1 / 24

“ ING ” Fraud Collection

“ ING ” Fraud Collection. GPCE Credit Union has arranged a collection of scams, outlining the most prevalent financial scams. We want our members to be aware, not to become victims.

Download Presentation

“ ING ” Fraud Collection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. “ING” Fraud Collection GPCE Credit Union has arranged a collection of scams, outlining the most prevalent financial scams. We want our members to be aware, not to become victims. The scams included in this presentation include: Phishing, Spear Phishing, Vishing, Smishing, Fake Check Scams, and Skimming. (Sources: Federal Trade Commission, About.com, Wikipedia, and Scamwatch.)

  2. PHISH“ING” - • What is phishing? It is the most preventable financial scam and still the most dangerous. Phishing is a scam where internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims.

  3. Avoid Getting Hooked: • Don't reply to email or pop-up messages that ask for personal or financial information, and don't click on links in the message. • Don't cut and paste a link from the message into your Web browser — phishers can make links look like they go one place, but that actually send you to a different site.

  4. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use Voice over Internet Protocol technology, the area code you call does not reflect where the scammers really are. • If you need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card.

  5. Use anti-virus and anti-spyware software, as well as a firewall. Update them all regularly. • Don't email personal or financial information. • Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.

  6. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. • Forward phishing emails to spam@uce.gov – and to the company, bank, or organization impersonated in the phishing email. • You also may report phishing email to reportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing.

  7. If you believe you've been scammed, file a complaint with the Federal Trade Commission at www.ftc.gov/complaint, and then visit the FTC's identity theft website at ftc.gov/idtheft. • Victims of phishing can become victims of identity theft. While you can't entirely control whether you will become a victim of identity theft, you can take some steps to minimize your risk. (Source: FTC)

  8. SPEAR PHISH“ING” - • What is spear phishing? In this case, it is not a sport-fishing method. It is an insidious variation of phishing that targets specific people and groups. • Spear phishing attacks are customized and can be sent to a single person at a time. Waiting to see who bites…Waiting to make you the next victim of fraud!

  9. How Does It Work? • A spear phishingemailusuallyincludes a link that leads to a spoofed or fake web site that requests your personal information. It all looks very legitimate, and sometimes even the experts are fooled by spear phishing emails. • Other spear phishingemails may contain a downloadable file. They’re just as convincing, often appearing to come from an employer or someone else that’s equally legitimate. But the file contains malware of some kind that, once downloaded to your computer, collects your personal information and transmits it to the criminal when you’re online. • Spear phishing is a difficult scam to catch because the criminals that use this method of stealing identities put extra time and effort into the process. It takes time to put together the web sites and messages that are used as bait. However, the pay-off is usually much greater than the rewards of a simple phishing attack. (Source: From Jerri Ledford, former About.com Guide)

  10. VISH“ING” - • What is Vishing? It is another form of phishing AKA voice phishing, in which criminals use phone technology to ensnare their victims in an effort to obtain personal financial information.

  11. Never Heard of Vishing? The term is a combination of "voice" and phishing. • Vishing exploits the public's trust in landline telephone services. Landlines were once only associated with a physical location known to the telephone company and associated with a bill-payer. Times have changed, making it easier to hide the originating landline number. • Vishing is the criminal practice of manipulating people into performing actions or divulging confidential information such as passwords, access codes, or access to their personal computer by lying, conning, or tricking them. It’s the high-tech version of the old "confidence game." • Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.

  12. Example of Vishing: • The criminal uses either a war dialer which automatically scans a list of telephone numbers to call phone numbers in a given region or accesses a legitimate voice messaging company with a list of phone numbers stolen from a financial institution. • When the victim answers the call, an automated recording, often generated with a text to speech synthesizer, is played to alert the consumer that their credit card has had fraudulent activity or that their bank account has had unusual activity. The message instructs the consumer to call the following phone number immediately. The same phone number is often shown in the spoofed caller ID and given the same name as the financial company they are pretending to represent. • When the victim calls the number, it is answered by automated instructions to enter their credit card number or bank account number on the key pad. • Once the consumer enters their credit card number or credit union account number, the visher has the information necessary to make fraudulent use of the card and/or to access the credit union account. • The call is often used to harvest additional details such as security PIN, expiration date, date of birth, etc. REMINDER:GPCE Credit Union will never call to verify your personal information. If in doubt, members should hang-up immediately and call the credit union directly. Our toll free number is 1-800-472-4723.

  13. How Can I Protect Myself? Vishing is very hard for legal authorities to monitor or trace. • Consumers are advised to be highly suspicious when receiving messages directing them to call and provide credit card or credit union numbers (account, routing, passwords, etc.). • Rather than provide any information, if speaking to a human ask them for an incident number and then hang up. • Then place a call to the number printed directly on your credit card or billing statement from a telephone number the credit union has on file, usually your home land line. While consumer caller id is trivial, to fake the credit union or credit card’s call center gets much more reliable billing information provided by trunked 1-800 service. By calling the number directly, you have a higher level of confidence the other party you’ve dialed is who they claim to be. . (Source: Wikipedia)

  14. SMISH“ING” - • What is smishing? It is a crime that capitalizes on the current popularity of cell phone text messaging. • Smishing is a security attack in which the user is tricked into downloading a Trojan horse, virus, or other malware onto his cellular phone or other mobile device.

