---
title: "Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted | DMARC Report"
description: "Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted from DMARC Report explains practical steps for email authentication, domain protection."
image: "https://dmarcreport.com/og/blog/packers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted.png"
canonical: "https://dmarcreport.com/blog/packers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted/"
---

Quick Answer

\_According to the FBI's 2022 Internet Crime Report (IC3), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses. Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted

Related: [Free DMARC Checker](/tools/dmarc-checker/) ·[How to Create an SPF Record](/tools/spf-record-generator/) ·[SPF Record Format](/blog/spf-format-checker-dos-and-donts-for-email-authentication/) 

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=undefined%2Fblog%2Fpackers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=Packers%20Fans%20Scammed%2C%20Pentagon%20Bans%20Tencent%2C%20Telecom%20Namibia%20Targeted&url=undefined%2Fblog%2Fpackers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=undefined%2Fblog%2Fpackers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted%2F "Share on Facebook") [ ](https://reddit.com/submit?url=undefined%2Fblog%2Fpackers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted%2F&title=Packers%20Fans%20Scammed%2C%20Pentagon%20Bans%20Tencent%2C%20Telecom%20Namibia%20Targeted "Share on Reddit") [ ](mailto:?subject=Packers%20Fans%20Scammed%2C%20Pentagon%20Bans%20Tencent%2C%20Telecom%20Namibia%20Targeted&body=Check out this article: undefined%2Fblog%2Fpackers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted%2F "Share via Email") 

![Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted](https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg) 

![Dmarc analyzer 8 150x150](https://media.mailhop.org/dmarcreport/images/2025/01/dmarc-analyzer-8-150x150.jpg) 

\_According to the [FBI’s 2022 Internet Crime Report (IC3)](https://www.ic3.gov/Media/PDF/AnnualReport/2022IC3Report.pdf), 300,497 US-based victims reported phishing incidents in a single year, and Business Email Compromise (BEC) caused more than $2.7 billion in direct losses.

> The support tickets we get after a spoofing incident all start the same way: ‘we didn’t know someone was sending email from our domain,’ says Vasile Diaconu, Operations Lead at DuoCircle. DMARC reporting would have caught it weeks earlier. The cost of monitoring is nothing compared to the cost of a successful impersonation attack.

```
					DMARC Report					

				
```

Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted

```
					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						
```

Play Episode

```
					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						
```

Pause Episode

```
					</button>
				

					<audio preload="none" class="clip clip-19714">
						<source src="https://media.mailhop.org/dmarcreport/images/2025/01/Packers-Fans-Scammed-Pentagon-Bans-Tencent-Telecom-Namibia-Targeted.mp3">
					</audio>
						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								
```

Mute/Unmute Episode

```
							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								
```

Rewind 10 Seconds

```
							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								
```

Fast Forward 30 seconds

```
							</button>
						

							<time class="ssp-timer">00:00</time>
							
```

/

```
							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M14S">2:14</time>
			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-19714" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-19714" title="Share">Share</button>
										</nav>

						
```

RSS Feed

```
							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-19714" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-19714" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

						Share						
					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/packers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted/&t=Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/packers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted/&url=Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2025/01/Packers-Fans-Scammed-Pentagon-Bans-Tencent-Telecom-Namibia-Targeted.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

						Link						
					

						<input value="https://dmarcreport.com/blog/podcast/packers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted/" class="input-link input-link-19714" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-19714" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
					

						Embed						

					
```

/\*! This file is auto-generated \*/ ’ title=“Embed Code” class=“input-embed input-embed-19714” readonly/>

```
					<button class="copy-embed copy-embed-19714" title="Copy Embed Code" aria-label="Copy Embed Code"></button>


```

It’s the second week of January 2025\. While some people are staying true to their New Year resolutions, others are still reveling in the holiday mood. But [threat actors](https://www.nbcnews.com/tech/security/us-treasury-says-computers-hacked-chinese-threat-actor-rcna185809) across the world are super active around this time. They love to make the most out of this phase when \*\*security tends to get a bit relaxed because of everything that is going around.

That’s why we are here to remind you of the [malicious attempts](https://www.state.gov/united-states-sanctions-iran-backed-malicious-cyber-actors-that-have-attempted-to-influence-u-s-elections/) that scammers keep on making to get unauthorized access to your data and money.

This week’s bulletin includes the unfortunate incident where the \*\*Green Bay Packers fans got tricked by a payment skimmer. Also, we will focus on the [ransomware attack](https://www.voanews.com/a/ransomware-attacks-death-threats-endangered-patients-and-millions-of-dollars-in-damages/7520952.html) on Telecom Namibia. Lastly, our eyes will be on Tencent which just got banned by the Pentagon.

Without wasting time anymore, let’s get started!

