Story4 mainbanner 63 Sats Cybersecurity India

The Great Deception: Beware of ‘Buy Back’ Membership Scams

April 30, 2024 | Cybercrime

Share :

Recently, Sterling Holidays members where targeted in a deceptive phone scam that offered membership ‘buy back.’

A lucrative offer to ‘buy back’ membership is doing the rounds.

Sterling Holidays and Resorts, the vacation ownership company under Thomas Cook India, sounded an alarm on a recent phone scam targeting its members.

Reports surfaced of individuals posing as representatives of Sterling Holidays, enticing members with offers to repurchase their memberships at inflated prices.

With an extensive network comprising 48 resorts sprawled across 45 destinations in India, Sterling Holidays boasts a staggering membership base exceeding 1,00,000 individuals, with 80,000 actively enjoying their memberships. The memberships, offering a maximum tenure of 99 years, have been cherished by holiday enthusiasts seeking unforgettable experiences.

Sterling Holidays has urged all its members to exercise utmost caution and vigilance against such fraudulent schemes. Members have been advised to verify the authenticity of any communication claiming association with Sterling and to report any suspicious activity promptly.

In a text message addressed to its members, Sterling Holidays issued a warning about this scam, stating, “We wish to alert you about unauthorized parties engaging in payment scams.” The message urged members to exercise caution regarding their personal information and to utilize official communication channels.

Category

Tags

360 Degree Protection Ahmedabad event Ahmedabad Roadshow Airline industry Airline industry Data breaches Cyber attacks Passenger data protection Aviation cybersecurity Passenger data security Cyber threats in aviation Aviation cybersecurity Bank Cyber Crime Buy Back Scam casb casb cloud casb security cloud access broker Cloud Computing Cloud Computing Architecture Cloud Computing Security Cloud Native Applications Cloud Security Cloud Security Experts Collective Defense Consumer Awareness Corporate Security Corporate Security Data Protection cyber attacks Cyber attacks Security breaches Cyber Crime Case in India Cyber Crime Complaint Online Cyber Crime Complaints in India Cyber Crime Helpline Number Cyber Crime in Banking Sector Cyber Crime Investigation and Digital Forensics Cyber Defense Cyber Forensics and Information Security Cyber Risk Management Cyber Safety Tips Cyber Security Cyber Security in Banking Cyber Security Risk Analysis Cyber Threats Cyber threats in aviation Cyberattacks Cybercrime in India Cybersecurity Cybersecurity Companies Cybersecurity franchise Cybersecurity Measures Cybersecurity Risk Management Cybersecurity Services Cybersecurity Strategies Cybersecurity Threats Dark Web Data Breach Data Breaches Data Protection dfir dfir cyber security dfir tools digital forensics incident response Digital Risk Monitoring Digital Security Digital Threat Monitoring EDR in Cyber Security EDR meaning EDR Solutions Encryption Key Security endpoint protection endpoint security solutions Financial Fallout Forensic Investigation in Cyber Security Fraud Prevention Future Trends in Cybersecurity Geopolitical Tensions Global Incidents Global Politics Government Agencies Hacker Groups Information Security Insider Threats Malware Managed Security Service Provider Mobile Banking Heists Mobile Banking Trojans Mobile Endpoints Mobile Threat Defense Mobile-First Approach Modern Threat Landscape Moving Target Defense Network Segmentation PaaS PaaS providers PaaS solutions Passenger data protection Passenger data security Patch Management Patch Management Best Practices Patch Management Process Patch Management Software Patch Management Solution Platform as a Service Platform as a Service in Cloud Computing preventing ransomware attacks Privacy Breach proactive threat hunting proactive threat hunting strategies Protection Cybersecurity ransomware ransomware attacks ransomware protection Red Teaming Methodology Red Teaming Security Risk Analysis Risk Assessment Risk Assessment Process Risk Assessment Steps Risk Management Risk Prioritization Role of Red Team in Cyber Security Scam Alert Scenario-Based Testing SCoE Security breaches Security breaches. Security Layers Security Testing Threat Detection Threat Detection Mechanisms threat hunting Threat Intelligence Threat Intelligence Lifecycle Threat Intelligence Platforms Types of Cloud Computing Types of Cyber Crime in Banking Sector Types of Digital Forensics Types of PaaS types of ransomware Vulnerability Management What Is Red Teaming What is Red Teaming in Cybersecurity Zimperium
Scroll to Top