LawCriminal law

Fraud with bank cards and the fight against it. How to protect yourself from scammers

A plastic bank card is a universal means of payment. It provides round-the-clock access to the money contained in your current account. Plastic cards can be debit and credit. The article will focus on how to protect yourself from fraud.

More about maps

The plastic card itself does not contain money. All of them are on the account of the owner. A piece of plastic is just a means of accessing this money.

On the outside of the card are the details of the owner, which are necessary for the bank to identify it and make a decision on carrying out the requested operations. To use the card, it is not necessarily her physical presence. It will be enough to specify the requisites.

To date, many ways have been devised to leave a respectable holder of a bank debit or credit card without funds. Various malicious programs are written . The personal data of the cardholder is stolen. Servers of enterprises and banks are hacked. By sending various messages to the mobile phone and due to the credulity of citizens, criminals gain access to accounts, etc. Fraud with bank cards is a profitable and risky business. And this is because it is not so easy to catch an intruder and prove his guilt. Cybercrime in modern society through the use of information technology for criminal purposes is of a massive nature. It forces card users to become hostages of the situation, and, therefore, to be vulnerable to fraud.

Ways to access cards

Fraud with plastic cards can occur in one of two ways.

1. On the stolen or fake card purchase goods for resale.

2. Through various tricks, attackers gain access to the ATM, account details and pin code.

ATM or ATM (automated telling (teller) machine) is designed to simplify operations on issuing, accepting, transferring cash, paying for services and other financial transactions, without the participation of a credit organization employee. You can use these services at any time of the day. Simplicity, convenience and direct access to cash made ATM machines in demand and popular among the population, and, consequently, among criminals.

Fraud with bank cards occurs through hacker attacks aimed at ATM. It is also possible to do this by copying information from the magnetic strip of the card, setting up for the trays of traps, which leads to the disappearance of money or the issuance of not all of the requested amount from the ATM.

A lost or stolen plastic card that has fallen into the hands of scammers may threaten its owner with writing off all the funds in the account. The same applies to a counterfeit bank card, which is made for the name of a particular person, on whose account funds are available.

Types of card fraud

Today, every citizen should be acquainted with this information. Fraud with plastic cards includes many different types of tricks and deceit.

Forgery - the manufacture of plastic with identical details of the real card of the real owner. This trick allows you to perform any operations. To get rid of fakes, the bank establishes protection from the selection of requisites. The development of methods of stealing money from cards made this method less profitable. Now the simpler option is theft of requisites.

Phishing - a method of theft, through which scammers by various means of communication (telephone, email, etc.) communicate with the cardholder on behalf of the bank. Their purpose is to find out the owner's confidential data. Phone phishing is a very common way to steal. So the card holder receives a call, most often a message with information that a payment has been made from the account, you have to pay off the debt, the card is blocked, etc. The call is made in an automatic mode and is voiced by an electronic voice with frightening information, without specifying the data on the financial institution from which the message is received. After that, for more information, you will need to contact the operator. The same text is indicated in SMS and e-mail messages. During the call to the specified number, the operator tries to find out confidential information, which will later allow criminals to empty plastic cards. Skimming fraud allows you to copy data using a special device installed on the ATM.

The theft of card details from the servers of online stores, which are obliged not to store data about their owner. But this is often not observed. Than scammers successfully use.

Sometimes unscrupulous employees of the bank themselves provide criminals with data about the card. Or due to the negligence of the staff, this information becomes the property of intruders.

With the help of special equipment scammers hack the card together with the pin-code while using the ATM with the use of special devices (micro cameras, overhead keyboards, card readers). Such equipment reads the requisites and entered passwords.

Using counterfeit ATMs also allows you to empty plastic cards. Fraud is carried out by the "Lebanese loop" method. This option allows criminals to seize another's card. To do this, scammers put a piece of film in the slot of the reader, which prevents the card from leaving the hole after the end of the operation. Nearby are the intruders suggesting to enter the pin-code, assuring that after this action the card will be released. After unsuccessful attempts, scammers persuade the owner to apply to the bank the next day when the collectors and engineers will work, and before that time nothing will happen. You can safely leave the map. When the owner leaves the ATM, scammers retrieve the film, the card. They withdraw all means.

