Cyb FSc
Cyb FSc
Impact of Phishing
These are the impacts on the user Spread of Malware:
upon affecting the Phishing Attacks. Phishing attacks often use
Each person has their impact after attachments or links to deliver
getting into Phishing Attacks, but malware, which can infect a victim’s
these are some of the common computer or network and cause
impacts that happen to the majority of further harm.
people.
Financial Loss:
Phishing attacks often target financial
information, such as credit card
numbers and bank account login
credentials. This information can be
used to steal money or make
unauthorized purchases, leading to
significant financial losses.
Identity Theft:
Phishing attacks can also steal
personal information, such as Social
Security numbers and date of birth,
which can be used to steal an
individual’s identity and cause long-
term harm.
Damage to Reputation:
Organizations that fall victim to
phishing attacks can suffer damage to
their reputation, as customers and
clients may lose trust in the
company’s ability to protect their
information.
How To Stay Protected Against Keep your system updated: It’s better
Phishing? to keep your system always updated
Until now, we have seen how a user to protect from different types of
becomes so vulnerable due to Phishing Attacks.
phishing. But with proper precautions,
one can avoid such scams. Below are Keep the firewall of the system ON:
the ways listed to protect users Keeping ON the firewalls helps you
against phishing attacks: filter ambiguous and suspicious data
and only authenticated data will reach
Authorized Source: you.
Download software from authorized
sources only where you have trust.
Check URL:
Always check the URL of websites to
prevent any such attack. it will help
you not get trapped in Phishing
Attacks.
Types of Ransomware
The 2 major types of ransomware are:
1. Crypto-Ransomware
2. Locker Ransomware
Crypto Ransomware:
Crypto ransomware aims to encrypt
sensitive files on the victim’s
computer. It does not block any basic
computer function.
3. Ransomware as a Service
(RaaS):
Ransomware as a Service is a
business model between ransomware
developers and affiliates to use
developed ransomware tools to
execute attacks. The affiliates earn a
portion of each successful ransom
payment.
It is further
It is less popular.
popular.
But, in
Cryptography,
In Steganography, there is use of
the use of fine fine
metamorphoses is metamorphoses
not involved to play with the
importantly. data and
increase
protection.
13
Salami attacks are used for the these amounts add up to an oversized
commission of economic crimes amount of cash and this can be often
Those who are found guilty of such an invisibly to deduct such amount.
attack face punishment under Section because the amount is tiny. thanks to
66 of the IT Act. the limited amount of cash the bulk of
individuals doesn’t report the
How-to-Protect-Yourself-From-Cyber- deduction.
Attacks-copy
Working of Salami attack: as an example, suppose an
During this kind of attack, an awfully attacker/hacker withdraws ₹0.0001
insignificant change is introduced that from each checking account. Nobody
goes completely unnoticed. as an will notice so, an oversized sum is
example, a bank accountant inserts a produced when one dollar is deducted
program, into the bank’s servers, that from each account holder at that bank
deducts a satiny low amount of cash and the attacker got a stack of cash.
from the account of each customer.
Penny Shaving:
No account holder will probably notice when the attackers/hacker steal
this Unauthorized debit, but the bank money in small amounts. By using
accountant will make an outsized rounding to the closest within the
amount of cash each month. as an transactions. so, change is so small
example, an employee of a bank in so, nobody can detect such dough in
the USA was terminated from his job. a single transaction
15
Hacking
Hacking is the act of gaining By 1975, the Jargon File adopted a
unauthorized access to a computer more formalized definition of hacking.
system or network to: steal data, In popular usage and in the media,
corrupt systems, disrupt data-related the term has mostly negative
activity, and gather information on connotations due to its association
users. with cybercrime.
Distributed Denial-of-service
(DDoS) – What are the most common types
This hacking technique is aimed at of hacking?
taking down a website so that a user Most common types of hacking are
cannot access it or deliver their phishing, viruses, UI redress attacks,
service. Gets the server down and cookie theft, DDoS attacks, DNS
stops it from responding, which may spoofing, social engineering, missing
cause a condition error constantly. security patches, malware-injection
devices, and password cracking.
