Categories: Latest News

by Hunter Feybusch

Share

Categories: Latest News

by Hunter Feybusch

Share

What are Toner Pirates?

Toner pirates are scammers who lure unsuspecting businesses to purchase office supplies that can be overpriced or of poor quality. The products may even be non-existent.

Sometimes, the scammers may call you to inform you that the prices of toners are about to rise, and so you should place an order to save money.

Wondering where the scammers get your business information from?

Well, they do  research on a business before calling first. They investigate where you get your toners from and then contact you pretending that they are your usual suppliers.

Sometimes, they pretend to update their copier records and collect information from you through questions, and the answers to the questions you provide can later be used to scam you

Common Types of Toner Scams

The Info Gathering Call

This is likely the first type of call that you receive. The main aim of the phone call is to collect information. The caller may ask you the make and model of your copiers, your supplier’s name, the person in charge of office supplies in your office, and so on.

 

The Pressure Call

Now that the scammers know the name of your supplier, they may call again pretending to be your supplier. At this stage, they may pressure you to buy from them or give you false pricing so that you can make an order from them.

How to Avoid Toner Scams

Make sure to check the  number is correct with your usual supplier, the pirates can get the name of your supplier and pretend to be them, so make sure to check its the correct number. Never accept a shipment you are not expecting or called for only accept toner packages from your dedicated supplier. If they persist you can report them to the Federal Trade commission.

Related Posts

  • Cloudflare Cybersecurity reports a record-breaking DDoS (distributed denial of service) attack that peaked on 7.3 Terabits per second (Tbps) The attack attempted to deliver 37.4 terabytes of network traffic equivalent of over 9,000 high definition full length movies attack lasted on 45 seconds “The attack carpet bombed an aver of 21,925 destination ports of a […]

  • The FBI announced that China has opened the PLA information Support Force Engineering University in Wuhan, China Will offer undergraduate majors to create AI-powered cyber terrorists Includes artificial intelligence warfare programs to teach students how to hack into organizations in the U.S. Will deploy autonomous cyber weapons capable of adapting and evolving to penetrate customer […]

  • Justin David Schwink of Rawlins, Wyoming was arrested for stealing 333 Ricoh toner Cartridges while working for Memorial Hospital of Carbon County, Wyoming Total value of $63,469 Allegedly sold the cartridges on eBay

  • Article published in The Recycler magazine Kyocera published a cybersecurity incident notification about cyber attack that happened in April, 2025 Involved unauthorized access to one of its servers Exposed “business data” and unknown number of names and email addresses “We are actively working with cybersecurity and forensic experts to fully access the impact and further […]