• A- A A+

Cyber Fraud Awareness

Frauds/Cybercrimes perpetrated through various schemes/scams.

We are witnessing the incidence of a number of cybercrimes wherein the criminals and fraudsters are resorting to different kind of modus operandi for perpetrating cybercrimes routed through the banking channels and payment gateways.

Some of the modus of operandi followed by the fraudsters and criminal through various schemes/scams are given under Modus Operandi:

  1. Online job fraud
  1. Victims are lured through part time job offers and other advertisements on internet and /or messaging platforms, etc and are promised high commissions or high return such as doubling of money in short span of time, the advertisement/ SMS messages usually contain a link, which directly prompt for a chat.
  2.  Further, mobile applications, bulk SMS messages, SIM-box-based virtual private network (VPNs), phishing website, cloud services, virtual accounts in banks, application programming interfaces (APIs), etc, are used to carry out financial frauds.

 

What is SIM-Box Fraud?

In SIM Box fraud scenarios, international calls are redirected over the Internet to a cellular device that inserts them back into the cellular network through SIM Boxes equipped with multiple low-cost prepaid SIM cards or even unpaid SIMs acquired with fake identities.

 

  •  
  1.  For any job offer, including from overseas entities, first confirm the identity and contact details of the employing company / its representative.
  2.  Always remember that a genuine company offering a job will never ask for money for offering the job.
  3.  Do not make payments on unknown job search websites.

 

 

  1. Money circulation / Ponzi / Multi-Level Marketing (MLM) schemes fraud
  1.  Fraudsters use MLM / Chain Marketing / Pyramid Structure schemes to promise easy or quick money upon enrolment / adding of members.
  2.  The schemes not only assure high returns but also pay the first few installments (EMIs) to gain confidence of gullible persons and attract more investors through word of mouth publicity.
  3.  The schemes encourage addition of more people to the chain / group. Commission is paid to the enroller for the number of people joining the scheme, rather than for the sale of products.
  4.  This model becomes unsustainable after some time when number of persons joining the scheme starts declining. Thereafter, the fraudsters close the scheme and disappear with the money invested by the people till then.

 

Precautions:

  1. Returns are proportional to risks. Higher the return, higher is the risk.
  2. Any scheme offering abnormally high returns (40-50% p a) consistently, could be the first sign of a potential fraud and caution needs to be exercised.
  3. Always notice that any payment / commission / bonus / percentage of profit without the actual sale of goods / service is suspicious and may lead to a fraud.
  4. Do not be tempted by promises of high returns offered by entities running Multi-Level Marketing / Chain Marketing / Pyramid Structure schemes.
  5. Acceptance of money under Money Circulation / Multi-level Marketing / Pyramid structures is a cognizable offence under the Prize Chits and Money Circulation Schemes (Banning) Act, 1978.
  6.  In case of such offers or information of such schemes, a complaint must be immediately lodged with the State Police.

 

  1. Phishing links

 

  1. Fraudsters create a third-party phishing website which looks like an existing genuine website, such as - a bank’s website or an e-commerce website or a search engine, etc.
  2.  Links to these websites are circulated by fraudsters through Short Message Service (SMS) / social media / email / Instant Messenger, etc.
  3. Many customers click on the link without checking the detailed Uniform Resource Locator (URL) and enter secure credentials such as Personal Identification Number (PIN), One Time Password (OTP), Password, etc., which are captured and used by the fraudsters.

Precautions:

  1.  Do not click on unknown / unverified links and immediately delete such SMS / email sent by unknown sender to avoid accessing them by mistake in future.
  2.  Unsubscribe the mails providing links to a bank / e-commerce / search engine website and block the sender’s e-mail ID, before deleting such emails.
  3.  Always go to the official website of your bank / service provider. Carefully verify the website details especially where it requires entering financial credentials. Check for the secure sign (https with a padlock symbol) on the website before entering secure credentials.
  4.  Check URLs and domain names received in emails for spelling errors. In case of suspicion, inform

 

  1. Vishing Calls

 

  1. Imposters call or approach the customers through telephone call / social media posing as bankers / company executives / insurance agents / government officials, etc. To gain confidence, imposters share a few customer details such as the customer’s name or date of birth.
  2.  In some cases, imposters pressurize / trick customers into sharing confidential details such as passwords / OTP / PIN / Card Verification Value (CVV) etc., by citing an urgency / emergency such as - need to block an unauthorised transaction, payment required to stop some penalty, an attractive discount, etc. These credentials are then used to defraud the customers

Precautions:

  1. Bank officials / financial institutions / RBI / any genuine entity never ask customers to share confidential information such as username / password / card details / CVV / OTP.
  2. Never share these confidential details with anyone, even your own family members, and friends.

