Keeping yourself up to date with online scams and get protected
Each type of fraud is intended to steal personal data and passwords, such as Username, e-banking passwords, additional passwords (myAlpha Code), debit/credit card details and PINs, with the aim of accessing your bank accounts and cards. Find below the most common types of online scams and how to protect yourself:
Advertisements on the internet or social media
Online adds fraud for selling products, renting houses online, buying cars or for virtual jobs has recently become widespread. The prospective victim who has posted an ad on the internet or social media receives a phone call from an alleged interested party, who then asks him/her for personal e-banking codes, the number and/or PIN of his cards and other relevant information in order, supposedly, to make an payment. By intercepting the victim's e-banking codes, fraudsters manage to access their bank accounts and cards and carry out online fraud transactions..
Deceptive emails that are designed to deceive their recipients and disclose to fraudsters their personal and financial information or security codes. They usually copy the logo, features and style of the actual messages you receive from the Bank. They use terminology that gives the feeling of urgency and urge you to download an attached file or follow a link to your device.
Smishing (SMS Phishing)
Scammers try to obtain personal and financial information or security codes via SMS messages. They usually ask the prospective victims to follow a link or call a phone number to verify or, update their details. The link leads to a fake website and the phone number leads to the fraudster claiming to represent the legitimate business.
Perpetrators take advantage of the possibility of changing a SIM card and pretend to be either the SIM card holder or someone authorized by the legitimate subscriber, thus trying to deceive mobile operators and obtain a new card to replace the one that the legal holder has. Once the new card has been activated, the old one, which is in the possession of the legitimate subscriber, is disabled and so all services (calls, SMS,etc.) are received on the device in the possession of the fraudsters, enabling them to carry out illegal activities without the advice of the legitimate subscribers. (e.g. receiving calls and messages intended for them, intercepting disposable codes or security verification messages, etc.). Learn more about SIM Swapping tactics here.
Vishing (Voice Phishing)
It concerns a fraud telephone call, which intends to deceive the victim to disclose his personal and financial information or security codes or to transfer money to the fraudsters. A typical example is telephone communication to repair a computer software failure. Alleged IT company representatives are communicating with prospective victims and asking to gain remote access to their computer to correct an unstated failure. In this way they manage to extract the victim's e-banking codes and transfer funds from their accounts.