DNS Spoofing –
This essentially uses the cache Types of Hacking
knowledge of an internet website or Techniques to Protect Yourself
domain that the user might have 1. First, you’ve to make sure that your
forgotten to keep up to date. It then personal information and account
directs the data to a distinct malicious details are kept private.
website. 2. Install antivirus code for shielding
from malicious activity.
Social Engineering – 3. Do not click on an unauthorized link
Social engineering is an attempt to and make sure to check any data
manipulate you to share personal info, sent to you is from a legitimate
sometimes by impersonating a source.
trustworthy supply. 4. Always have updated software and
do not use default configurations
Missing Security Patches – on devices.
Security tools will become outdated
as a result of the hacking landscape
advancement and need frequent
updates to protect against
new threats.
Malware-Injection Devices –
Cyber-criminals will use hardware to
sneak malware onto your pc. You
would have detected infected USB
sticks which can allow hackers remote
access to your device when it is
connected to your pc. What Devices Are Most Vulnerable
to Hackers?
Cracking Password Our Devices that are at risk from
Hackers will get your credentials hackers are smartphones, IoT
through a technique known as gadgets, and older computers
keylogging.
19
FAQ
Types of Hacking -FAQs
2. Whaling 3. Baiting
A whaling attack is a type of phishing Baiting is a type of social engineering
attack that also leverages personal attack wherein scammers make false
communication to gain access to a promises to users in order to lure
user’s device or personal information. them into revealing personal
information or installing malware on
The difference between phishing and the system.
whaling has to do with the level of
personalization. While phishing Baiting scams can be in the form of
attacks are not personalized and can tempting ads or online promotions,
25
lure the user into clicking on a link are likely to convince victims to share
which directs them to a malicious site. valuable and sensitive data.
Once on the site, the victim is then
prompted to download malicious Pretexters may impersonate someone
software and content. in a position of authority, such as a
member of law enforcement or a tax
Smishing attacks have increased in official, or a person of interest, such
popularity amongst criminals as as a talent agency scout or
people spend more time on mobile sweepstakes organizer. After
devices. While users have become explaining the context, the attacker
savvier at detecting email phishing, would then ask the victim questions to
many people are far less aware of the gain personal and sensitive
risks associated with text messages. information, which they could then
use to advance other attack scenarios
A smishing attack requires little effort or access their personal accounts.
for threat actors and is often carried
out by simply purchasing a spoofed 9. Honeytrap
number and setting up the malicious A honeytrap attack is a social
link. engineering technique that specifically
targets individuals looking for love on
7. Quid pro quo online dating websites or social
A quid pro quo attack involves the media. The criminal befriends the
attacker requesting sensitive victim by creating a fictional persona
information from the victim in and setting up a fake online profile.
exchange for a desirable service. Over time, the criminal takes
advantage of the relationship and
For example, the attacker may pose tricks the victim into giving them
as an IT support technician and call a money, extracting personal
computer user to address a common information, or installing malware.
IT issue, such as slow network
speeds or system patching to acquire
the user's login credentials. Once the 10. Tailgating/Piggybacking
credentials are exchanged, this Tailgating, also known as
information is used to gain access to piggybacking, is a physical breach
other sensitive data stored on the whereby an attacker gains access to
device and its applications, or it is a physical facility by asking the
sold on the dark web. person entering ahead of them to hold
the door or grant them access.
8. Pretexting
Pretexting is a form of social The attacker may impersonate a
engineering that involves composing delivery driver or other plausible
plausible scenarios, or pretext, that identity to increase their chances.
27
This can prompt the victim to act Urgency: Creating artificial time
quickly without fully verifying the pressure forces quick, poorly
situation. Such psychological considered decisions. An attacker
manipulation exploits the natural might claim, "Your account will be
human tendency to help, comply, or deleted in 1 hour unless you verify
respond to authority, which research your credentials now."
shows is deeply embedded in our Fear/Intimidation:
social behaviors. Threats of negative consequences
manipulate victims into taking unsafe
Attorneys can circumvent traditional actions. For example, the attacker
security measures individuals believe could claim, "Your system is infected
will protect them by appealing to —click here immediately or risk data
emotions. This often leads to loss."
surprisingly successful exploits, even
in the presence of advanced Trust:
technological defenses. Building rapport and appearing
legitimate helps bypass normal
29
Cybersecurity Measures:
Law enforcement agencies often use
digital forensics and cybersecurity
tools to track offenders, prevent the
spread of illegal material, and shut
down illicit websites.
