Illegal transactions with bank cards. A new type of fraud with bank cards

Fraud with bank cards... Be carefull!

There are now a great many types of fraud with bank cards: you can be deceived while using an ATM, when paying with a card in a restaurant, hotel or shopping mall, when paying for purchases made via the Internet or even remotely - by sending an SMS or calling. The most common bank card fraud schemes currently encountered are:

  1. Phone fraud. For example, an SMS can be sent to customers (allegedly from bank employees), which says that a large amount was debited from their bank card, or that the account was blocked for security reasons, and in order to cancel such an operation, you must provide a PIN code or any personal data. The same can be said during a telephone conversation. After that, fraudsters use the data received from the client to write off funds from his bank account.
  2. Fraud on the Internet. For example, to pay for goods or download files, you are prompted to enter your bank card details. After that, you are subscribed to the services of the site without your knowledge, and certain sums of money are regularly withdrawn to pay for such a subscription. Remember also that by entering your data on the site, you provide fraudsters with information about your account, which they can also use to withdraw funds from your card.
  3. Fraud with a bank card through an ATM. This method is the most dangerous. And there can be many options here: the use of special overlays on the keyboard that read PIN codes; installation of miniature video cameras filming the bank client while entering the code; the use of larger cards, which are inserted into the receiver and prevent access to the client's card, at the same time making it impossible to pull it out; installation of simulator ATMs, which look the same as the real ones, but at the same time only remember the data entered by the client and do not issue funds.
  4. Reading data from the magnetic stripe of the card with a skimmer. Most often, this method of fraud occurs when criminals collude with employees of shopping and entertainment establishments (restaurants, cafes, hotels, shops, etc.). When making settlements, an accomplice reads the data of your kata with a skimmer, after which they are transferred to a clone of your card and used to make settlements and withdraw funds. Also, skimmers are often installed in the form of overlays on the ATM.
  5. False bonus programs, lottery, etc. This method consists in the fact that you are notified (via e-mail, SMS or call) that you have allegedly won a prize or become the lucky one who is waiting for a bonus. But in order to receive this prize, you are asked to pay a certain amount from your card as a deposit, tax or membership fee. As a result, the "lucky" runs the risk of losing not only the deposited amount, but also all the money on the account, since the criminals may well use the transferred data for their own purposes.

We have given a far from complete list of methods that fraudsters use to commit crimes - only the most common ones. Currently, such methods are more and more improved, and their number is increasing. How to avoid becoming a victim of scammers and secure your wallet? We will talk about ways to protect your funds below.

Precautions when using bank cards

There are a number general rules using bank cards, following which, you can protect your funds from fraudsters:

Don't know your rights?

  1. Please make sure that your PIN code is not known to third parties. Both bank employees and police officers speak about this everywhere, but many citizens are still very negligent about this rule. Be sure to cover the keyboard when entering the PIN code at the ATM, do not keep it with you, and even more so do not write it on the card itself. Do not pass it on to third parties, even if they are bank employees. Remember that none of them in any situation has the right to require you to give your PIN. If something happens to your card and any data is needed, you may only be asked to visit the bank branch in person. Also, always personalize your card upon receipt.
  2. Before inserting the card into the ATM, visually inspect it for atypical elements. Try to use ATMs located in special rooms, or even better - in a bank branch: as a rule, monitoring of such ATMs is introduced more carefully, which undoubtedly reduces the chances of criminals.
  3. Do not purchase anything from sites whose reputation you are not aware of. Give preference to trusted Internet resources that you have already used or that your friends have used repeatedly. Be sure to check if the site on which you want to place an order has information about the organization that delivers goods or provides services. Conscientious companies do not hide their data. If possible, give preference to those sites where payment for goods (services) is made after they are received (provided).
  4. Control the movement of funds and ongoing operations on your accounts. This can be done, firstly, by connecting a special service via the phone; secondly, through Personal Area online, thirdly, keeping all statements and receipts for your transactions. Such measures will make it possible to detect illegal withdrawal of funds in time and contact the bank's security service.
  5. Inform the bank employees about the loss or theft of a bank card immediately after discovering its loss. The faster you react, the more likely you are to keep your savings safe and sound.
  6. Never leave your bank card unattended. If you pay with it in a shopping mall or pay for dinner, try to keep the card in plain sight. For example, ask an employee to perform card transactions in your presence. Remember that a couple of minutes are enough for criminals to read all the information about your card from the magnetic stripe.
  7. If you often make purchases via the Internet, then, of course, you should not completely abandon this modern method of acquiring goods, but it is best to get a special card to pay in this way and transfer funds to it only in the amount that is needed directly to pay for your order. Even if, despite all the precautions, fraudsters manage to get hold of the data of such a card, all you lose is the amount you were going to spend on the purchase.

