software!

Burned Out From Content Creation?
Syllaby.io helps creators turn content ideas into faceless videos in minutes. No editing. No filming. Just results.
Build your brand and stay consistent—without burning out.
Use this Link to get a 30 days trial + 2-% Beehiiv!

Ready for Next Week?
What do YOU want to learn about in my next newsletter? Reply to this email or comment on the web version, and I’ll include your question in next month’s issue!
Thank you for subscribing to Spies, Lies and Cybercrime. Please comment and share the newsletter. I look forward to helping you stay safe in the digital world.
Best,
Eric
Let's make sure my emails land straight in your inbox.
Gmail users: Move this email to your primary inbox
On your phone? Hit the 3 dots at top right corner, click "Move to" then "Primary."
On desktop? Close this email then drag and drop this email into the "Primary" tab near the top left of your screen
Apple mail users: Tap on our email address at the top of this email (next to "From:" on mobile) and click “Add to VIPs”
For everyone else: follow these instructions
Partner Disclosure: Please note that some of the links in this post are affiliate links, which means if you click on them and make a purchase, I may receive a small commission at no extra cost to you. This helps support my work and allows me to continue to provide valuable content. I only recommend products that I use and love. Thank you for your support!
Reply