## Green Bay Packers football fans targeted by payment skimmer!

\*\*8514 Green Bay Packers fans got the biggest surprise of their lives when they realized that they’d been duped by a payment [card skimmer](https://money.usnews.com/credit-cards/articles/what-is-a-credit-card-skimmer-and-how-you-can-protect-yourself). All these fans have purchased merch from the [Packers Pro Shop](https://www.bleepingcomputer.com/news/security/green-bay-packers-online-store-hacked-to-steal-credit-cards/) website during the last fall.

The football franchise was all geared up to play against the opposition- the **Jacksonville Jaguars**. It was their 8th season in 2024.

All the affected fans have been alerted via a \*\*notification letter that mentions a malicious code insertion on the football franchise’s official website . The security staff and other authorities got to know about the threat attempt on October 23\. They immediately requested for the [e-commerce website](https://internationalsupermarketnews.com/archives/16164) to be taken offline.

Experts are concerned that the [malicious code](https://www.wired.com/story/qr-codes-phishing-attack/) may have been able to get access to some **customer information**. _Those fans who had checked out using a certain set of payment options to buy merch of their choice may have inadvertently exposed their data to the threat actors_.

Customers who have used [PayPal](https://www.fxempire.com/news/article/shiba-inu-price-surges-as-paypal-announces-shib-token-integration-in-usa-1428174), a Pro Shop website account, a gift card, or Amazon Pay are safe as their data is not exposed. However, those who have used any other mode of payment are clearly at risk as threat actors have gained [unauthorized access](https://abcnews.go.com/US/dc-police-department-reports-unauthorized-access-server/story?id=77339046) to their full payment card information, emails, names, and billing and shipping addresses.

![Dmarc analyzer](https://media.mailhop.org/dmarcreport/images/2025/01/dmarc-analyzer-7646.jpg) 

## Pentagon puts a ban on Tencent, the gaming giant!

The [US Department of Defense](https://www.foxbusiness.com/politics/us-designates-tencent-chinese-military-company-adding-tech-giant-blacklist) (DoD) has labeled the messaging and gaming giant Tencent as a **Chinese military business**. The Pentagon has put a federal ban on the gaming company. The US Department of Treasury has accused [Integrity Technology Group](https://www.ceotodaymagazine.com/2025/01/china-denounces-u-s-sanctions-on-integrity-technology-group-escalating-cybersecurity-tensions/), a China-based [cybersecurity](https://dmarcreport.com/blog/how-to-educate-or-train-employees-on-cybersecurity/) company, of computer intrusion into crucial infrastructural systems across the US.

Tencent can no longer assist the US federal government with its **services or technology**. Tencent is not the only company to join the list “Section 1260”. Some of the other brands that are part of the same list are Huawei, [Changxin Memory Technologies](https://www.reuters.com/technology/us-mulls-blacklisting-cxmt-curb-chinas-chip-advance-bloomberg-news-says-2024-03-09/), [COSCO](https://www.lloydslist.com/LL1152134/Cosco-and-CIMC-put-on-US-Defense-Department-sanctions-list), and Autel Robotics .

_The shares of Tencent dropped by a whopping 10% moments after the announcement_. As of now, Tencent can still operate its business in the US. However, its services will no longer be accepted by the **Federal government**.

Tencent is hopeful that things will work out with the DoD and that there’s a misunderstanding.

## Telecom Namibia on the radar of ransomware attackers!

[Ransomware attacks](https://izoologic.com/region/africa/ransomware-hits-telecom-namibia-customer-data-leaked-online/) are on the rise across Africa. Also, threat actors are majorly targeting crucial infrastructures across Africa to maximize the extent of damage.

Last month, **Telecom Namibia alerted its customers about the [Hunters International-led ](https://www.scworld.com/news/hunters-international-ransomware-gang-threatens-to-leak-us-marshals-data)Ransomware-as-a-Service (RaaS) that it had experienced recently. Telecom Namibia is working in close coordination with law enforcement agencies ,** security companies\*\*, and [third-party](https://www.investopedia.com/terms/t/third-party.asp) incident responders.

Initially, authorities believed that [sensitive data](https://www.prnewswire.com/news-releases/dig-security-state-of-cloud-data-security-2023-report-finds-exposed-sensitive-data-in-more-than-30-of-cloud-assets-301902104.html) had not been compromised. However, with deeper investigation, experts realized that attackers have access to customer data. [Security agencies](https://www.aljazeera.com/news/2023/9/29/us-national-security-agency-unveils-artificial-intelligence-security-centre) and experts have been working together to mitigate the impact of the attack. However, the attackers leaked the data on the \*\*dark web after authorities refused to entertain their demands.

_This is not the first time that threat actors are targeting crucial infrastructures of national importance_. Back in June 2024, the [National Health Laboratory](https://therecord.media/south-africa-national-health-laboratory-service-ransomware-recovery) in South Africa was also targeted by [cybercriminals](https://www.voanews.com/a/alleged-leader-of-cybercriminals-extradited-to-us/7741605.html). It was a ransomware attack that led to complete disruption of the system. They deleted the backups, too. The **government-led healthcare facilit**y took weeks to recover from the blow of this ransomware attack.