Read about what to do if you become a victim of scammers and where to go about this.

Currently, along with cash, payment by bank cards is widely used.

Dear Readers! The article talks about typical ways of solving legal issues, but each case is individual. If you want to know how solve exactly your problem- contact a consultant:

APPLICATIONS AND CALLS ARE ACCEPTED 24/7 and WITHOUT DAYS.

It's fast and IS FREE!

Debit and credit cards not so long ago they are used by the citizens of Russia, therefore, at the moment, 100% protection of theft of funds from their account has not been developed.

Banking organizations regularly complicate funds protection mechanisms, but fraudsters also often come up with new circumvention schemes.

Therefore, if you are the owner of a bank card, then you need to carefully study the issue of fraud with their use.

What it is?

Bank card fraud is the theft of funds from an account by deceiving or misleading the cardholder.

For this are used different ways, but the most effective for a long time has been a "call from a bank representative", with whom we are cooperating.

How do ill-wishers work?

Attackers act on the basis that the majority of citizens, due to their ignorance, have no idea about such a concept as confidentiality.

Cardholders often independently provide all information of interest to attackers, even in writing.

What does the law say?

The legislation deals with the issues of fraud.

It provides for the division of this type of crime into several categories, depending on the stolen funds.

A responsibility

Criminal liability is applied to fraudsters if the amount of theft exceeds 1,000 rubles.

When determining the punishment, the material status of the injured person is taken into account.

Bank card fraud

Fraud schemes are regularly updated, making it almost impossible to keep track of them.

To protect yourself from their actions, you cannot tell anyone the PIN code of the card. In case of withdrawing funds from the account, you must immediately call the bank and block the card.

Kinds

The types of bank card fraud vary. Some criminals act by sending messages, others are accustomed to working through calls, and still others use special devices.

Via mobile bank

Mobile banking fraud became especially widespread a few years ago, when such services first appeared:

  1. The phone receives messages that the citizen's card is blocked, and to unblock it, you need to call the number below.
  2. If a person calls back, then the offender is interested in whether the mobile bank service is connected. If so, he asks for information about the card. With their presence and the use of the Internet, he withdraws money from the account.

By phone

One form of card fraud is over the phone. So, a call comes from the "employee" of the bank, in which the card was issued. The purpose of the call is to confirm confidential information about the card.

Information might be required for various reasons, for example, a system failure occurred, or the card is blocked and you need to specify the requested data to unblock it.

Most citizens who are not aware of this type of fraud provide the requested information.

Only after a while he discovers that funds are regularly debited from the account or a one-time has been withdrawn.

SMS

Credit card fraud includes SMS fraud.

In this case, the cardholder receives messages about the need to provide information to the bank officer for various purposes.

The citizen transfers the information of interest that, in his opinion, is necessary for the bank for further work. However, the information goes into the hands of the attackers.

In the online store

Many people have a question - why the cameras installed on ATMs do not track the installation of skimming? This is due to the fact that cameras are not tracked in real time. They can be viewed later, when the fraudster has already carried out another fraud.

  1. Inspect the ATM carefully before use. If in doubt, you can pry on the keyboard to see if it is real.
  2. Pay attention to whether the device has an anti-skimming overlay - it is presented in the form of a green device with an icon.
  3. Cover the keyboard with your free hand while entering information.
  4. Connect Banking services designed to protect, for example, confirmation of transactions through mobile notification.

With debit

Fraud is also possible in relation to debit cards... Usually, in this case, the withdrawal of funds is carried out in a one-time large amount, which cannot be returned back without going to the court and will not be able to.

Is this possible at Sberbank?

Sberbank is a banking organization whose users live throughout the country.

Despite this, the cards of this bank are also not completely protected from fraud, since citizens provide all the information necessary to fraudsters on their own.

If there was a money transfer

If there was a transfer of funds to another card, then the bank is required to draw up an application for the return of the amount of money.

The reason for the return must be clearly stated by mentioning fraud.

How to recover stolen funds?

The stolen funds can be returned only by filing an application with the law enforcement agencies - the police,

Before introducing you to different kinds modern fraud with plastic cards, I would like to say a few words about how this happens and why is all this possible? In total, there are two types of criminal actions that lead to the theft of money from our card accounts.

