Fraud with bank cards and the fight against it.  How to protect yourself from scammers.  How to protect your credit card from scammers How to protect yourself from scammers

Fraud with bank cards and the fight against it. How to protect yourself from scammers. How to protect your credit card from scammers How to protect yourself from scammers

Everyone has come across scammers in their life. How to protect yourself from encroachments on your hard-earned money, our editors were told by the head of the department for the disclosure of serious property crimes of the criminal investigation department of the Ministry of Internal Affairs of Russia in the Surgut region, police major Ildar Khuzhin.

- Ildar Tagirovich, what types of fraud against citizens are currently the most popular, so to speak? How many facts are registered in the Surgut region?

More than 70 cases of fraud have been registered in the Surgut region since the beginning of the year. This figure is higher than in the same period last year. Basically, we are talking about deceiving citizens through the Internet. Most people still follow the scammers and easily give them money.

How does cheating happen over the internet?

Fraudsters come up with more and more new schemes of deception. I will talk about the most common. For example, buying goods online. Seeing a product at an attractive price, citizens try to buy it.

So, the day before, a citizen born in 1965 applied to the duty unit of the MIA of Russia for the Surgut district. On one of the popular sites, he saw an advertisement for the sale of a GAZ car and phoned the seller. He asked for a deposit. When the man transferred the required amount, the scammer asked for more. In total, the victim transferred 117 thousand rubles to the account of the scammers. Now the phone is turned off, the ad is removed, and we have another victim of intruders.

Or such a case. At the beginning of March, a message was received from a citizen born in 1962 in the duty unit of the Russian Ministry of Internal Affairs for the Surgut District. that in December, on one of the sites on the Internet, he bought an engine for a snowmobile for 70 thousand rubles. However, the product has not yet been received. The phones indicated on the site do not answer, and the site itself has been removed from the Web.

- How to protect yourself from such scams?

Do not make an advance payment until you are sure that the product you are buying exists and the seller is a real person. For example, when buying a car, insist on a personal meeting with the seller. Look carefully at the documents for the car. When transferring money, record this fact with a receipt indicating these documents proving the identity of the seller and buyer. When buying goods from sites, find on the Internet information about a particular online store: how long has it been trading, reviews about its work.

Recently, the police have been receiving complaints from citizens who have become victims of fraud through social networks. Fraudsters hack into a user's page on the Web and send messages asking them to lend money to everyone who is friends. In this case, it is better to call back the one who asks you for a loan. If that's not possible, ask personal questions that your friend knows exactly the answers to. For example, how many children do you have, their names, the brand of your car, what is the name of your wife or husband.

Another way of fraud is lending via the Internet: a significant amount of money is offered at very low interest rates. So, on one of the sites on the Internet, a resident of Lyantor was offered a loan in the amount of two million rubles, which she planned to spend on buying an apartment. Fraudsters first asked for money for paperwork, then for sending them, then for paying tax. As a result, under various pretexts, the woman transferred them a total of 330,000 rubles, and only after the phones of the scammers stopped answering did she realize that she had been deceived.

- Are the various air and train ticketing sites safe?

With the beginning of the summer period, such types of fraud become, unfortunately, relevant. The advice here is this: again, do not chase a low price, buy tickets only on the official websites of airlines or on well-known ticketing sites. And in no case do not use the services of unfamiliar, unverified sites that exist recently, and about which there is no information and reviews on the Internet.

- Previously, there was such a scheme of deception: “Mom! I got into an accident!” or “Mom! I'm in trouble with the police, I urgently need money! Citizens still fall for such tricks?

This year such facts were not registered, but last year there were.

How can you tell if it's not a scammer?

First of all, don't panic. Ask the caller questions of a personal nature, the answers to which will help determine whether he is definitely your relative. If the answers arouse the slightest suspicion, contact law enforcement immediately.

- “Your bank card is blocked” - similar SMS came, probably, to many. How to act in this case?

The SMS that comes from the bank contains not just the word "bank", but its exact name. Sometimes even the last three digits of the card. The number from which the SMS came must not be a cell phone number.

But the citizens continue to believe. So, a resident of the urban settlement Bely Yar on mobile phone I received a call from an unknown person who introduced himself as a bank employee. The man said that her bank card was blocked and asked her to go to the nearest ATM. After fulfilling all the requirements, 16 thousand rubles were debited from the victim's card.

The first rule in this case is not to panic. What should the victim have done? Interrupt the conversation and call the bank yourself. Only not by the number indicated in the SMS. Any card has a bank number, call it or personally contact the bank, even if they say on the phone that your money will be stolen if you delay. And never share your credit card details with anyone.

Literally two weeks ago, the duty unit of the Solnechny Police Department received a message from a resident born in 1984 that a message had arrived on her mobile phone: a payment in the amount of 9,300 rubles was reserved from a bank card in an online store. The message indicated the number of the bank's support service, and the woman called him back. The attacker warned that in order to prevent debiting money from the account, it is necessary to name the card number and the numbers located on its back side. After that, about 150 thousand rubles were debited from the account of the victim. This fact is currently under investigation.

- In recent years, cases of fraud using " mobile bank”, “online banking”, etc. What to do? Do not enable these options?

