{"id":1004,"date":"2015-12-16T20:17:11","date_gmt":"2015-12-16T17:17:11","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=1004"},"modified":"2019-06-11T16:27:21","modified_gmt":"2019-06-11T13:27:21","slug":"the-most-common-ways-of-credit-card-fraud","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/the-most-common-ways-of-credit-card-fraud\/","title":{"rendered":"The Most Common Ways of Credit Card Fraud"},"content":{"rendered":"<p>The faster is the technical progress developing, the more sophisticated and ingenious become the fraudsters\u2019 attempts to turn it to their advantage. The more actively we replace cash money in our pockets with credit cards, the more ways to hack money from our bank accounts emerge.<\/p>\n<p>Not to become an easy prey for fraudsters, it is useful to know what techniques the violators use to steal data from credit cards. We are going to provide an overview of the fraudsters\u2019 favorite methods of credit card fraud.<\/p>\n<h2>How does the credit card fraud occur?<\/h2>\n<p>Whatever scheme is used for credit card fraud, one of the main tasks of the violator is to find out a credit card PIN. For this purpose a fraudster may use:<\/p>\n<ol>\n<li><strong>ATM overlays on a keypad<\/strong>. The thief sets a barely noticeable cover plate on the top of the real buttons. And this device is able to &#8220;remember&#8221; the digits of every PIN-code.\n<p><div id=\"attachment_4893\" style=\"width: 532px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4893\" class=\"wp-image-4893 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-keybord-cover-11-1.png\" alt=\"Credit card fraud with an overlay on the keypad\" width=\"522\" height=\"370\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-keybord-cover-11-1.png 522w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-keybord-cover-11-1-300x213.png 300w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><p id=\"caption-attachment-4893\" class=\"wp-caption-text\">ATM overlay on the keypad<\/p><\/div><\/li>\n<li><strong>A miniature camera<\/strong>\u00a0can be attached just above the screen under the hood of the ATM and transmit images to the nearby fraudster\u2019s laptop. Yet, it\u2019s easy to withstand this method if to have a habit of covering a keyboard with your hand while typing the PIN (just in case).\n<p><div id=\"attachment_1005\" style=\"width: 532px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1005\" class=\"wp-image-1005\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-hidden-cam1.jpg\" alt=\"ATM hidden camera for credit card fraud\" width=\"522\" height=\"389\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-hidden-cam1.jpg 523w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-hidden-cam1-300x224.jpg 300w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><p id=\"caption-attachment-1005\" class=\"wp-caption-text\">Hidden camera in ATM<\/p><\/div><\/li>\n<li><strong>Visual observation<\/strong>. The PIN-code may be simply peeped by the person standing nearby.<\/li>\n<li><strong>Fake ATM<\/strong>. They are usually installed in popular walking areas. Of course, this ATM does not give money. Instead, it records all PIN-codes of the inserted cards. It can also read data embedded in the magnetic strip. These data may further help to make a full-fledged copy of the credit card. A fake ATM is a large-scale variant usually applied for a long-term operation. It\u2019s unlikely that anyone would turn to this method for the sake of one or two stolen PIN-codes.<\/li>\n<\/ol>\n<p><iframe loading=\"lazy\" width=\"838\" height=\"629\" src=\"https:\/\/www.youtube.com\/embed\/sSOgkp9jIvE?feature=oembed\" frameborder=\"0\" allow=\"autoplay; encrypted-media\" allowfullscreen><\/iframe><\/p>\n<p>Once a fraudster receives a PIN-code, he needs to get a credit card data.<\/p>\n<ol>\n<li><strong>He can steal it<\/strong> &#8211; the simplest method.<\/li>\n<li><strong>He can defraud the card holder<\/strong>. For this purpose, a special plastic envelope unnoticeable at a casual glance is enclosed into the card slot. When a cardholder tries to withdraw money, the ATM does not \u2018see\u2019 the card through the envelope. It\u2019s also impossible to return the card without knowing how to do this.\u00a0Then\u00a0a seemingly well-meaning stranger comes up and says that recently he has faced the same problem and tackled it by typing the PIN-code twice and pressing the enter button. After a several predictably failed attempts a victim goes to inform the bank about the incident. The fraudster gets your credit card with an envelope (he knows how to do that) and withdraws the money, using the code you just entered.\n<div id=\"attachment_1008\" style=\"width: 532px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1008\" class=\"wp-image-1008\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-skimmer-21.jpg\" alt=\"ATM skimmer for credit card fraud\" width=\"522\" height=\"392\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-skimmer-21.jpg 720w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-skimmer-21-300x225.jpg 300w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><p id=\"caption-attachment-1008\" class=\"wp-caption-text\">ATM skimmer<\/p><\/div>\n<p>These two methods have one disadvantage: the limited time for cards use. When realizing the fraudster has stolen money from the card, the customer will immediately ask the bank to block it. The more time passes after the fraudster had withdrawn the money, the better it is for him. That\u2019s why there is one more method.