  1. Without our participation when data about our cards (their details) are stolen en masse from the servers of banks, online stores, online services, etc. This is rarely done by lone hackers, as a rule, organized criminal groups (OCGs) or cybercriminals are involved. The card details are then sold on the “black markets” on the Internet, and the money is cashed (“laundered”) at the expense of, for example, bays on the card (we will talk about this later).
  2. With our, so to speak, direct "help"... The initiators here are lone scammers. Usually they use very effective methods of social engineering (a method of managing human actions based on the use of the weaknesses of the human factor), i.e. due to various tricks or gimmicks they affect the "weak" points in the human psyche. There is no need to hack something here (apply technical means), since a competently processed person will give the information necessary to the offender himself, and even thank you for this.

Why do people fall for such tricks? This is due disastrously low level financial literacy (but, thank God, they began to study it at state level), ignoring the rules of safe use bank cards when paying for them in regular stores, on the Internet, or when withdrawing funds from them at ATMs, etc. etc. We, in the bulk, are very irresponsible in relation to such a modern banking product as plastic card, and we ourselves come across this.

If someone found out (stole) the data from your card, or your bank suspects such actions, then the card is considered compromised, and the bank may well block it. It is not worth worrying in this case, because, in this way, the bank is trying to protect your own money, although sometimes it overdoes it too much.

How else do banks and the state, represented by the main financial regulator - The central bank RF, they care about our safety. For example, various brochures and articles are produced to promote the “correct” use of card products. And one of the most effective measures was taken by the Central Bank in 2015, when all banks were prohibited from issuing cards without a chip, only with a magnetic stripe. As you know, the latter are much less secure than chip cards, allowing attackers to read information from the magnetic stripe (skimming) and use it to steal funds from the account. Sberbank, for example, has been issuing only chip cards since 2013, which greatly complicates the life of Internet thieves.

There is also a great offer from banks in conjunction with international payment Visa systems and MasterCard is PayWave / PayPass contactless payment technology. Cards equipped with this technology allow you to pay for goods and services without entering a pin code (up to 1000 rubles) and contacting the card with a payment terminal, which is much safer than conventional plastic. Many banks already offer such cards - pay attention to them. The future, in general, belongs to such contactless technologies, now you can pay for purchases in this way from smartphones with built-in NFC chips (by analogy with a card).

Methods (types) of fraud with bank cards

1 theft of bank cards

There have always been scammers who have stolen and will steal valuables in such a banal way. Your wallet was stolen, and there are several of your cards in it, including credit cards. Well, if all the cards are with a chip, then the criminal will need to find out the pin code (we hope that it is not written on the card itself or on a piece of paper that is carefully put into the wallet), without which you cannot pay for the goods in the store, and the money at the ATM is not take off. But if there is an old-style card (with a magnetic stripe), then nothing can be done, it can be cashed in a store by purchasing any product.

By the way, if the card supports PayPass or PayWave instant payment technology, then a purchase worth up to 1,000 can be made without problems (more than 1,000 - only with the introduction of a pin code). Still, a card is not money, but just a piece of plastic, which is the "key" to your money, and it can be quickly blocked.

This method also includes the theft of data from bank cards from the servers of banks, shops, etc., which we have already talked about, but, unfortunately, nothing depends on us here.... The only way to counter this is to insure the risks of theft of the card and its data (risks of its compromise).

Technical tricks

Fraudsters have invented many tricks that are based on the use of various technical gadgets: the simplest and very complex, but quite effective.

1.Skimming

The classic way of deception, which is gradually becoming a thing of the past with the advent of cards with a chip, but nevertheless it is still relevant.

Attackers use special devices to steal data - skimmers, which are discreetly attached to the ATM card reader and copy data from the magnetic stripe of the card when the card is inserted into the card reader slot. An ATM machine with a sticky skimmer is difficult for a layman to distinguish from the original equipment - the same relief and color.

The scammers' arsenal includes an overhead keyboard or a miniature camera required to read / spy on the entered pin code. The copied data is "poured" onto a blank card, from which any amount is withdrawn from the card using the peeped pin-code (within the available limits, of course).

Shimming- a technically advanced type of skimming. In this case, the thinnest flexible board ("shim") is inserted into the card collector using a special carrier card. A thin "shim" the size of a human hair connects to the pins that read data from the card's magnetic stripe. After removing the carrier card, the fraudulent device remains in the ATM and begins its "work" to read data from the cards inserted into the ATM card reader. Further actions for criminals are the same as in the case of classic shimming.


2.Skimming in shops and restaurants

This type of fraud is a variant of the previous one, the only difference is that the seller or the waiter rolls your card on a special miniature manual skimmer. A pin code or other card details are easily recorded on a video camera, after which a clone of your card is also made and money is withdrawn from it.