You can use these systems. You just need to follow some rules. First, you must have a strong antivirus system installed. It is viruses that often help fraudsters to use your online bank. To date, the Ministry of Internal Affairs has 7 such statements when no one called the person, no SMS came, and the money was stolen. Secondly, never share your card details with anyone. Thirdly, it is advisable not to use the SIM card to which all these systems are connected at all to access the Internet. It should be only for online banking and mobile banking. Fourth, periodically change passwords from these online systems. And one more rule. If you have lost a SIM card, blocked it, damaged it or thrown it away, then be sure to turn off all online systems that were tied to it. When the operator reissues the SIM card, it can give access to the account former owner numbers.

- Do you manage to identify the criminals?

It is extremely difficult to solve such crimes, since the SIM cards from which calls are received are often registered to lost or stolen documents. In addition, now it is possible to buy a SIM card at the terminal without any documents at all. As a rule, if criminals are identified, then a series of similar crimes is immediately revealed.

We have the facts of disclosed frauds. So, the fact of fraud was revealed when a resident of Lyantor asked consumer credit by joining a group on a social network. She was sent a message that in order to draw up a contract, a copy of her passport and 1,500 rubles were needed to pay for the service. electronic signature". The victim transferred the required amount, but the fraudster said that this service had risen in price, and another 1,500 rubles were needed. Later, the attacker asked to transfer another 3,000 rubles as proof of her solvency, explaining that this money would be credited towards the first payment on the loan. The woman realized that she was deceived, and contacted the police.

During the operational-search activities, a resident of Surgut, born in 1992, was identified and detained, who confessed to his deed. The Department of Inquiry of the Ministry of Internal Affairs of Russia for the Surgut District initiated a criminal case on the grounds of a crime under Part 1 of Art. 159 of the Criminal Code Russian Federation(fraud). The sanction of the article provides maximum punishment in the form of imprisonment for up to 2 years.

Taking this opportunity, I would like to urge citizens to be more vigilant. Remember that scammers know psychology well. They rely on the gullibility of people who agree to follow other people's instructions. Speak calmly, ask questions, answer that you need to think and consult with your loved ones - such behavior will definitely scare off intruders! Remember, scammers are very resourceful! They are constantly coming up with new schemes to deceive citizens. Never share your personal data with unfamiliar and unfamiliar people, do not make purchases at suspiciously low prices, check the information that is communicated to you by SMS, email or phone. If in any doubt, do not transfer money.

Some of the tips may seem elementary to you, but this is where security begins.

Card fraud methods

The imagination of criminals is boundless. Literally every year there are new, more sophisticated methods. Let's consider the main ones.

Fraud with bank cards is called carding.

Let's start with the "classics". You have come to withdraw money from an ATM. Hurry up, literally on the run, enter the PIN-code, while chatting on the phone. You didn't even look at the inconspicuous kid in a baseball cap and dark glasses peering over your shoulder. But he watched you very carefully. He spied and remembered the numbers that you entered. Further elementary GOP stop- and farewell, money.

Also, in the confusion, you can not see that in front of you is not a real ATM, but a fake. After all, the device is exactly like a real one. Stickers, instructions - everything is as it should be. You insert the card, enter the PIN code, and the screen displays: “The device is faulty”, “A system error has occurred”, “Insufficient funds” or something like that. Well, it happens. You go looking for another ATM. But before you find it, the scammers will empty your account. After all, with the help phantom ATM they have already read all the necessary data about your card.

Often imitate ATM malfunction. For example, late in the evening you return home and decide to cash out your salary on the way. We inserted the card, entered the PIN code, the amount - everything is going fine. The card capture reader gave out the card, but the tray where the money should appear does not open. Broken? Maybe! It's dark around, you need to call the bank and find out what happened. You walked literally ten meters away, and smart thieves had already peeled off the adhesive tape and took your money. Yes, yes, simple adhesive tape did not issue bills.

Another approach is called "Lebanese loop". This is when a lasso from photographic film is inserted into the card reader. If you hit him, the card can no longer be pulled out. As a rule, there is an “assistant” right there: “Yesterday, the ATM ate my card in exactly the same way, I entered this combination and PIN code, and it all worked.” You try, fail, and go to the bank for help. At this time, the Good Samaritan takes the card and goes to empty it. He knows the PIN. You yourself have just entered it openly. Remember?

However, an ATM can be real and even serviceable. This is not a problem if attackers have skimmer. This is a device for reading information encoded on the magnetic stripe of the card. Physically, the skimmer is an overhead block attached to the card reader, while it looks like part of the ATM structure.

On the left - an ATM without a skimmer, on the right - with a skimmer

With the help of a transmitter, fraudsters receive information from the skimmer and make fake cards. They will use the skimmed card, but the money will be debited from the original account. Hence the name of the method - skimming, from the English "skim cream".

How do they know the PIN? In addition to the skimmer, they have other devices. For example, overlay keyboard. It completely imitates the real one, but at the same time remembers the key combinations you type.


Keyboard overlay

As an option - a miniature camera aimed at the keyboard and disguised as a box with advertising booklets.