Global Cooperation:
International law enforcement
agencies like INTERPOL and the FBI
work together to combat cybercrimes
related to pornography, especially
those that cross borders.
In conclusion, PORNOGRAPHY
while pornography itself is not Cybercriminals can use pornography
inherently illegal, various forms of as a tool for various types of
non-consensual, exploitative, or illegal cybercrime attacks. These attacks
pornography represent significant often exploit people's vulnerabilities or
cybercrime concerns. involve using pornography as a
vehicle for fraud, blackmail, or
malicious activities.
33
How it Works:
In some cases, attackers exploit the
traffic to adult sites to conceal the
origin of a DDoS attack. They might
use botnets or malware to direct
infected devices to flood a website
with requests, bringing down servers.
Cyberpornography
Cyberpornography refers to the use of
the internet and digital technologies to
create, distribute, or consume
pornographic material. This term
typically encompasses all forms of
pornography that are accessed,
37
Ransomeware
Social Media crimes
Social media crimes often involve the sources. Be wary of links and
unauthorized collection or use of attachments in messages, even if
personal data. Many countries have they appear to come from trusted
implemented data protection laws to contacts.
prevent the misuse of personal
information, but enforcement is Educate Yourself and Others:
challenging due to the global nature of Stay informed about the risks and
the internet. potential crimes that can occur on
social media, and educate friends and
Platform Accountability: family members, especially younger
Social media companies must or vulnerable individuals, about online
balance the need for free speech with safety.
the responsibility to prevent harmful or
illegal activities on their platforms. Social media crimes are becoming
Many have implemented reporting more complex as technology
systems, content moderation, and advances, but with awareness,
security measures to prevent misuse. caution, and vigilance, individuals can
better protect themselves from falling
How to Protect Yourself from victim to online criminal activity.
Social Media Crime:
Privacy Settings:
Regularly update and adjust privacy
settings on social media accounts to
control who can see your posts, who
can contact you, and what information
is shared publicly.
phone, then use it to access banking and disconnect before the call is
accounts, email, or social media answered (leaving a "missed call").
profiles. The fraudsters then rely on the victim
to return the call, which is directed to
4. International Revenue Share a high-cost international or premium-
Fraud (IRSF) rate number.
Description: This type of fraud occurs
when fraudsters exploit international Example:
phone calls to generate large The victim sees a missed call from an
amounts of revenue through international number, returns the call,
premium-rate numbers or services. and is charged a significant amount
for the international connection, often
How it Works: without realizing it.
Fraudsters may route calls through
foreign networks that use premium- 6. Man-in-the-Middle Attacks (MITM)
rate numbers. Telecom companies Description: In a man-in-the-middle
receive a portion of the revenue attack, cybercriminals intercept
generated by these calls, while communication between two parties,
fraudsters profit by directing often to steal sensitive data such as
unsuspecting victims to these account information, banking details,
expensive international services. or login credentials.
3. Account Takeover
52
How it Happens: Through phishing, How it Happens: The thief may use
data breaches, or social engineering, this information to apply for new credit
the thief takes control of the victim’s cards or make unauthorized charges
online banking or shopping account using the details they find in the mail.
and uses the stored credit card
information to make purchases. 9. Friendly Fraud (Chargeback Fraud)
Description: This type of fraud occurs
6. Identity Theft when a legitimate cardholder makes a
Description: In this case, a fraudster purchase and then disputes the
steals an individual’s personal charge, claiming that the transaction
information, including their credit card was unauthorized or the goods were
details, and uses it to open new credit not received.
accounts or make unauthorized
purchases. How it Happens: The cardholder files
a chargeback with their bank,
How it Happens: Personal information potentially resulting in the merchant
may be acquired from social media, losing the payment, even though the
data breaches, or physical theft (e.g., purchase was made by the cardholder
stealing mail or personal documents). themselves.