3.Repeated (double) debit from the card

Not so often, but it still happens when you pay twice for a purchase you made with your card. It's good if you have an SMS-informing service connected(it is not that expensive, but extremely useful and informative), and they learned about it in a timely manner and began to take appropriate measures. Otherwise, you just donate your money to the store (do you have extra money?).

This problem may arise due to a technical problem on the side of the store.(a problem with the terminal or a human factor is a mistake of the seller), the acquiring bank serving the store, or payment system(error in the processing center). It may also be a deliberate action by the seller., although he is unlikely to receive anything from this, the payments are non-cash. Most likely, these are accidental actions due to inexperience or inattention, the very human factor.

4.Sniffering (sniffing and intercepting data)

Fraudsters practice data interception in crowded places(in restaurants, cafes, train stations, etc.) using an analyzer of passing network traffic (sniffer, from the English word to sniff - "to sniff") - a special computer program for intercepting packet data, decoding and analyzing it.

Free and public Wi-Fi is the perfect place to fall victim to an intruder ... Fraudsters can intercept any of your data, including passwords for payment accounts and payment details of your card, if you suddenly decide to pay with it in an online store, and the connection was not properly protected.

5 ATM tape method

Cheap but effective.

A person approaches an ATM, wanting to withdraw money from his card, inserts the card into the card reader and types a pin code on the keyboard. From the side of the dispenser (a device for dispensing money), a characteristic rustle is heard, but for some reason the money is not visible. The person “writes off” this to a malfunction of the ATM, shrugs his shoulders, takes out his card and goes to another ATM.

What's the bottom line? The money was actually withdrawn from the card and even the ATM issued it, but in reality it stuck to the double-sided tape stuck in the dispenser by a fraudster who will take out the money for you. If something like this happened to you, and besides, the ATM gave you a check, then do not rush to leave it.

6 Lebanese loop

The same simplest method as the previous one, but only in this case the card is captured, not the money. An attacker places a so-called "Lebanese loop", a film trap in the form of a pocket or an envelope, into the ATM card reader in advance.

When a person inserts a card into an ATM, then in reality he inserts it into a previously prepared "envelope" made of film, in which it gets stuck. The fraudster, after the person leaves the ATM in bewilderment, takes out the envelope along with the card.

7 phantom ATM

Not such a popular method of card fraud due to its "scale" and high cost. Instead of a real ATM, fraudsters can build a plastic frame with a skimmer built into it.

From the inserted card into the card reader, all the necessary information can be read for its subsequent cashing (see about skimming), and at the same time the attackers will find out your PIN-code typed on the "pseudo-keyboard". Alternatively, the ATM may generally swallow and not return the card. Read more about the phantom ATM here, there are also tips on how not to get into such a scam.

8 stealing data using viruses (trojans)

A very dangerous type of technically perfect fraud, when a smartphone or computer is "infected" with a virus program, for example, a Trojan. This is such a smart "digital pest" that it can not only spoil the data on your computer or "steal" valuable information, but also act on behalf of the owner of the phone (or else there will be!).

For example, you installed a free program with GooglePlay on your android, and with it a virus entered your smartphone... Your phone number is linked to the card, i.e. the mobile banking service is connected to your phone. So, a Trojan accidentally installed by you can, using SMS banking commands, find out your balance, send an SMS command to transfer from your card to another, and independently respond by SMS to a message confirming the operation. Moreover, the owner of the smartphone may not see any signs of activity, the virus will simply hide them from him, or he will see them, but it will be too late.

  • Many clients of Sberbank have come across such fraud(and not only him), I am glad that the maximum daily transfer limit through the Sberbank mobile bank is 8 thousand rubles, otherwise the virus would have removed all savings.

Alternatively, the virus can transfer money from your card account to the account of a certain cell number, and then the scammers will cash out this account. How to protect yourself from such problems, study the material on the above link.

9.Creating a duplicate SIM card

Knowing your card number in order to withdraw money from it is not enough, usually any operation is accompanied by additional identification of the cardholder (3-D Secure) when the bank sends one-time password to the phone number attached to the card, and the cardholder must confirm this password by entering it in the appropriate form.

Thus, any operation with a card (on the Internet or through a mobile bank) is impossible without access to the phone associated with it.

What are attackers doing? They go to a cellular salon and make a duplicate SIM card. Just like that, without the passport of the owner of the SIM card, a duplicate cannot be made, therefore there is a criminal conspiracy of fraudsters and sellers of a cellular salon. After creating a duplicate, access to the "attacked" card is blocked.