<\/li>\n<li><strong>He can make a duplicate of a credit card<\/strong>. Another one way to get necessary information is skimming credit cards. Here again, the main instrument is a pad placed over the real card slot, but not to make a credit card invisible for the ATM, but to copy the data from the magnetic strip. For the cardholder everything happens as usual: he inserts the card into the slot, enters the PIN-code, withdraws money and leaves happy. After that, the fraudsters take the skimming pad away and copy the data on their own magnetic tape (even usual video tape is suitable). To make a quite efficient duplicate of a credit card, it\u2019s enough to stick a tape on the piece of plastic of a suitable size. And then just wait when a large sum of money hits the account &#8211; and reap the harvest.\n<p><div id=\"attachment_1007\" style=\"width: 532px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1007\" class=\"wp-image-1007\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-skimmer1.jpg\" alt=\"ATM with and without a skimmer\" width=\"522\" height=\"293\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-skimmer1.jpg 620w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/12\/ATM-skimmer1-300x168.jpg 300w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><p id=\"caption-attachment-1007\" class=\"wp-caption-text\">ATM with and without a skimmer<\/p><\/div><\/li>\n<\/ol>\n<p>There are a few techniques that cannot be attributed to any of the above-mentioned categories:<\/p>\n<ul>\n<li>To connect to the cable via which the ATM communicates with the bank, and get the necessary data. Technically it seems difficult, but taking into account the number of instructions on the Internet, this method can become quite common.<\/li>\n<li>The fraudster may collude with a dishonest bank employee. But a\u00a0significant amount of money should be at stake for a bank clerk to be bent on it. After all, very few people want to risk their job (and often freedom) for cents.<\/li>\n<li>There is a possibility of unfair treatment with your credit card in public services &#8211; stores, restaurants, etc. After all, it\u2019s not a problem for a cashier to swipe a card through the terminal twice and to charge a sum slightly differing from that of your purchase. Even if a cardholder notices it, the cashier can always reduce it to a computer error.<\/li>\n<li>Remember, it\u2019s possible to shop online without the card itself. It is enough to know its number (PAN), expiration date, the owner\u2019s name (card holder) and CVV code. All these data are on the card &#8211; the fraudster just needs to find the opportunity to see them and remember or copy.<\/li>\n<\/ul>\n<h2>How to prevent credit card fraud?<\/h2>\n<ul>\n<li>Carefully inspect the ATM before inserting the card in it. It is better to use ATMs located in the bank premises because the fraudster won\u2019t be able to complete the fraud there. If you live or work far from the bank branch, choose ATMs equipped with surveillance cameras and frequently visited by cash-in-transit guards.<\/li>\n<li>Keep your credit card in view when it is in someone else\u2019s hands (for example, a cashier at the supermarket).<\/li>\n<li>Entrust your money only to banks for which data protection is not an empty phrase. This means such a bank has a compulsory client\u2019s identity check before every withdrawal of funds or funds transfer to another account. It is a must to use <a href=\"https:\/\/www.protectimus.com\/\">two-factor authentication<\/a> (or two-factor authorization, as it is sometimes mistakenly called) for the bank. Among most proven authentication methods are one-time password delivery via SMS, and OTP generation with the help of hardware and software OTP tokens, such as those offered by Protectimus. 2FA can help avoid damage even when the CVV and PIN-code have become known for attackers.<\/li>\n<\/ul>\n<p>Unfortunately, it\u2019s impossible to completely eliminate the threat of credit card fraud, but these preventing measures can significantly reduce the chances for it.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>The faster is the technical progress developing, the more sophisticated and ingenious become the fraudsters\u2019 attempts to turn it to their advantage. The more actively we replace cash money in our pockets with credit cards, the more ways to hack money from our bank accounts emerge. Not to become an easy prey for fraudsters, it [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4482,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[15],"tags":[202,118,166],"class_list":["post-1004","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-rd","tag-cybersecurity","tag-data-protection","tag-hacking-attacks"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=1004"}],"version-history":[{"count":5,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1004\/revisions"}],"predecessor-version":[{"id":4894,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1004\/revisions\/4894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4482"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=1004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=1004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=1004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}