Similarly, in July 2024, the Phobos RaaS group targeted some of the crucial **cloud services that serve African government organizations**. The Hunters International group managed to wipe out 18GB worth of data from the [Kenyan Urban Roads Authority](https://www.worldbank.org/en/news/feature/2019/06/13/keeping-kenyans-connected-by-enhancing-the-national-road-network) (KURA).

![Dmarc office 365](https://media.mailhop.org/dmarcreport/images/2025/01/dmarc-office-365-2.jpg) 

[Cybersecurity experts](https://www.abcactionnews.com/news/local-news/cybersecurity-expert-urges-consumers-to-take-precautions-after-massive-data-breach) believe that this trend of ransomware attacks on \*\*critical infrastructures will continue even in 2025\. They think that the major contributing factors are rapid digitization and a lack of proper cybersecurity measures. Cybersecurity experts emphasize that combating ransomware attacks requires robust [email security](https://dmarcreport.com/blog/why-email-security-matters-and-how-to-get-it-right/) measures, including implementing [DMARC](https://dmarcreport.com/), [DKIM](https://dmarcreport.com/what-is-dkim/), and [SPF](https://dmarcreport.com/what-is-spf/) protocols, to prevent phishing and spoofing vulnerabilities.

## Topics

[ dkim ](/tags/dkim/)[ DMARC ](/tags/dmarc/)[ email security ](/tags/email-security/)[ SPF ](/tags/spf/) 

![Brad Slavin](https://media.mailhop.org/dmarcreport/images/team/brad-slavin.jpg) 

[ Brad Slavin ](/authors/brad-slavin/) 

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead for DMARC Report's 2,000+ customer base.

[LinkedIn Profile →](https://www.linkedin.com/in/bradslavin) 

## Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.

[Start Free Trial](https://app.dmarcreport.com/) [Check Your DMARC Record](/tools/dmarc-checker/) 

## Related Articles

[  Foundational 8m  10 Critical Learnings From Verizon’s 2021 DBIR - A DMARCReport Perspective  Nov 25, 2025 ](/blog/10-critical-learnings-from-verizons-2021-dbir-a-dmarcreport-perspective/)[  Foundational 12m  10 DNS Blacklist Insights That Improve Email Security And Deliverability Fast  Nov 14, 2025 ](/blog/10-dns-blacklist-insights-to-improve-email-security-and-deliverability/)[  Foundational 12m  10 Email Spoofing Detection Tools That Dramatically Improve Brand Protection  Nov 11, 2025 ](/blog/10-email-spoofing-detection-tools-that-dramatically-improve-brand-protection/)[  Foundational 12m  10 Reasons SPF Filtering Is Critical For Email Security  Nov 19, 2025 ](/blog/10-reasons-spf-filtering-is-critical-for-email-security/)

```json
{"@context":"https://schema.org","@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"DMARC Report","url":"https://dmarcreport.com","description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","publisher":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
[{"@context":"https://schema.org","@type":"BlogPosting","headline":"Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted","description":"Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted from DMARC Report explains practical steps for email authentication, domain protection.","url":"https://dmarcreport.com/blog/packers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted/","datePublished":"2025-01-10T13:27:00.000Z","dateModified":"2026-04-16T15:53:43.000Z","dateCreated":"2025-01-10T13:27:00.000Z","author":{"@type":"Person","@id":"https://dmarcreport.com/authors/brad-slavin/#person","name":"Brad Slavin","url":"https://dmarcreport.com/authors/brad-slavin/","jobTitle":"General Manager","description":"Brad Slavin is the founder and General Manager of DuoCircle, the company behind DMARC Report, AutoSPF, Phish Protection, and Mailhop. He founded DuoCircle in 2014 and has led the company's growth to 2,000+ customers across its email security product family. Brad's focus is product strategy, customer relationships, and the commercial and compliance side of email authentication (DPAs, SLAs, enterprise procurement).","image":"https://media.mailhop.org/dmarcreport/images/team/brad-slavin.jpg","knowsAbout":["Email Security Strategy","SaaS Product Management","Enterprise Compliance","Customer Success","Email Deliverability Business"],"worksFor":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com"},"sameAs":["https://www.linkedin.com/in/bradslavin"]},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://dmarcreport.com/blog/packers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted/"},"articleSection":"foundational","keywords":"dkim, DMARC, email security, SPF","wordCount":1126,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg","caption":"Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted","width":900,"height":600},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}]
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://dmarcreport.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://dmarcreport.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://dmarcreport.com/foundational/"},{"@type":"ListItem","position":4,"name":"Packers Fans Scammed, Pentagon Bans Tencent, Telecom Namibia Targeted","item":"https://dmarcreport.com/blog/packers-fans-scammed-pentagon-bans-tencent-telecom-namibia-targeted/"}]}
```