To steal money from a card using the commands of a mobile bank, it is not even necessary to know the card number, see, for example, with which commands you can pay cellular communication from Sberbank cards. And if the criminal already knows the card details (for example, he peeped them), then having made a duplicate, he can transfer a large amount of funds to his accounts via the Internet bank and look for the wind in the field. Do not forget that with the help of your cellular phone, an attacker will be able to gain access to mail accounts, and they are also payment accounts, for example, the Yandex.Money wallet is tied to Yandex.Mail.

This is a very insidious fraud, so it is better to adhere to certain recommendations so as not to fall for it, follow the same link for a more detailed description of the fraud.

Methods of influencing the psyche and the human factor (social engineering)

Knowledge (including financial literacy), personal experience and the experience of other people who have fallen for similar divorces. We are helped by numerous cases of deception, which are described in a huge number of reviews on the Internet, as well as many articles that reveal the tricks of small bandits. It is better if we learn not from our own, but from someone else's, albeit bitter, experience.

1 SMS fraud

A typical example of SMS fraud- this is the receipt of an SMS message from an alleged bank number about the blocking of funds on your card due to an attempt to unauthorized access to them, with a recommendation to call the number given in this message.

By phone, you will be informed that in order to unblock the money on the card account, you must transfer its details: card number, full name, expiration date and a three-digit secret code on the back of the plastic (CVV / CVC).

Thus, in order to save his money, the unlucky cardholder transmits all important data - he is not given time to think and analyze the situation, which is the calculation of cunning intruders.

Moreover, the scammers will also ask to dictate to them the password that came to the victim's cell phone (and this is the one-time password with which they need to confirm the operation of transferring money from the attacked card). If a person is not blind, then in the received SMS he will see a phrase about the inadmissibility of transferring a one-time password to an unauthorized person. But he will read it only later, when he realizes that a decent amount was taken from his card account (well, if not all).

Usually, after such cases, people begin to figure out what's what, but it happens that they repeatedly fall for the same divorce.

2.phishing

A very common type of fraud, when, for example, an Internet user is "shoved" a pseudo-site of his Internet bank, which is very similar to the original , on which in every possible way they will try to fish out (fish out) his card data. Hence the name of this method of fraud, translated from English. "Fishing" is fishing.

In the form of an attachment, the same methods of social engineering are used as in the previous method, the main thing is that the person goes to a fake site and believes that he is on the original resource. A link to such fake sites may contain, for example, an e-mail from a fraudster, made in a typical bank form (colors, logo, etc.), and the text will encourage you to follow it, scaring you with possible problems with money on your card accounts.

At the same time, the names of such sites are outwardly similar, but still slightly differ. Find, for example, the differences between the original name of the site sberbank.ru and the pseudo site sbepbank.ru. As you can see, the differences are not so easy for the "inexperienced" eye to notice.

3.Fill on the map

The well-known method of "laundering" (cashing out) dirty money stolen from bank accounts, based on the scheme of transfer (bay) to the card of a person ("drop" - in fraudulent terminology), who agreed to withdraw the money credited to him for a decent reward and give it back to a certain person... Having bought into such offers, a person risks twice.

  1. Firstly, he violates the law, and if he is caught, and this will not be too much for the relevant labor authorities, then you can get a real term of up to 7 years.
  2. Secondly, he runs the risk of getting caught by a pseudo-filler who fraudulently lures an advance payment from the victim and hides with the money received. Basically, advertisements about the gulf are put on the map by pseudo-fillers, and the real representatives of this illegal business are silent like a fish, and work only with trusted people. That is why so often people are caught in the hope of making decent money by providing their card for the bay and closing their financial holes, but in reality they are deprived of their last money.

4. Buyers-scammers and sellers-scammers on message boards (including Avito)

Fraudulent sellers act quite simply - they ask to transfer the advance payment to their card, and this is where the contact with the seller ends. It evaporates without a trace. Keep in mind that it will no longer be possible to return the money transferred by you through the bank, since you transferred it of your own free will.

But the fraudulent buyer is already a more "cunning beast" ... Such people offer to transfer an advance payment for the goods and beg from an unsuspecting victim for all the card details (although only its number is sufficient for the transfer). Moreover, they have the audacity to call again and ask for the one-time password that comes to the victim's phone, which suggests that the fraudsters are already halfway to their goal of stealing money from the card account.

Tags

Online stores have become the most popular place to purchase goods due to the simplicity and availability of the procedure. However, this is contributing to the emergence of improved fraudulent theft. Fraudsters are attracted by many trading platforms offering a huge range of products at affordable prices.