  15. How Does Smishing Work? • Smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information. The "hook" (the method used to actually "capture" your information) in the text message may be a web site URL, however it has become more common to see a phone number that connects to automated voice response system.

  16. Example of Smishing: • This is an example of a smishing message in current circulation: "Notice - this is an automated message from (a local credit union), your ATM card has been suspended. To reactivate call urgent at 866-###-####." • In many cases, the smishing message will show that it came from "5000" instead of displaying an actual phone number. This usually indicates the SMS (short message service) message was sent via email to the cell phone, and not sent from another cell phone. • This information is then used to create duplicate credit/debit/ATM cards. • There are documented cases where information entered on a fraudulent web site (used in a phishing, smishing, or vishing attack) was used to create a credit or debit card that was used halfway around the world, within 30 minutes. (Source: Wikipedia)

  17. FAKE CHECK SCAMS - • What is a fake check scam? It is a continuous trap that costs members and credit unions millions annually. “Congratulations, it’s your lucky day! You’ve just won $5,000!”

  18. FAKE Check Scams: • …So, you’ve won a large sum of money and they are sending a cashier's check to cover the taxes and fees. All you have to do to get your winnings is deposit the check and wire the money to the sender to pay the taxes and fees. You're guaranteed that when they get your payment, you'll get your prize. • There's just one catch: this is a scam. The check is not good, even though it appears to be a legitimate cashier's check. • The lottery angle is a trick to get you to wire money to someone you don't know. If you were to deposit the check and wire the money, your bank would soon learn that the check was a fake. You would be out the money: The money you wired cannot be recovered, and you are responsible for the checks you deposit - even though you don't know they're fake.

  19. Twist on Fake Check Scams: Literally, a dime-a-dozen! Similar scams are conducted all the time. Beware of these other so called wind-falls of good fortune: Buying Club Memberships, Charity and Fund Raising Fraud, Credit and Loan Offers, Government Grant Scams, Identity Theft and Telemarketing, Medical Discount Plans, Reloading Scams, Robocalls, Sweepstakes and Lotteries, Travel Scams, Work-at-Home and Business Opportunities. Contact the Federal Trade Commission for more details regarding each type of scam mentioned. (Source: FTC)

  20. FTC ADVICE: The FTC has these words of caution for consumers who are thinking about responding to any foreign lottery: • If you play a foreign lottery —on the telephone or through the mail — you're violating federal law. • There are no secret systems for winning foreign lotteries. Your chances of winning more than the cost of your tickets are slim to none. • If you purchase one foreign lottery ticket, expect many more bogus offers for lottery or investment “opportunities.” Your name will be placed on “sucker lists” that fraudulent telemarketers buy and sell. • Keep your credit card and bank account numbers to yourself. Scam artists often ask for them during an unsolicited sales pitch. • The bottom line: Ignore all phone solicitations for foreign lottery promotions. If you receive what looks like lottery material from a foreign country, give it to your local postmaster.

  21. SKIMM“ING” - • What is skimming? It is a scam in which criminals steal from ATM users and those who use their debit cards. • ‘Card skimming’ is the illegal copying of information from the magnetic strip of a credit or ATM card. It is a more direct version of a phishing scam. • The scammers try to steal your personal information so they can access your accounts. Once scammers have skimmed your card, they can create a fake or ‘cloned’ card with your details on it. The scammer is then able to run up charges on your account. • Card skimming is also a way for scammers to steal your identity and use it to commit identity fraud. By stealing your personal information and account numbers the scammer may be able to borrow money or take out loans in your name.

  22. Warning Signs of Skimming: • A shop assistant takes your card out of your sight in order to process your transaction. • You are asked to swipe your card through more than one machine. • You see a shop assistant swipe the card through a different machine to the one you used. • You notice something suspicious about the card slot on an ATM (e.g. an attached device). • You notice unusual or unauthorized transactions on your account or credit card statement.

  23. How Can I Protect Myself? • Keep your credit card and ATM cards safe. Do not share your personal identity number (PIN) with anyone. Do not keep any written copy of your PIN with the card. • Check your credit union account and credit card statements when you get them. If you see a transaction you cannot explain, report it to your credit union as soon as possible. • Choose passwords that would be difficult for anyone else to guess. • If you are using an ATM, take the time to check that there is nothing suspicious about the machine. • If you are in a shop and the assistant wants to swipe your card out of your sight, or in a second machine, you should ask for your card back straight away and either pay with a cheque or cash, or not make the purchase. (Source: Scamwatch)

  24. Thank you, • For taking the time to understand the different types of “ING” Fraud. We hope this information has been helpful to you. • If you have any other questions or concerns regarding these or any other types of fraud, or if you suspect you have been defrauded call GPCE Credit Union and the proper authorities right away.

More Related