Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Saturday August 24 2019, @09:54AM   Printer-friendly
from the ANI-port-in-a-storm? dept.

Phone companies and state attorneys general join forces to fight robocalls

US consumers receive as many as 350,000 unwanted calls every three minutes, according to the FCC. Despite multiple efforts to end the onslaught, an estimated 4.7 billion robocalls hit American phones in July alone. Now, attorneys general from all 50 states and the District of Columbia are teaming up with 12 carriers in a united effort to prevent and block the spam calls.

Under the new agreement, the carriers will implement call-blocking technology, make anti-robocall tools free to consumers and deploy a system that labels calls as legitimate or spam, The Washington Post reports. The companies also agree to aid investigations by law enforcement. The major players -- AT&T, Comcast, Sprint, T-Mobile and Verizon (Engadget's parent company) -- are on board, as well as smaller carriers -- Bandwidth, CenturyLink, Charter, Consolidated, Frontier, US Cellular and Windstream. Though, there's no deadline for the companies to implement these measures.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by NotSanguine on Saturday August 24 2019, @06:32PM (1 child)

    I am quite sure that the scammers will soon find other ways to continue making Robocalls.

    SMS SPAM/scams anyone?

    Just got an SMS scam message yesterday (23 August) which included a link to eweaka-dot-com:

    $ whois eweaka.com
    [Querying whois.verisign-grs.com]
    [Redirected to whois.namecheap.com]
    [Querying whois.namecheap.com]
    [whois.namecheap.com]
    Domain name: eweaka.com
    Registry Domain ID: 2425445495_DOMAIN_COM-VRSN
    Registrar WHOIS Server: whois.namecheap.com
    Registrar URL: http://www.namecheap.com [namecheap.com]
    Updated Date: 0001-01-01T00:00:00.00Z
    Creation Date: 2019-08-21T15:48:32.00Z

    While I have received quite a few scam calls, I generally only receive unwanted SMS messages from political candidates (which results in a response that I will not vote for their candidate as they chose to harass me. This actually led a staffer from one candidate's campaign to actually knock on my door after receiving such a reply -- which resulted in me reiterating my promise not to vote for said candidate, and a further promise to make it my mission to defeat them. Harassment isn't the way to win political support.), so this was new.

    I haven't visited the link provided in the SMS message, so I can't say what the scam may be -- probably some malicious javascript. I could use curl/wget to retrieve the link data, but I don't care enough to do so.

    --
    No, no, you're not thinking; you're just being logical. --Niels Bohr
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 1, Informative) by Anonymous Coward on Saturday August 24 2019, @06:50PM

    by Anonymous Coward on Saturday August 24 2019, @06:50PM (#884859)

    A great service I use is urlscan.io because they show you all the requests, the DOM, everything. Plus it is better than most services because they use Chrome in headless mode. Here is the analysis of transactions for that main url: https://urlscan.io/result/83a6aab7-d3d5-4b6b-a893-dc8088ba7044#transactions [urlscan.io] It shows that the root of that domain does an HSTS redirect to the https version and then that redirects you to mobn-dot-it and that request 404s. That 404 page also loads a New Relic tracking script and JSON payload.