On the Russian market The Avito Internet site is very popular, on which any person - a citizen or an organization, can place an advertisement for the sale of goods. The registration procedure on the site is quite simple: it is enough to provide contact information when creating your own account. One of the types of fraud on the site is fraud on Avito with bank cards, which will be discussed in this article.

Why does Avito attract scammers?

Easy to create an account every day on the site there are "fake" ads offering to purchase goods for low prices ... Thus, such an ad attracts a large audience of potential buyers. The site also lacks a seller rating system, which opens up opportunities for scammers. The accounts of unscrupulous sellers are blocked by the site's management only when the victim makes a complaint. However, there is no need to create a new account - a minute registration and scammers are again ready to look for easy prey.

Fraudsters modify and develop new schemes and operations. The most common are:

  • Avito prepaid scam when the purchase of goods takes place on an advance payment with its further sending using the delivery service;
  • payment card fraud- when money is withdrawn from credit cards of buyers, which provide information about secret codes;
  • scams with the purchase of cars and real estate, as well as the lease of space;
  • job fraud(paid phone calls, participation in competitions on a paid basis, announcements from network companies, provision of babysitting services).

It is better to get to know individual schemes better so as not to fall on the hook of scammers in the future.

Prepaid cheating scheme

This type of fraud appeared on Avito one of the first, and formed the basis for a new type of fraud with bank cards. . It represents the payment of an advance payment for a product that does not exist.

How the scheme works: an attacker places an advertisement for the sale of a specific product. The text of the ad indicates the impossibility of a personal meeting for the transfer of goods with the buyer due to employment. However, if payment is made in advance (in advance) to the card account, the seller will be able to send the purchased goods by mail or delivery service.

How to avoid being cheated and insured against prepaid fraud?

  1. Care must be taken to ensure that the pictures of the goods in the ads were real... If in doubt about authenticity, the seller should be asked to upload additional images taken from different angles. If the seller rejects your offer in all possible ways, you can ask to contact him by Skype to make sure that the product actually exists.
  2. If in doubt, you can try to check the phone number specified by the seller using various search engines in the Internet. Often scammers change the phone number for each of their operations, for each product, but it's still worth checking. Perhaps the number has already been "lit up" on the Internet and those who have been caught by the tricks of the scammers have left negative reviews indicating a specific number.
  3. If you buy an expensive item from a distance, ask the seller to pay by cash on delivery... With this calculation, the money for the purchase is paid to the shipping company after receiving the goods. V in this case you incur additional expenses, but this will guarantee that you will not become a victim of criminal encroachment.

Fraud on Avito with cards

This scam is relatively new on the Internet and affects the rights of those who sell their goods. After placing the goods on the site, after a while, a buyer appears who wants to purchase it on any offered conditions, and is ready to immediately transfer the money to a credit card.

The seller, satisfied with the quick sale, provides the card details for payment. After that, unscrupulous buyers in any way try to find out the secret information associated with a bank card. Upon receiving secret data, fraudsters automatically gain access to the money on the card account.

Remember! It is forbidden to transfer confidential data associated with your bank card to other persons: data on the back of the card, codes transmitted by the bank via SMS to your phone.

Also, in no case should you enter data in an ATM transmitted by swindlers. Entering data gives criminals access to your funds. If you have a debit card, you can lose your entire salary, and if you have a credit card, you can unwittingly become a borrower and be liable for loans that were taken by fraudsters.

The procedure for proving the fact of fraud is very time-consuming and time-consuming.

How to insure against bank card fraud?

To make payments for the purchased goods using a bank card, the following data is required:

  • Full name, to whom the recipient's card is open;
  • card number, which is indicated on the front side.

To make settlements through another banking organization, other details are required, which can be clarified with a support employee.

What if you become a victim of a scam on Avito?

Both the seller and the buyer can become victims of fraud, so everyone should be careful: do not provide unnecessary information, confidential codes, and when purchasing expensive goods, it is better to make a purchase in real life or in trusted online stores that value their reputation and have only positive reviews.

The main question that interests the deceived is where to apply for the protection of their rights. If you are a victim of scammers, first of all, you need to write a statement to the police about the fact of fraud without wasting time, since such crimes are better solved "hot on the trail." At the nearest police station, the district officer on duty must provide all correspondence with the fraudster, and in the application indicate all the circumstances of the incident.

The second step is to contact the administration of the Internet site to find out known information about the seller / buyer who fraudulently misappropriated your funds. In a letter to the site management, you must ask to block the account in order to avoid similar cases in the future.

The next step is to contact the banking organization in which the card was opened. Often, the processing of transfers by banks is carried out within several days, therefore, immediately after the disappearance of money from the personal account of the card was discovered, it is necessary to contact the bank. If the transfer has not been completed until the end, you will need the client's passport and a statement on his behalf to cancel it. Cash can be returned to the card, but this rarely happens. If the money is not returned, law enforcement agencies will have to investigate the fact of theft.

