DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

E-ZPass toll payment texts return in massive phishing wave

Posted on April 8, 2025 by Dissent

Bill Toulas reports:

An ongoing phishing campaign impersonating E-ZPass and other toll agencies has surged recently, with recipients receiving multiple iMessage and SMS texts to steal personal and credit card information.

The messages embed links that, if clicked, take the victim to a phishing site impersonating E-ZPass, The Toll Roads, FasTrak, Florida Turnpike, or another toll authority that attempts to steal their personal information including names, email addresses, physical addresses, and credit card information.

This scam is not new, with the FBI warning about it in April 2024, but BleepingComputer has seen and received multiple reports of a surge in this mobile phishing campaign.

Read more at BleepingComputer.

DataBreaches had also seen these E-ZPass smishing attempts, but sometimes, timing is everything. People who recently received legitimate invoices from E-ZPass in New York for toll road charges and who tried to use the real website during the past week will have seen a notice that the sites were unreachable due to maintenance and updating work. The message on the site currently says:

To improve service to our customers, we are upgrading our systems from 7:00 pm on 04/09/2025 to 11:59 pm on 04/14/2025. During this upgrade process, the automated phone system, customer service representatives, and account access from the website or mobile app will be unavailable for several days. Please make note of this temporary service change when managing your account.

Anyone receiving a scam message during this period may be more inclined to click on any link in the message to pay, but don’t click.

NY’s E-ZPass site has this warning:

IMPORTANT MESSAGES and ALERTS
SCAM ALERT: SMiShing Scam –We have recently learned of an SMS text message scam attempting to collect unpaid tolls. Some messages reference fictitious names like “NY Toll Services,” while others fraudulently use the names of legitimate tolling programs such as E-ZPass or the Congestion Relief Zone, formerly known as the Central Business District Tolling Program. Please be advised these are NOT authorized communications from E-ZPass New York or other Tolling Authorities associated with E-ZPass program. We strongly advise you NOT to click the link to the website contained within the message you receive. E-ZPass New York will never ask for a customer’s Date of Birth, Social Security Number, or other personally identifiable information. Real communications from E-ZPass New York will only refer customers to the following official websites: E-ZPassNY.com and TollsByMailNY.com. If you receive a fraudulent SMS and would like to file a complaint with the FBI’s Internet Crime Complaint Center, please visit www.ic3.gov. This is a site dedicated to sharing information on Internet crimes across law enforcement agencies.

 


Related:

  • Hungarian police arrest suspect in cyberattacks on independent media
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
  • Gladney Adoption Center had serious data exposures in the past few months. What will they do to prevent more?
  • United Australia Party confirms ransomware attack, personal data and email correspondence exposed
  • Meta fixes bug that could leak users’ AI prompts and generated content
  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
Category: Miscellaneous

Post navigation

← When the victimizers become the victims…. RansomHub the victim of a takeover?
2024 Year in Review: Data Breach Litigation →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)
  • Bank of America Refused To Reimburse Georgia Customer After Hackers Hit Account. Then a News Station Showed Up.
  • NCERT Issues Advisory on “Blue Locker” Ransomware Targeting Pakistan’s Key Institutions
  • Scattered Spider has a new Telegram channel to list its attacks
  • SC: Spartanburg County hit by cyberattack, some online services disrupted
  • Pakistan Petroleum thwarts ransomware attempt, says no critical data compromised
  • ShinyHunters sent Google an extortion demand; Shiny comments on current activities
  • Air France and KLM alert customers to data breach on external platform
  • Samourai CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill Pled Guilty to Operating a Money Transmitting Business, Samourai Wallet, That Transmitted Over $200 Million in Criminal Proceeds

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.