 

  1.  Frauds using online sales platforms

 

  1. Fraudsters pretend to be buyers on online sales platforms and show an interest in seller’s product/s. Many fraudsters pretend to be defense personnel posted in remote locations to gain confidence.
  2. Instead of paying money to the seller, they use the “request money” option through the Unified Payments Interface (UPI) app and insist that the seller approve the request by entering UPI PIN. Once the seller enters the PIN, money is transferred to the fraudster’s account.

  Precautions:

  1.  Always be careful when you are buying or selling products using online sales platforms.
  2.  Always remember that there is no need to enter PIN / password anywhere to receive money.
  3.  If UPI or any other app requires you to enter PIN to complete a transaction, it means you will be sending money instead of receiving it.

 

  1. Frauds due to the use of unknown / unverified mobile apps

 

  1. Fraudsters circulate through SMS / email / social media / Instant Messenger, etc., certain app links, masked to appear similar to the existing apps of authorized entities.
  2. Fraudsters trick the customer to click on such links which results in downloading of unknown / unverified apps on the customer’s mobile / laptop / desktop, etc.,
  3. Once the malicious application is downloaded, the fraudster gains complete access to the customer’s device. These include confidential details stored on the device and messages / OTPs received before / after installation of such apps.

Precautions:

  1. Never download an application from any unverified / unknown sources or on being asked/ guided by an unknown person.
  2. As a prudent practice before downloading, check on the publishers / owners of the app being downloaded as well as its user ratings etc.
  3.  While downloading an application, check the permission/s and the access to your data it seeks, such as contacts, photographs, etc. Only give those permissions which are absolutely required to use the Desired application.

 

  1.  ATM card skimming

 

  1.  Fraudsters install skimming devices in ATM machines and steal data from the customer’s card.
  2.  Fraudsters may also install a dummy keypad or a small / pinhole camera, well-hidden from plain sight to capture ATM PIN.
  3.  Sometimes, fraudsters pretending to be other customer standing near-by gain access to the PIN when the customer enters it in an ATM machine.
  4. This data is then used to create a duplicate card and withdraw money from the customer’s account.

       Precautions:

  1. Always check that there is no extra device attached, near the card insertion slot or keypad of the ATM machine, before making a transaction.
  2. Cover the keypad with your other hand while entering the PIN.
  3. NEVER write the PIN on your ATM card.
  4. Do NOT enter the PIN in the presence of any other / unknown person standing close to you.
  5. Do NOT give your ATM card to anyone for withdrawal of cash.
  6. Do NOT follow the instructions given by any unknown person or take assistance / guidance from strangers / unknown persons at the ATMs.
  7. If cash is not dispensed at the ATM, press the ‘Cancel’ button and wait for the home screen to appear before leaving the ATM.

 

  1. Frauds using screen sharing app / Remote access
  1. Fraudsters trick the customer to download a screen sharing app.
  2. Using such app, the fraudsters can watch / control the customer’s mobile / laptop and gain access to the financial credentials of the customer.
  3. Fraudsters use this information to carry out unauthorised transfer of funds or make payments using the customer’s Internet banking / payment apps.

Precautions

  1. If your device faces any technical glitch and you need to download any screen sharing app, deactivate / log out of all payment related apps from your device.
  2.  Download such apps only when you are advised through the official Toll-free number of the company as appearing in its official website. Do not download such apps in case an executive of the company contacts you through his / her personal contact number.
  3.  As soon as the work is completed, ensure that the screen sharing app is removed from your device.

 

  1. SIM swap / SIM cloning

 

  1.    Fraudsters gain access to the customer’s Subscriber Identity Module (SIM) card or may obtain a duplicate SIM card (including electronic-SIM) for the registered mobile number connected to the customer’s bank account. 
  2. Fraudsters use the OTP received on such duplicate SIM to carry out unauthorised transactions.
  3.  Fraudsters generally collect the personal / identity details from the customer by posing as a telephone / mobile network staff and request the customer details in the name of offers such as - to provide free upgrade of SIM card from 3G to 4G or to provide additional benefits on the SIM card.