Fraud with bank cards also occurs through the conduct of a CNP transaction, that is, an operation performed on the Internet network based on the received details. The owner and his bank plastic are not involved.

Carrying out operations for stolen or lost cards, which occurs in the time interval between the specified events and the blockage of plastic. Also, many forgetful people record their pin code on the card itself, on a piece of paper or on a notebook. When you steal or lose a bag with a purse, scammers become owners of not only all the contents, but also money from a personal account.

Acquiring is the way in which the slip repeats. You can also change its contents. To do this, several slips or imprints of cards on the imprinter are made on the electronic terminal. This is necessary in order to be able to change the transaction amount or create new payment documents after the client signs the slip.

The return of the purchase threatens the owner of the bank card to go into negative. To do this, the scammer, hacker or employee of the trading enterprise, where the customer made a purchase, performs a money-back operation, which increases the balance of the card. Then the attacker uses the funds. The trading company recalls the return. After that, the customer remains in the red.

What should I do if I detect the first signs of fraud?

Fraud using payment cards is very common. Any owner of a plastic device can become his victim. Therefore, at the first suspicions, it is necessary to immediately block the card. And the bank can write a statement of disagreement with the operation, indicating the reason, if it happened without your knowledge.

Fraud with Sberbank cards

Plastic devices of this institution are very often subjected to various attacks of scammers. The most common methods of theft are SMS messages with the text that the card is blocked, and to resume functioning it is necessary to call the specified number. Such text messages can be received by thousands of users of Sberbank cards. Do not forget that all the messages sent by Sberbank come from the same number. If the notification from another addressee is a criminal.

Fraud with Sberbank cards often occurs with plastic devices «Master Card Standard» and «Visa Classic». Therefore, to make purchases from them, especially on the Internet, is in trusted stores, about which you can read reviews.

PrivatBank

Fraud with PrivatBank cards is most often carried out with the help of a skimmer. In order to introduce the pin code, the attackers did not see the numbers through a pre-installed camera, it is necessary to close the dialed combination with the palm of your hand.

Another way is "emergency money", which allows scammers to learn the incoming code in a sms-message to the cardholder, who himself dictates the phone by himself (without suspecting the dirty trick). This is a common case when buying online stores.

Fraud with "Corn" cards

Criminals often use another interesting way of stealing money, in which the "Corn" card is used. Fraud occurs by creating an online store, allegedly from the "Euroset", in which you can make a purchase much cheaper than in the cabin itself. Plus bonuses are added. To make an acquisition, the consultant needs to dictate his / her full name, birth date, the barcode of the card, the secret word that came in the text message, that is, the data that can not be spoken in any way. After this, money is debited from the card account, and the account holder remains without a purchase.

Who will return the stolen money?

Return of funds stolen by fraudsters occurs after an investigation, which should establish some facts.

1. Did not the owner himself spend his savings, and then decided to return them?

2. ATM or bank error?

3. Or is it tricks scammers?

If it is determined that the write-off was not due to the fault of the cardholder, then the amount stolen is refunded to him. The issuer must return it, which usually does not hurry to do it. The burden of reimbursement is imposed on the point of sale or acquirer. While the participants understand who should pay the damages and who is to blame, the cardholder can wait for his funds for a very long time. In order not to delay with reimbursement, the regulating body is a payment system that forms uniform rules for all participants, timing and algorithm of behavior.

The process of investigating theft of an account

Fraud with credit cards, as well as with debit plastic devices, occurs by the same methods. This means that an investigation to determine the culprit in the theft occurred according to a single scheme.