Hidden camera

Type of skimming shimming. Instead of bulky overlays, a thin elegant board is used, which is inserted through the card reader directly into the ATM. Further, the scheme is the same as with skimming. But the degree of danger is higher: it is almost impossible to see that there is a “bug” in the ATM. It is consoling, however, that it is rather difficult to make a shim - its thickness should not exceed 0.1 mm. Almost nanotechnology. :)

Phishing- a common method of Internet fraud. Most of you don't need to explain what it is. Perhaps someone even received a “letter from the bank” with a request to follow the link and clarify the details. Moreover, the phishing page looked like a real one, the same colors, fonts, logos, except for an annoying “typo” in the address bar.

Recently, a subspecies of phishing has been spreading more and more - vishing. Simply put, divorce over the phone. Fraudsters simulate an autoinformer call. A frightening robotic voice informs you that your card has been blocked or hacked, or you urgently need to pay off your loan debt. Call this number for details. You call, and the polite "operator" asks you to "verify" the card number, expiration date, verification code ... As soon as you dictated last digit you can say goodbye to your money. By the time you come to your senses, they will already be spent in some online store.

By the way, due to the fact that it is not necessary to have a physical card to use it, fraudsters are increasingly using methods social engineering. So I almost got scammed.

I sold furniture. Placed an ad with photos on a well-known site. I specified a number through which no authentication passes for me. Soon a man called. He introduced himself as Vasily, an employee of a company that rents apartments for rent. He said that they liked my sofa - they take it without looking! The money will be transferred to my card right now. No problem. I often buy on the Internet, for this purpose I have a special card. There was nothing to write off from her then, but replenish - please. But one number was not enough for the caller - the interlocutor asked for another expiration date and CVV2. I did not name, but Vasily was offended. He told me who I was and where I needed to go, and hung up.

Most cards are now tied to a phone number in order to confirm transactions using SMS messages or, for example, logging into the Internet bank. What attackers don’t do to get hold of the right SIM card: they steal phones, intercept SMS, make duplicate SIMs, and so on.

Safety rules when using cards

Having issued a debit or credit card we get a deal banking services and an envelope with a PIN code. It is a pity that, in addition to this set, they do not include a memo with elementary security rules for cardholders. It should include the following recommendations.

  • If possible, make yourself a hybrid card - with a chip and a magnetic stripe (unfortunately, cards with a chip only are almost never used in Russia). Such a card is better protected from hacking and forgery by skimming.
  • Learn the PIN code by heart. If there is no hope for memory, write it down on a piece of paper, but keep it separately from the card.
  • Never, under any circumstances, disclose to third parties the PIN code and CVV2 code of the card, as well as its validity period and to whom it is registered. No bank will ask you for these details. And to credit funds to your account, only the 16-digit number indicated on the front of the card is enough.
  • Don't use the so-called salary cards for settlements in stores and payment for online purchases. money from card account it is better to transfer to the front one or set daily limits for all types of transactions performed.
  • Choose ATMs located inside bank offices or at secure points equipped with video surveillance systems.
  • Do not use suspicious ATM models. And before inserting the card into the terminal, carefully inspect it. Is there anything suspicious on the keyboard or in the card reader? Is there a strange advertising tray hanging nearby?
  • Feel free to cover the keyboard with your hand and ask especially curious comrades in line to step aside. If problems arise, do not use the advice of "random assistants" - without leaving anywhere, immediately call the bank and block the card.
  • If you have lost your card, and also if you have reason to believe that third parties have learned its details, immediately contact the bank and block it.

It's easiest to call. If you have the card in your hands, you can see the support number on the back of the card. As a rule, contact centers work around the clock. If the card is left in the ATM and you do not know the phone number of your bank, call the ATM maintenance company. The number must be indicated on the terminal.

In addition, find out about the possibilities and conditions of card insurance at your bank. Some credit institutions have special programs to protect customers from fraudsters and reimburse them for damages.

Banking safety rules

You can take advantage of a large package of services without leaving your home. For example, pay for something or transfer money to your own or someone else's account.

Banking - remote banking service.

Allocate Internet and SMS banking. The first allows you to perform operations through Personal Area client on the bank's website or through the application, and the second involves informing about transactions via SMS messages.

In order to use banking without the risk of losing money, the following basic precautions must be observed.

  • Do not log into the Internet Bank from other people's computers or from public unsecured networks. If this still happened, at the end of the session, click "Exit" and clear the cache.
  • Install an antivirus on your personal computer and update it in a timely manner. Use modern versions of your browser and email programs.
  • Do not download files received from unverified sources, do not follow untrusted links. Do not open suspicious emails and block the sender immediately.
  • Unless necessary, do not enter any of your personal data, in addition to your login and password.
  • Check your address bar. A secure HTTPS connection must be used. And the slightest mismatch with the bank's domain almost certainly means that you are on a phishing site.
  • Come up with a complex password to enter your personal account, and also use one-time passwords requested by banks to confirm actions in your personal account.

Remember! Banks do not send messages about blocking cards, and in a telephone conversation they do not ask for confidential information and codes associated with customer cards.