Precautions:

  1. Never share identity credentials pertaining to your SIM card.
  2. Be watchful regarding mobile network access in your phone. If there is no mobile network in your phone for a considerable amount of time in a regular environment, immediately contact the mobile operator to ensure that no duplicate SIM is being / has been issued for your mobile number.

 

  1.  Frauds by compromising credentials on results through search engines

 

  1. Customers use search engines to obtain contact details / customer care numbers of their bank, insurance company, Aadhaar updation centre, etc. These contact details on search engines often do NOT belong to the respective entity but are made to appear as such by fraudsters.
  2.  Customers may end up contacting unknown / unverified contact numbers of the fraudsters displayed as bank / company’s contact numbers on search engine.
  3.  Once the customers call on these contact numbers, the imposters ask the customers to share their card credentials / details for verification.
  4. Assuming the fraudster to be a genuine representative of the RE, customers share their secure details and thus fall prey to frauds.

Precautions:

  1. Always obtain the customer care contact details from the official websites of banks / companies.
  2. Do not call the numbers directly displayed on the search engine results page as these are often camouflaged by fraudsters.
  3. Please also note that customer care numbers are never in the form of mobile numbers.

 

  1.  Scam through QR code scan

 

  1. Fraudsters often contact customers under various pretexts and trick them into scanning Quick Response (QR) codes using the apps on the customers’ phone.
  2. By scanning such QR codes, customers may unknowingly authorize the fraudsters to withdraw money from their account.

Precautions:

  1. Be cautious while scanning QR code/s using any payment app. QR codes have account details embedded in them to transfer money to a particular account.
  2. Never scan any QR code to receive money. Transactions involving receipt of money do not require scanning barcodes / QR codes or entering mobile banking PIN (m-PIN), passwords, etc.

 

  1.  Impersonation on social media

 

  1.  Fraudsters create fake accounts using details of the users of social media platforms such as Facebook,  Instagram, Twitter, etc.
  2. Fraudsters then send a request to the users’ friends asking for money for urgent medical purposes, payments, etc.
  3. Fraudsters, using fake details, also contact users and gain users’ trust over a period of time. When the users’ share their personal or private information, the fraudsters use such information to blackmail or extort money from the users.

Precautions:

  1. Always verify the genuineness of a fund request from a friend / relative by confirming through a     phone call / physical meeting to be sure that the profile is not impersonated.
  2.  Do not make payments to unknown persons online.
  3.  Do not share personal and confidential information on social media platforms.

 

  1.  Juice jacking

 

  1. The charging port of a mobile can also be used to transfer files / data.
  2. Fraudsters use public charging ports to transfer malware to customer phones connected there and take control / access / steal data sensitive data such as emails, SMS, saved passwords, etc. from the customers’ mobile phones (Juice Jacking).

Precaution:

  1. Avoid using public / unknown charging ports / cables.

 

  1.  Lottery fraud Modus Operandi
  1. Fraudsters send emails or make phone calls that a customer has won a huge lottery. However, in order to receive the money, the fraudsters ask the customers to confirm their identity by entering their bank account / credit card details on a website from which data is captured by the fraudsters.
  2.   Fraudsters also ask the customers to pay taxes/ forex charges / upfront or pay the shipping charges, processing / handling fee, etc., to receive the lottery / product.
  3. Fraudsters in some cases, may also pose as a representative of RBI or a foreign bank / company / international financial institution and ask the customer to transfer a relatively small amount in order to receive a larger amount in foreign currency from that institution.
  4.  Since the requested money is generally a very small percentage of the promised lottery / prize, the customer may fall into the trap of the fraudster and make the payment.

Precautions

  1. Beware of such unbelievable lottery or offers - nobody gives free money, especially such huge amounts of money.
  2.  Do not make payments or share secure credentials in response to any lottery calls / emails.
  3.  RBI never opens accounts of members of public or takes deposits from them. Such messages are fraudulent.
  4.  RBI never asks for personal / bank details of members of public. Beware of fake RBI logos and messages.
  5.  Never respond to messages offering / promising prize money, government aid and Know Your Customer (KYC) updation to receive prize money from banks, institutions etc

General precautions

  1.  Be wary of suspicious looking pop ups that appear during your browsing sessions on internet.
  2.  Always check for a secure payment gateway (https:// - URL with a pad lock symbol) before making online payments / transactions.
  3.  Keep the PIN (Personal Identification Number), password, and credit or debit card number, CVV, etc., private and do not share the confidential financial information with banks/ financial institutions, friends or even family members.
  4.  Avoid saving card details on websites / devices / public laptop / desktops.
  5.  Turn on two-factor authentication where such facility is available.
  6.  Never open / respond to emails from unknown sources as these may contain suspicious attachment or   

Phishing links.