At first, the acquirer (the owner of the ATM) represents the amount written off, which the holder disputes. The issuer (bank) requires the acquirer to provide documents from the acquirer. They must confirm the legality of writing off cash. This takes thirty days. Within the set time, the acquirer will provide the documents requested, and the account holder will be acquainted with them. If the client agrees and confirms the fact of the operation, the matter is considered resolved and the investigation is terminated. If the acquirer has submitted documents drawn up with violations or neglected the terms, the amount is debited from its account in favor of the bank (issuer), after which the fact of withdrawal is argued and the reason for its validity is indicated. At this stage, the money is not returned to the owner. After writing off, within forty-five days, if no action has been taken by the acquirer, the stolen amount is credited to the account of the payment card holder.

There are situations when the owner of ATM has not properly reacted to the issuer's demand for documents, since he believes that neither he nor the outlet is guilty of theft, therefore, they are not obliged to bear responsibility for this. In this case, the investigation is conducted in a different way.

The amount, similar to the stolen funds, is debited from the issuer's account by the acquirer. This is documented. After that, the issuer must prove his innocence before the acquirer. If this fails, the ATM owner returns the stolen amount to the cardholder.

There are cases when the acquirer's arguments prove inconclusive or do not fully prove his rightness. In such situations, the responsibility for the theft lies on several sides of the process, and the investigation takes place through a pre-arbitration settlement. For this purpose, the issuer submits an application for consideration of the case within sixty days from the moment of the return payment. In the process act as acquirer and issuer, which prove their case by bringing arguments and evidence. If the parties reach agreement, payment of losses occurs equally, if not, then the matter is transferred to the arbitration committee. It is a commission under the payment system. The Committee considers all the arguments and evidence of the parties, and then draws a conclusion. The decision of the arbitration committee is mandatory for execution. If the parties do not agree with the decision, an appeal is filed, but the amount of the theft in this case must be at least five thousand dollars.

The fraud investigation process with ATMs

Fraud with payment cards related to transactions conducted through ATMs goes through different stages of the investigation. If ATM does not issue cash, the issuer sends a request to the acquirer, which should check whether technical failures are possible when servicing a particular account or if there is an incorrect allocation of notes. This situation is not fraud.

In the event that a fraudulent operation has been performed with the help of an ATM, for example, withdrawing cash, one issuer or together with the acquirer participates in the investigation. The guilt of the cardholder and the points of compromise are clarified. Most of these cases are the responsibility of the issuer, so he anticipates such risks in order to compensate the cardholder for compensation from the insurance company.

Fighting banks with fraud

Fraud with bank cards has led to the fact that many institutions have to fight against criminals. But with this they do not always successfully cope.

For example, the protection of the SRK + technology from TMD Security is most often used to combat skimming. This firm is the leader among the creators of ATM protection from skimming. The success of the technology is explained by the fact that the special protection is installed from the inside, it fits all types of ATM and is easily mounted.

The transition of ATMs to the operating systems "Microsoft Windows", the elementary "Intel" base using TCP / IP protocols, on the contrary, significantly increases the risk of attacks. For this purpose, scammers conduct target (targeted) attacks.

Now more and more often criminals resort to the help of various programs for access to payment cards. They are entered into the ATMs. After that the program itself will collect all the necessary information about the operations. Such an ATM does not differ from a normal ATM. Therefore, an ordinary person can not recognize it.

Fraud with bank cards can be prevented by installing special security tools on ATM. They are a signaling on the doors of the service area and a program that provides information protection.

How to protect yourself from scammers?

Fraud with credit cards or debit plastic devices is currently very common. Therefore, it is necessary to take measures to minimize the risk of theft of financial assets. For this, the following rules must be observed.

1. Do not tell anyone your pin code, do not write it to a card, notepad, etc.

2. Do not transfer your card to another person.

3. Make purchases in trusted stores.

4. Cover the keyboard with the hand while entering the personal code.

5. Do not tell the bank's supposed employees the card details.

6. Do not tell the password that came in the message on the phone.

7. In case of loss or loss of the card, it is necessary to have a number on the mobile phone where it can be immediately blocked.

Nowadays, new types of fraud with bank cards and methods of protection against theft are being invented. Therefore, in addition to the precautions provided by the issuer, merchant or acquirer, it is necessary to comply with all the protection requirements.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.birmiss.com. Theme powered by WordPress.