Scammers are becoming more sophisticated. Here are 10 ways to steal money from your plastic card. Read and be on the alert!
The most famous and “old as the world” way – skimming. To the card reader of the ATM, scammers attach a reader (skimmer), as well as an overlay keyboard, pushing on the buttons of which the cardholder, unaware of this, sends the attackers their PIN code. Sometimes attach and a low-profile camera, recording all the actions. With the help of a skimmer, you can read all the data from the magnetic strip of the card.
The team of scammers usually includes “craftsmen” who are able to make a new map with old data. Then cash out money is a matter of technology.
Advice: before using ATM services, check whether there are any “unnecessary” parts and overlays or strange cameras on it. Also, experts advise cashing in cash only at ATMs that are installed inside bank branches or business centers.
2. ATM theft and installation of fake ATMs
It would seem, how the kidnapping of the ATM can touch the owner of the “plastic”? Criminals receive not only money from the device, but also data on all the maps that passed through it. Of course, ATM theft is not a frequent occurrence, but it still happens sometimes.
But ATM-“fakes” appear on the streets of Russian cities more often. In appearance, such devices are practically the same as the real ones, although inside they are usually empty, contain only a reader. The person inserts his card into the card reader, sees a message about the impossibility of carrying out the operation and leaves – and the attackers can only take advantage of the data provided.
By the way! Recently, scammers have become even more advanced. They install special tires on ATM machines. By accessing the top of the machine, they break the connection between the dispenser controller and the control software. After that, a fake device is connected, which can send certain “commands” to issue cashed money. The ATM obediently executes the command and “gives” scammers huge sums.
Advice: the same as in the first paragraph.
3. An attack on terminals for payment of services
Steal card data – and not one, but hundreds and thousands – can be through POS-terminals, which are often installed in shopping centers, railway stations and other places of congestion. In this case, theft of personal data is carried out by installing malware or additional devices (like those that are placed on ATMs). The code, developed by scammers, finds “loopholes” in the protection of the system and sends data to intruders.
4. Payment by card in restaurants and cafes
How does it work? The waiters take away the card you are going to pay to conduct the operation. Then they take pictures of her data (your name, validity period of the card, CVV-code). After that, they can either use the received information themselves or sell it to special exchanges (yes, there are also such).
Tip: The first thing that will help you to protect yourself from this kind of scammers is not to give a bank card to them, demanding that all actions with it be carried out before your very eyes. In addition, experts advise erasing CVV-code from the card (although some online stores do not request this code when shopping). By the way, some banks offer a card issue without specifying the customer’s name on it. But sometimes there is a huge “bug” – when shopping online, you can specify any (!) Name in the column “cardholder’s name”.
5. Unfamiliar applications
Some of them can collect and structure data about your phone, your accounts, as well as all information about your movements and other things. After that, all data can be transferred to fraudsters or to “unscrupulous” organizations engaged in illegal registration of loans.
Tip: do not download “curved” applications to your smartphone without user reviews from unknown companies.
6. Open Wi-Fi networks
Accessing your phone through an open Wi-Fi is easy. To do this, you use the ClientLogin protocol. Authentication of a phone trying to automatically connect to available networks can be “intercepted”, after which scammers will be able to access everything that is stored in the smartphone.
Tip: Be careful when using public networks (in a cafe, metro, on the streets of the city). In particular, do not try, cozy sitting on a bench in the park, go into the Internet bank from the phone through an open network.
7. Posts of doubtful content
All of us at least once in their lives came strange messages from “friends” or “friends” that you have not spoken to for 5 years: “Hello !!!!! Do you have a Sberbank card? ” Next, you usually need to transfer a certain amount of money to the account. Sometimes scammers are asked to give them these cards in order to “urgently buy a ticket for my mother, then I will explain !!!”
Tip: do not do this in any case. Try to contact the person on whose behalf the messages come and explain it.
There are mobile applications, and absolutely legal, like Banking card reader NFC, which allow you to read data from the card using NFC technology (radio communication, which works at a distance of several centimeters). Having bought a smartphone with the included application to someone else’s wallet (this can be done in the store queue), scammers will learn all the necessary data of your card – except CVV-code. After that, they can make purchases on the Internet – but only on those sites that do not require the input of the above code.
9. Counterfeiting sites
We are talking about fake websites of banks and other financial organizations, as well as payment systems. Most often, a link to them comes via e-mail in a letter stating that your account will be credited with “HUGE MONEY! WIN! “. Details are advised to be read on the “bank” website, where you are sure to be asked to enter the card number, the expiration date, your name.
Tip: recognizing scam letters is simple:
– they write “impersonal” letters that do not contain references to you by name, patronymic, surname;
– the message does not specify any specific data (card or account numbers);
– the letter necessarily contains a link that supposedly allows you to get “additional information”. Most often after a click on it, a site that looks suspiciously similar to the site of one of the banks opens. With the difference that in the address bar there are a few extra characters ( Sberbannk or Vttb24), and the browser starts to warn about an unprotected connection.
If the methods of fraud from the previous paragraph are called “phishing” (English – fishing), now we are talking about the vishing (English voice fishing). These are calls of scammers with requests that somehow concern your plastic card. As the simplest example: phone calls with the request to provide the card details for the transfer of “winnings in the lottery”.
Some scammers go further. For example, if you posted on the Internet an announcement about the sale, say, of furniture, they call and offer to transfer you money to the card, arriving for a purchase later in the evening. In this case, they are asked to provide all the data about the card, including the CVV code. What happens next, do not need to explain.