To protect the SIM card to which the card is linked, promptly notify the bank when you receive suspicious messages and in no case call the numbers indicated in them. Inform the bank if you have changed your number or lost your SIM card. Set a password on your phone and do not remove the block from the screen if someone else is watching your actions. And if the SIM card is issued to you personally, then prohibit its replacement by proxy.

What to do if scammers deducted money from the card

Disputes between customers and banks are not uncommon. The former, having learned about the unauthorized debiting of funds from their accounts, ask to return their hard-earned money, and the latter often shrug: “You yourself told the scammers everything.”

In 2011, Federal Law No. 161 “On the National Payment System” came into force, designed to streamline and change for the better the practice of providing payment services. In particular, he set legal framework the entire payment system as a whole and adjusted the rules for the implementation of cashless payments, as well as the issue and use of electronic money.

In 2014, article 9 of this law came into force. The norm protects bank card users from fraud. The law establishes the presumption of innocence of clients. The Bank is obliged to reimburse the amounts transferred from the client's account as a result of an operation not authorized by him, unless it is proved that the client himself violated the procedure for using the electronic payment instrument.

From September 26, 2018, banks will legally be able to block customer cards if they suspect that fraudsters are transferring money from them. After blocking, the bank must inform the account holder about this, and he will either have to confirm the operation or report an attempted theft.

In other words, the law delimits the responsibility of the bank and the client.

  1. Did the bank inform the customer about the unauthorized transaction? If not, the responsibility lies entirely with the bank. If informed, go to point number 2.
  2. The Client informed the Bank no later than the next working day after the notification from the Bank that this operation committed without his (client's) consent? If not, the responsibility lies with the customer. If informed, go to point number 3.
  3. The bank was able to prove that the client violated the procedure for using electronic Money? If so, the responsibility lies with the client. If not, the bank is fully responsible and is obliged to reimburse the client for the entire amount of the disputed transaction.

A prerequisite for the reimbursement of unauthorized debited funds is to notify the bank about the use of the card without the consent of its holder.

Tell the bank that the card is being used by someone else no later than one day following the day the customer discovered the fraud.

Meeting this deadline is very important. Overdue - you can not count on a refund.

In addition, the client must have proof of the notification in his hands. We are talking about the second copy of the appeal to the bank with a note of acceptance made by an authorized employee, or a written notification of sending a valuable registered letter with a list of attachments to the bank's address.

Contacting the bank does not cancel or replace the appeal to law enforcement agencies.

conclusions

So, a brief algorithm of actions in case of illegal debiting of funds from a bank card is as follows:

  1. Do not panic, call the bank and block the card. Plus, we ask the operator to name the account balance and the last transactions made.
  2. During the day we run to the bank and write a statement. Be sure to endorse our copy of the application with an authorized employee of the bank.
  3. If the employees of the credit institution in any way prevent this and refuse to accept the application (the forms have run out, the technical break, and so on), we turn to the prosecutor's office.
  4. We write a statement to the police. Especially if you are faced with robbery or robbery.
  5. We are waiting for a refund.

If the bank refuses to refund funds debited from the card, referring, for example, to a violation of the procedure for using electronic money, you can defend your rights in court.

The right of ownership to property that has an owner may be acquired by another person on the basis of a contract of sale, exchange, donation or other transaction on the alienation of this property.

To conclude such an agreement, it is necessary to have title documents for real estate, as well as documents proving the identity of the seller and buyer. Quite often, transactions are made not by the owners of the property, but by their representatives acting by proxy.

From July 15, 2016 Certificate of state registration of ownership by Rosreestr, and the only document confirming that the seller of an apartment (or other real estate) owns the property is an extract from the unified state register of rights to real estate - an extract from the USRR (currently - an extract from EGRN).

The information in the certificate of registration of ownership and in the extract from the USRN is valid as of the date of issue.

If the ownership of the property was acquired before July 15, 2016, then the certificate of state registration of the right must still be with the seller.

In accordance with federal law"On state registration of real estate", which entered into force on January 1, 2017, cadastral registration, registration of the emergence and transfer of rights are confirmed by an extract from the Unified State Register of Real Estate (EGRN).

This document is the only proof of the registered right to date.

After Rosreestr stopped issuing a Certificate of State Registration of Rights - a document confirming the right to real estate, many are worried about how to protect their property from fraudsters.

The certificate of state registration of rights kept at home was not an unconditional guarantee that illegal transactions could not be made with real estate.

Unfortunately, this has happened before and is happening now. For example, a contract for the sale of an apartment can be concluded with the owner of the apartment, who was misled as to the nature of the transaction, a fictitious transaction was made or by a person who at the time of the transaction was not aware of his actions or was incompetent.

All these transactions can be challenged in judicial order, since the protection of rights in illegal transactions is carried out in court.

In accordance with Article 301 of the Civil Code of the Russian Federation, a person who has filed a lawsuit to recover his property from someone else's illegal possession must prove his ownership of the property in the possession of the defendant.

Evidence of ownership of real estate is (EGRN). In the absence of state registration, for example, if it arose before 1998, the right of ownership is proved with the help of any evidence provided for by the procedural legislation confirming the emergence of this right with the plaintiff.