Liability for fraud has not changed in 2019. The main corpus delicti provides for a sanction: from a fine to imprisonment for a period of 2 years. For a qualified staff, the maximum liability is provided in the form of imprisonment for up to 10 years.

Video: How they wanted to breed me on Avito

Video: Another way of scamming on Avito

Features of investigation of Internet thefts

Since the World Wide Web is global in nature, the police investigate together with all other structures of law enforcement agencies that investigate economic crimes. This is the only way the investigator can make a full assessment of the fact of fraud.

Such close cooperation makes it possible to find out the circumstances of the committed criminal act, to identify the location of the fraudsters, and to speed up operational and investigative measures. Thanks to joint work, the most effective methods of combating fraud on the Internet are being developed, citizens are promptly notified of all kinds of fraudulent schemes.

Mobile banking is a popular service that allows you to manage monetary assets and pay bills without significant time investment. Using the capabilities of the information network to move financial flows saved citizens from the need to visit bank branches and stand in queues. The downside of the service is new types of financial fraud, including fraud with bank cards through a mobile bank.

What methods are used by criminals to steal finances, and how not to become a victim of hackers, read this article.

Banks protect clients' personal accounts by any means available, but the number of thefts is steadily increasing. Cybercriminals find security vulnerabilities, and the frivolous behavior of mobile banking users often helps.

A distinctive feature of the services offered is binding to the user's phone number. But, convenient way registration easily turns into a "master key" for hacking, when, connecting to an online bank and then switching to a new number or another operator, users forget to notify financial institutions.

As a result of re-registration, the number becomes the property of an unauthorized person, with whom the bank continues to correspond, send messages about the status of the account and change the password. Once in the hands of criminals, such information becomes decisive when choosing a victim and a method of hacking an online account.

Phone: rules for safe use

Mobile banking fraud is less likely if certain phone rules are followed.

Having lost a phone with a connected service package or an installed application:

  • Talk to mobile operator with a request to block the SIM card.
  • Report the incident to the Bank's Security Service for the subsequent disconnection of the service.

Having changed the number, with the "Mobile Bank" function activated, notify the branch of the servicing bank about the incident and ask to disable the service.

Safe handling of the gadget:

  • do not leave the phone in the wrong hands;
  • set the original password;
  • do not connect the phones of unauthorized persons to the Internet service;
  • when installing extensions and applications, do not disregard the capabilities of the installed programs;
  • be vigilant if the installed program requires you to agree to automatically send SMS or access the network.

In case of an unplanned disconnection of the SIM card, contact the operator to find out the reasons. Do not use links, updates and applications that come to the email address, including on behalf of the bank.

Important! Financial institutions do not send letters and do not call to report / clarify data on the state of accounts. To obtain confidential information, the client's personal presence at the bank branch is practiced.

Types of cyber fraud

The emergence of the Internet and the transition of banks to online service led to the emergence of online scammers specializing in theft of funds from bank accounts.

One of the most popular methods of theft through a mobile bank is a fraud - phishing, which consists in luring network users to fake banking sites, false payment systems, online stores.

Phishing are cybercrimes:

  • based on the distribution of malicious programs;
  • directing users to fake Internet resources;
  • reading personal data (PIN codes, passwords, logins).

In addition to phishing sites, criminals use: calls and messages to phones, sending letters that activate hacking programs to e-mail addresses on behalf of the bank.

Online phishing

This type of fraud refers to online banking, and involves attracting users to phishing (fake) Internet resources. The purpose of the criminals is to read the private data of users from bank payment instruments.

Pay attention to the site's reputation!

Phishing software is usually offered for download on dubious Internet sites, after which malicious programs reach smartphones and phones, activate and steal users' money.

New methods of fraud

How do scammers withdraw money via mobile banking?

The ingenuity of criminals knows no bounds. The last know-how of hackers is the sending of MMS messages, which open a program that reads information and illegally withdraws money from accounts. A distinctive feature of the invention is the blocking of notifications of the Mobile Bank informing about the movement of funds.

Malicious programs disguise themselves as postcards, video files, updates for mobile applications... Then the cracker virus simulates a malfunction of the gadget and demands to restart the phone.

Rebooting the device automatically activates the program that penetrates the RAM and copies the data: the login and password of the online bank, and transfers the data to an unauthorized person. SMS messages about ongoing transactions are also forwarded to the phones of the fraudsters, so that the victim of the robbery does not suspect anything and remains in complete ignorance for a long time.