  1.  Do not share copies of cheque book, KYC documents with strangers. For device / computer security
  2.  Change passwords at regular intervals.
  3.  Install antivirus on your devices and install updates whenever available.
  4.  Always scan unknown Universal Serial Bus (USB) drives / devices before usage.
  5.  Do not leave your device unlocked.
  6.  Configure auto lock of the device after a specified time.
  7.  Do not install any unknown applications or software on your phone / laptop.
  8.  Do not store passwords or confidential information on devices.

For safe internet browsing

  1.  Avoid visiting unsecured / unsafe / unknown websites.
  2.  Avoid using unknown browsers.
  3.  Avoid using / saving passwords on public devices.
  4.  Avoid entering secure credentials on unknown websites/ public devices.
  5.  Do not share private information with anyone, particularly unknown persons on social media.
  6.  Always verify security of any webpage (https:// - URL with a pad lock symbol), more so when an email or SMS link is redirected to such pages. For safe internet banking
  7. Always use virtual keyboard on public devices since the keystrokes can also be captured through compromised devices, keyboard, etc.
  8.  Log out of the internet banking session immediately after usage.
  9.  Update passwords on a periodic basis.
  10.  Do not use same passwords for your email and internet banking.
  11.  Avoid using public terminals (viz. cyber cafe, etc.) for financial transactions.

For safe internet banking

  1.  Always use virtual keyboard on public devices since the keystrokes can also be captured through compromised devices, keyboard, etc.
  2.  Log out of the internet banking session immediately after usage.
  3.  Update passwords on a periodic basis.
  4.  Do not use same passwords for your email and internet banking.
  5.  Avoid using public terminals (viz. cyber cafe, etc.) for financial transactions.

 

 Factors indicating that a phone is being spied

  1.  Unfamiliar applications are being downloaded on the phone.
  2.  There is a faster than usual draining of phone battery.
  3.  Phone turning hot may be a sign of someone spying by running a spyware in the background.
  4.  An unusual surge in the amount of data consumption can sometimes be a sign that a spyware is running in the background.
  5.  Spyware apps might sometimes interfere with a phone’s shutdown process so that the device fails to turn off properly or takes an unusually long time to do so.
  6.  Note that text messages can be used by spyware and malware to send and receive data. Actions to be taken after occurrence of a fraud
  7.  Block not only the debit card / credit card but also freeze the debit in the bank account linked to the card by visiting your branch or calling the official customer care number available on the bank’s website. Also, check and ensure the safety of other banking channels such as Net banking, Mobile banking etc., to prevent perpetuation of the fraud once the debit/ credit cards, etc., are blocked following a fraud.
  8.  Dial helpline number 155260 or 1930 or report the incident on National Cybercrime Reporting Portal (www.cybercrime.gov.in). Reset Mobile: Use (Setting-Reset-Factory Data) to reset mobile if a fraud has occurred due to a data leak from mobile. Precautions related to Debit / Credit cards
  9.  You should deactivate various features of credit / debit card, viz., online transactions both for domestic and international transactions, in case you are not going to use the card for a while and activate the same only when the card usage is required.
  10.  Similarly, Near Field Communication (NFC) feature should be deactivated, if the card is not to be used.
  11.  Before entering PIN at any Point of Sale (POS) site or while using the card at an NFC reader, you must carefully check the amount displayed on the POS machine screen and NFC reader
  12. Never let the merchant take the card away from your sight for swiping while making a transaction.
  13.  Cover the keypad with your other hand while entering the PIN at a POS site / ATM.

For password security

  1.  Use a combination of alphanumeric and special characters in your password.
  2.  Keep two factor authentications for all your accounts, if such facility is available.
  3.  Change your passwords periodically.
  4.  Avoid having you date of birth, spouse name, car number etc. as passwords.

Voice Modus Operandi

Click here to Listen
×

“Compare and Shop is a Service provided by Cheggout Services Pvt Ltd for Punjab and Sind Bank customer(s). Punjab & Sind Bank is providing this as a value added service. Punjab and Sind Bank does not guarantee or warranty or make any representation about the usefulness, worthiness and/or character of the product/service and/or discount or benefit.”

Accept

Decline