You can prove your right to property in any non-prohibited way. Evidence in the case is information about the facts obtained in the manner prescribed by law, on the basis of which the court establishes the presence or absence of circumstances justifying the claims and objections of the parties, as well as other circumstances that are important for the correct consideration and resolution of the case (Article 55 of the Civil Code of the Russian Federation).

This information can be obtained from the explanations of the parties and third parties, the testimony of witnesses, written and material evidence, audio and video recordings, expert opinions.

Explanations of the parties and third parties, testimony of witnesses can be obtained by using videoconferencing systems in the manner prescribed by law.

When challenging an illegal transaction, the injured person, for example, has the right to file a petition for the reclamation of the registration file from Rosreestr. The documents specified in the registration file will allow not only to prove the ownership of the apartment (or other real estate) before the sale, but may also become the basis for establishing the fact of forgery of the documents that became the basis for the transaction.

In order to protect his property from the actions of fraudsters, the owner can apply to Rosreestr with an application to make an entry in the USRN banning any actions with his real estate without his personal participation. Thus, by proxy, transactions will not be registered. The receipt of such an application is noted in a single state register real estate.

The presence of such an entry in the USRN is the basis for a return without consideration of the application submitted to state registration rights to this property not by the owner personally, but by another person, for example, a representative by proxy.

A plastic bank card is a universal means of payment. It provides 24/7 access to the money held on your current account. Plastic cards can be debit and credit. This article will discuss how to protect yourself from fraud.

More about cards

The plastic card itself does not contain All of them are on the owner's account. A piece of plastic is just a means of access to this money.

On the outside of the card, the details of the owner are indicated, which are necessary for the bank to identify him and make a decision on carrying out the requested transactions. To use the card, its physical presence is not necessary. It will be enough to specify the details.

To date, a lot of ways have been invented to leave a respectable holder of a bank debit or credit card without funds. Various malicious programs are being written. The personal data of the cardholder is stolen. Servers of enterprises and banks are hacked. By sending various messages to a mobile phone and due to the gullibility of citizens, criminals gain access to accounts, etc. Credit card fraud is a profitable and low-risk business. And this is because it is not so easy to catch an attacker and prove his guilt. Cybercrime in modern society due to the use of information technology for criminal purposes is massive. It makes card users become hostages of the situation that has arisen, and, therefore, be vulnerable to fraudsters.

Ways to access cards

Card fraud can occur in one of two ways.

1. Using a stolen or counterfeit card, goods are purchased for subsequent resale.

2. With the help of various tricks, attackers gain access to the ATM, account details and pin code.

ATM or ATM (automated telling (teller) machine) was created to simplify operations for issuing, receiving, transferring cash, paying for services and other financial transactions, without the participation of the employee credit institution. At the same time, you can use these services at any time of the day. Simplicity, convenience and direct access to cash have made ATMs in demand and popular among the population, and, consequently, among criminals.

Fraud with bank cards occurs through hacker attacks aimed at ATMs. It is also possible to do this by copying information from the magnetic strip of the card, setting traps for banknotes, which leads to the disappearance of money or the issuance of not the entire requested amount from the ATM.

A lost or stolen plastic card that has fallen into the hands of fraudsters can threaten its owner with debiting all funds on the account. The same applies to a fake bank card, which is made in the name of a specific person whose account has funds.

Types of card fraud

Today, it is desirable for every citizen to get acquainted with this information. Card fraud includes many different types of tricks and deception.

Fake - the manufacture of plastic with identical details of the real card of the real owner. This trick allows you to perform any operation. To save itself from fakes, the bank sets up protection against the selection of details. The development of methods for stealing money from cards has made this method less cost-effective. Now the easier option is to steal props.

Phishing is a theft method by which fraudsters contact the cardholder on behalf of the bank through various means of communication (phone, e-mail, etc.). Their purpose is to find out the confidential data of the owner. Phone phishing is a very common type of theft. So the cardholder receives a call, most often a message with information that a payment has been made from the account, the debt needs to be paid off, the card has been blocked, etc. The call is made automatically and is voiced by an electronic voice with frightening information, without specifying data about financial institution The from which the message is coming. After that, for more information, you will need to contact the operator. The same text is indicated in SMS messages and Email. During a call to the specified number, the operator tries to find out confidential information, which will subsequently allow criminals to devastate plastic cards. Skimming fraud allows data to be copied using a special device installed on an ATM.

Theft of card details from the servers of online stores, which are required not to store data about their owner. But this is often not followed. What scammers successfully use.

Sometimes unscrupulous bank employees themselves provide criminals with card data. Or due to the negligence of the staff, this information becomes the property of intruders.

With the help of special equipment, fraudsters hack the card along with the pin code while using an ATM using special devices (micro cameras, overhead keyboards, card readers). Such equipment reads details and entered passwords.

The use of fake ATMs also allows you to empty plastic cards. Fraud is carried out by the "Lebanese loop" method. This option allows criminals to take possession of someone else's card. To do this, fraudsters place a piece of photographic film in the slot of the reader, which prevents the card from leaving the slot after the operation is completed. Nearby are attackers offering to enter a pin code, assuring that after this action the card will come out. After unsuccessful attempts, the scammers convince the owner to contact the bank the next day, when collectors and engineers are working, and nothing will happen until that time. You can safely leave the card. When the owner leaves the ATM, the scammers remove the film and card. They withdraw all funds.