Protection methods

  • ignore and delete messages from unknown numbers;
  • install licensed anti-virus programs on phones (smartphones).

To create additional control over ongoing transactions and receive parallel reports, contact your financial institution with a request to link the Mobile Bank to your email.

Sberbank online service - advantages and disadvantages

Package of services online service Sberbank is an SMS service that informs about receipts and withdrawals of funds from an account, as well as a list of commands for individual numbers for standard payments - phone replenishment, transfer between personal cards.

Internet resource activation-mandatory requirement for access to the service, along with by plastic card and a cooperation agreement linking and linking accounts to a phone number. Mobile Internet Sberbank's service is convenient, but not devoid of vulnerabilities.

Linking to a foreign number

There is a possibility of linking an extraneous number to mobile bank without the knowledge of the owner. Similar situations arise with accidental or deliberate mistakes of bank employees. This allows a fraudster who has appropriated a mobile bank to steal money with impunity, since the real owner of the account remains in the dark.

To return the lost money, the client will need an official document confirming the connection of a third-party number. At the same time, without actual evidence of fraud, it is difficult for the owner of a mobile bank to count on a positive solution to the issue and a quick return of the stolen one.

Switching to a new operator or number

Such situations are possible: when changing or re-registering a number, and there is no application from the user about changing confidential data. One should not exclude the influence of the human factor - an accidental or deliberate mistake of the service personnel.

How to issue a cancellation of a room? Write two statements asking you to disconnect the old and connect the new number. Otherwise, the possibility of uncontrolled connection to the mobile bank of eight extraneous numbers will remain.

The money stolen in this way can be returned in rare cases, proving the guilt of the operators in the deliberate fraud with the number.

Disadvantages of the system

The SMS notification system and online banking are organized differently in different banks, and each has its strengths and weaknesses. Sberbank clients fall prey to fraudsters for two reasons:

  • Making transactions through the Mobile Bank, while still being able to transfer significant amounts, does not require entering data from a bank card,
  • Anyone can connect the mobile bank without checking the reputation of future users.

The possibility of a negligent or dishonest attitude of bank employees to the performance of their duties should not be ruled out.

How to get back the lost money?

What happened happened. You can return the lost funds. Take action by pulling yourself together and ending your panic.
Remember, by losing your temper, you are playing into the hands of criminals who expect such a reaction.

Theft of funds from an account is possible without the intruders knowing the pin code and bank card, therefore, if you suspect a hack, promptly contact the bank providing financial services, or contact the nearest branch with a request to block the account and provide the available information about the balance.

Upon confirmation of theft:

  • Study the agreement concluded with the financial institution for servicing the account, and pay attention to the mandatory actions of the bank in such circumstances.
  • Submit a written complaint asking you to investigate suspicious transactions.
  • Print your account statement and attach it to your claim.

The written statement must contain: a description of the current situation and a list of evidence indicating that the applicant was not involved in suspicious transactions.

As a result of the client's request, a prerequisite is created for requiring the receiving bank to return the illegally received funds. The application is accompanied by documents indicating the illegality of the financial transactions specified in the claim.

The relevant services of the receiving bank, within 45-90 days, consider and study the request for a refund, after which they decide on further actions.

Security actions

During the period of consideration of the claim by the acquiring bank, the security services of the banks involved in the investigation study the documents, check the reputation of the one who filed the complaint and received remittance sides.

During the investigation, employees of the services, without fail, communicate with the client's employers, neighbors, relatives, since the party that reported the theft is the first to be suspected of fraud.

Therefore, when filing a claim with the bank, be prepared for the fact that you will have to repeatedly prove your own non-involvement in the transactions.

In case of receipt of proof of the innocence of the author of the claim and the fraudulent nature of the actions of third parties, the receiving bank returns the stolen funds to the owner in statutory term.


Additional actions

When submitting a claim to the bank, file a report with the police as well. The document must contain a detailed description of the current situation, with a detailed indication of the circumstances surrounding the incident. The document is submitted in duplicate, for registration in law enforcement and marked with receipt, for yourself.

Based on the submitted applications, the cyber police are taking measures to catch the intruders. In particular, police officers:

  • contact the bank to provide information on the transactions being investigated;
  • when cashing out money through ATMs / terminals, they examine video from surveillance cameras, interview witnesses, and the victim.

As a rule, such investigations are carried out in parallel and in cooperation with the bank's security service.

In the absence of a result of the investigation, the victim has the right to submit a repeated complaint to the bank, on the basis of which a repeated appeal to the recipient's bank is drawn up, with a request for a refund.