Fraud with bank cards also occurs by conducting a CNP transaction, that is, an operation performed on the Internet based on the details received. The owner himself and his banking plastic are not involved.

Carrying out operations on stolen or lost cards, which takes place between the specified events and the blocking of plastic. Also, many forgetful people write down their pin code on the card itself, on some piece of paper or in a notebook. When a bag with a wallet is stolen or lost, fraudsters become the owners of not only the entire contents, but also money from a personal account.

Acquiring is a method in which a slip is repeated. You can also change its content. To do this, several slips or prints of cards are made on the electronic terminal on the imprinter. This is necessary in order to be able to change the transaction amount or create new payment documents after the client has signed the slip.

The return of the purchase threatens the owner of the bank card to go negative. To do this, a scammer, hacker or an employee of the merchant where the client made the purchase conducts a refund operation, which increases the balance of the card. The attacker then uses the credited funds. The merchant is revoking the return. After that, the client remains in the red.

What to do when you discover the first signs of fraud?

Fraud using payment cards is a very common phenomenon. Any owner of a plastic device can become its victim. Therefore, at the first suspicions, it is necessary to immediately block the card. And at the bank, you can write a statement of disagreement with the operation, indicating the reason, if this happened without your knowledge.

Fraud with Sberbank cards

The plastic devices of this institution are very often subjected to various attacks by scammers. The most common methods of theft are SMS messages with the text that the card is blocked, and to resume functioning, you need to call the specified number. Such text notifications can be received by thousands of Sberbank card users. Do not forget that all messages sent by Sberbank come from one number. If the notification is from another addressee, these are criminals.

PrivatBank

Fraud with PrivatBank cards is most often carried out using a skimmer. So that when entering a pin code, attackers do not see the numbers through a pre-installed camera, it is necessary to close the dialed combination with the palm of your hand.

Another way is "emergency money", which allows fraudsters to find out the code that came in an SMS message to the card owner, which the account owner himself (not suspecting a trick) dictates to them over the phone. This is a common occurrence when shopping online.

Fraud with "Corn" cards

Criminals often use another interesting way to steal money, which uses the Corn card. Fraud occurs by creating an online store, allegedly from Euroset, where you can make a purchase much cheaper than in the salon itself. Plus there are bonuses. To make a purchase, the consultant needs to dictate his full name, date of birth, barcode of the card, the secret word that came in a text message, that is, the data that should never be spoken. After that, money is debited from the card account, and the account holder is left without a purchase.

Who will return the stolen money?

The return of funds stolen by scammers occurs after an investigation, which should establish some facts.

1. Is it the owner himself who spent his savings, and then decided to return them?

2. ATM or bank error?

3. Or is it the tricks of scammers?

If it is established that the money was debited through no fault of the cardholder, then the stolen amount will be reimbursed to him. The issuer is obliged to return it, which is usually in no hurry to do so. The burden of reimbursement rests with the merchant or acquirer. While the participants understand who should return the losses and who is to blame, the cardholder can wait for his funds for a very long time. In order not to delay with compensation, the payment system acts as a regulatory body, which forms uniform rules for all participants, terms and algorithm of behavior.

Account Theft Investigation Process

Fraud with the same way as with debit plastic devices occurs by the same methods. This means that the investigation to identify the perpetrator of the theft takes place according to a single scheme.

First, the acquirer (owner of the ATM) presents the debited amount, which the holder disputes. requires the acquirer to provide documents. They must confirm the legitimacy of debiting funds. Thirty days are allotted for this. Within the established period, the acquirer provides the requested documents, and the account holder also familiarizes himself with them. If the client agrees and confirms the fact of the operation, then the issue is considered resolved, and the investigation is terminated. If the acquirer provided documents drawn up with violations or neglected the deadlines, then the amount is debited from his account in favor of the bank (issuer), after which the fact of withdrawal is argued and the reason for the legality is indicated. At this stage, the money will not be returned to the owner. After the write-off, within forty-five days, if no action was taken by the acquirer, the stolen amount is credited to the account of the owner of the payment card.

There are situations when the owner of the ATM did not properly respond to the issuer's demand for the provision of documents, as he believes that neither he nor outlet are not guilty of the theft, therefore, they are not obliged to bear responsibility for it. In this case, the investigation is carried out in a different way.

An amount similar to the stolen funds is debited from the issuer's account by the acquirer. This is documented. After that, the issuer must prove his innocence to the acquirer. If this fails, then the ATM owner returns the stolen amount to the cardholder.

There are times when the acquirer's arguments turn out to be unconvincing or do not fully prove his case. In such situations, the responsibility for the theft falls on several parties to the process, and the investigation takes place through a pre-arbitral settlement. To do this, the issuer submits an application for consideration of the case within sixty days from the date of the chargeback. In the process, the acquirer and the issuer act, who prove their case by providing arguments and evidence. If the parties have reached an agreement, the payment of damages occurs equally, if not, then the case is referred to the arbitration committee. It is a commission for the payment system. The Committee considers all the arguments and evidence of the parties, and then draws a conclusion. The decision of the arbitration committee is binding. If the parties do not agree with the decision, an appeal is filed, but the amount of theft in this case must be at least five thousand dollars.

ATM Fraud Investigation Process

Fraud with payment cards related to transactions carried out through ATMs is undergoing different stages of investigation. If the ATM issuer sends a request to the acquirer, who must check the possibility of technical failures in servicing a particular account or the presence of incorrect distribution of banknotes. This situation is not a scam.

In the event that a fraudulent transaction is carried out using an ATM, for example, cash withdrawal, one issuer or together with the acquirer takes part in the investigation. The guilt of the cardholder and points of compromise are being clarified. For most of these cases, the issuer is responsible, so he anticipates such risks in order to compensate the cardholder for theft with compensation from the insurance company.

Banks' fight against fraud

Credit card fraud has meant that many institutions have to fight against criminals. But they are not always successful with this.

For example, to combat skimming, the protection of SRK+ technology from TMD Security is most often used. This company is a leader among the creators of ATM skimming protection. The success of the technology is explained by the fact that special protection is installed from the inside, fits all types of ATMs and is easy to mount.

The transition of ATMs to Microsoft Windows operating systems, the Intel elementary base using TCP / IP protocols, on the contrary, significantly increases the risk of attacks. For this purpose, fraudsters carry out targeted (targeted) attacks.

Now more and more often criminals resort to the help of various programs to gain access to payment cards. They are entered into ATMs. After that, the program itself will collect all the necessary information about the operations. Such an ATM is no different from a normal ATM. That's why ordinary person it is impossible to recognize it.

Bank card fraud can be prevented by installing special security features on the ATM. They are an alarm on the doors of the service area and a program that provides information protection.

How to protect yourself from scammers?

Fraud with credit cards or debit plastic devices is now a very common occurrence. Therefore, steps must be taken to minimize the risk of theft financial resources. For this, the following rules must be observed.

1. Do not tell anyone your PIN code, do not write it down on a card, notepad, etc.

2. Do not transfer your card to another person.

3. Make purchases in trusted stores.

4. Cover the keyboard with your hand while entering a personal code.

5. Do not provide imaginary bank employees with card details.

6. Do not tell the password that came in a message to the phone.

7. In case of loss or loss of the card, you must have a number in your mobile phone by which it can be urgently blocked.

Currently, all new types of fraud with bank cards and methods of protection against theft are being invented. Therefore, in addition to the precautions provided by the issuer, trading company or acquirer, you must comply with all security requirements yourself.

The law enforcement practice that has developed in our region on the basis of citizens' appeals and materials of criminal cases indicates the existence of several traditional "schemes" by which criminals work.

Communication fraud is most often used, including by phone.

In order to gain confidence in a person, using only a telephone, swindlers use psychological techniques, among other things. Victims, as a rule, are predominantly socially unprotected people, gullible pensioners, teenagers. Fraudsters find slack that they can put pressure on. What feelings are scammers playing on? First of all, it is fear for loved ones, excitement - the desire to win a big prize, curiosity - the desire to get access to SMS and calls of other people, concern for your phone number, bank account or credit card. Practice shows that people, having believed, transfer to scammers money… How do scammers get victims' money? They ask to transfer the money to their accomplices or leave it in the agreed place. Through express payment cards, the codes of which they need to send. They ask you to put the required amount on your number or by money transfer.

Attackers call their potential victims often at random. The victims are located in various parts of the country. It is not easy to identify an intruder, since all the numbers are often issued to figureheads. Thus, the law prohibits convicts from having mobile communications. The number of seized phones is increasing in places of deprivation of liberty (their number goes to tens of thousands). Currently, legislators are developing a rule according to which it is proposed to introduce responsibility for bringing a phone into the territory of a colony or pre-trial detention center in the Criminal Code of the Russian Federation.

SMS is a blind scam: such messages are sent in large volume in the hope of a gullible recipient. A phone call is for professionals, as the victim can expose the scammer when talking with random questions.

For example, you received an SMS message stating that your bank card has been blocked, and therefore, you need to transfer money to unblock it, call or send an SMS to a short number, or you are offered to call a specific number for free to get detailed information.

Never send any money to the coordinates indicated in the message, do not call back the number from which it came, and do not send a reply SMS. Call the bank that issued and services your card. You will find the bank's phone number on the back of your card. Remember that the only organization that can inform you about the status of your card is the bank servicing it.

If you nevertheless called the specified number and were told that the server responsible for servicing the card failed, and then they ask you to provide the card number and PIN code for its re-registration, then, having received this information, the scammers will withdraw money from your account. Never share your card PIN with anyone. No organization, including a bank, has the right to demand this information. Remember Keeping details and PIN code secret is your responsibility and duty.

Fraudsters most often ask to transfer funds for a relative of a telephone recipient who is in trouble (accident, police, hospital). For example, a relative or acquaintance called you and said that he got into an accident or committed a crime, and to solve the problem, a certain amount of money is needed, for which the courier will arrive, or which must be transferred to an “electronic wallet” or phone number. Further, an alleged police officer enters the conversation, confirming the words of a “relative” (acquaintance). And citizens, believing, transfer money. How to behave in this situation?

Never follow these requirements. Immediately end the conversation and call your relative back on his real mobile phone. If the phone is turned off, try to contact his colleagues, friends or relatives for more information. If you are talking to a person who introduced himself as a representative of law enforcement agencies, ask what police department he is from, dial “02” after the call, find out the number of the duty unit of this department and ask if your relative or acquaintance was really taken there. As a rule, several criminals are involved in organizing a ransom phone scam. The person who called you may be in a correctional labor institution, while his accomplice is free. By dialing phone numbers at random, the scammer pronounces a prepared phrase, and then acts according to the circumstances. Fraudsters try to intimidate the victim, prevent her from coming to her senses, so they have a continuous conversation with her until they receive money. Also remember that soliciting and giving a bribe is a crime.

On an electronic bulletin board (sites of purchases and sales) or in a social network, you found a product you need, an apartment for rent, a well-paid job.

Never transfer money to "electronic wallets", mobile phone numbers, bank accounts without being convinced of the reliability of the counterparty. As a rule, scammers attract their victims with low prices and great deals and require payment in advance. Carefully study the ad, look at the information about the person who posted it. If the marketplace has a seller rating system, study the reviews left by other buyers, not forgetting, however, that the offender may leave positive reviews about yourself using additional accounts. Use the Internet search. Sometimes it is enough to enter a seller's phone number or online alias into the search form in order to discover that this data has already been used to steal money and defraud buyers. Check the provided phone number for the region code and its coincidence with the one stated in the ad. look average cost similar goods. Too low a price should make you suspicious. If the seller requires a full or partial prepayment for the purchased goods to be transferred to an electronic account, think about how ready you are to trust a stranger. Remember that when transferring money to strangers through anonymous payment systems, you do not have guarantees of their return if the transaction does not take place.

In no case should you tell potential buyers, sellers, tenants, landlords your personal data, passport number, as well as PIN codes that may come to your mobile, ostensibly confirming consent to the transfer, since only a bank card number is sufficient to transfer the deposit located on the front of the card. If they ask for other information, they are scammers!

If on the Internet on one of the popular sites you found an advertisement for employment for a highly paid job, and after calling the number indicated in the advertisement, the future “employer” allegedly asks you to drive to the office, but before that asks you to buy sweets, cognac, wine , colors and put money on the "future boss" phone - these are scammers! Real employers invite you for an interview.

You decide to buy a new mobile phone, laptop or other item at an attractive price in an online store, but the store asks you to transfer an advance payment.

Please note that the online store cannot accept payment for purchases in this form. If you are asked to pay for goods using express payment terminals or transfer money to an "electronic wallet", the likelihood that you have encountered scammers is extremely high. If you decide to buy a prepaid product, look up information about the store on the Internet, see how long it has been on the market. If you are dealing with a site of a large or well-known company, make sure that the address of the resource is spelled correctly in the address bar of your browser. If necessary, require store administrators to provide you with information about the legal entity, check it using public databases tax authorities and registry legal entities. Make sure you know the address where you can file a claim if you are unhappy with your purchase.

You want to purchase tickets online.

Never use the services of unverified and unknown ticketing sites. Book tickets through the website of an airline or agency that has proven itself in the market. Do not transfer money for tickets to e-wallets or foreign accounts. If in doubt, contact the airline office to make sure that your flight exists and there are still tickets for it.

You have received an SMS or MMS message with a link to download a postcard, music, picture or program.

Never follow the link provided in the message. Remember that by clicking on the link you can, without knowing it, get a virus on your phone or subscribe to paid services. Even if the message came from a person you know, make sure that he is the sender, because the message could have been sent from an infected phone without his knowledge. Installing antivirus software on mobile device is a measure to increase your safety.

You have received an email saying that you have won a car (another prize) and you are asked to transfer money to receive a prize, citing the need to pay taxes, customs duties, transport costs, etc.

Never send money to strangers to their electronic accounts. Think about whether you took part in the prize draw, do you know the organization that sent the notification of the win, how do the organizers of the action know your contact details? Remember that the probability of winning a prize without taking part in the draw tends to zero, and the probability of returning the money transferred to the anonymous "electronic wallet" of the attackers is even less. Any request to transfer funds to receive a win should alert you. It must be remembered that winning the lottery entails tax obligations, but the procedure for paying taxes is regulated by the current legislation and is not carried out by transferring funds to electronic accounts of citizens and organizations or "electronic wallets".

Fraudsters, posing as employees of social services (housing and communal services, post office, Pension Fund etc.) get into the apartment, where they inform pensioners about the bonus credited to their account, for example, on Victory Day, go to other holidays or additional payments to pensions. In return, they ask for money for “documentation”.

Never give money to social workers. The current legislation does not provide for the collection of funds for the transfer of pensions, benefits or other social payments payable.

If nevertheless a crime is committed and money is stolen, citizens must immediately contact the police by calling “02” or personally to the territorial police department.