How it Happens: Using stolen data, a How it Happens: The fraudster might
fraudster may manufacture a fake use another person’s identity, fake
card and use it in person to make documents, or manipulate the
purchases. This is more common with application process to get credit cards
magnetic stripe cards than EMV (chip) issued in someone else’s name.
cards, which are harder to duplicate.
Cloud Forensics and the Digital Crime your business. Unlike traditional
Scene digital forensics, cloud forensics can
be a bit more complicated, since data
Cloud Forensics and the Digital Crime may be hosted outside of local
Scene jurisdictions.
Cloud-based services have changed
the way many companies do Cloud vs. Digital Forensics
business. By embracing cloud Traditional digital forensics is used to
migration, businesses can host their solve cybercrimes. Digital forensics
software and applications on consultants gather evidence from
inexpensive servers, saving them software, data, and other resources to
time, money, and the expense and track down hackers or investigate an
hassle of managing dedicated event.
hardware.
With digital forensics, any evidence
These services also allow businesses that’s found is admissible in a court of
and individuals to store extensive data law within the jurisdiction. Most of the
securely. Cloud-based technologies time, the evidence found belongs to
are convenient and inexpensive but the owner of the technology, making it
cloud forensics is an issue every easy to gain permission to use this
business owner should review before evidence in the case.
implementing these strategies into
everyday processes. Cloud forensics makes this hunt for
evidence a little more complex. While
What Is Cloud Forensics and How Is the investigator follows the same
It Used? methods in cloud forensics as they
Cloud forensics refers to would in traditional digital forensics,
investigations that are focused on the lines may blur on who owns the
crimes that occur primarily involving evidence and where it’s admissible in
the cloud. This could include data court.
breaches or identity thefts. With cloud
forensics implemented, the owner has With cloud-based services, data may
protection and can better preserve be stored off-site in several locations,
evidence. Without a cloud forensics or on a server owned by a third party.
strategy, the owner may not have The rules are determined by the types
rights to all the data or evidence on of services involved.
the cloud, especially if it’s hosted
offsite or by a third party. Types of Cloud Services
The types of services a business or
While cloud services are the standard, individual chooses to implement will
cloud forensics is an important issue ultimately depend on their goals and
to address when adopting them for
67
3 : Services
IaaS (Infrastructure as a Service)
PaaS (Platform as a Service)
SaaS (Software as a Service)
4 : Deployment Models
Private Cloud
Cloud computing is still an evolving
Community Cloud
computational platform which lacks
Public Cloud
the support for crime investigation in
Hybrid Cloud
terms of the required
frameworks/tools
5 : Characteristics
• Need to be Self Reliant.
On-demand self-service
Make In India and Digital India are
Broad network access
opportunities for us to emerge with
Resource pooling
indigenous solutions and products for
Rapid Elasticity
Digital Forensics (specially for cloud,
Metered or measured service
IoT, Fog, etc.)
Cloud forensics:
• Take major initiatives for educating
Cloud forensics is a subset of
and making people aware of the
network forensics
dangers and the ways to mitigate
“The application of computer
them
forensic principles and
• Launch programmes and schemes
procedures in a cloud computing
to increase the number of cyber
environment”
security experts in the country
“The process of applying various
• Establish strong Public-Private links
digital forensic phases in
• “Monitoring of Critical Infrastructure
cloud platform depending on the
Systems
service model and
deployment models of cloud”
71
https://www.oxygenforensics.com/en/
resources/cloud-forensics/ Types of Bank fraud in India:
Prevention, and Legal actions
Introduction
Bank fraud is a growing menace in
India, posing significant threats to
financial institutions, customers, and
the economy. The banking sector is
the backbone of India’s economic
stability, facilitating commerce, trade,
and personal financial management.
3. Account Takeover:
Involves unauthorised access to a
person's financial accounts, allowing
fraudsters to manipulate funds, make
unauthorised transactions, or even
take control of the entire account.
Techniques include phishing, malware
Common Types Financial Crimes in attacks, or exploiting weak account
Banking? security measures.
Understanding the enemy is the first
step in combating fraud. Financial 4. Phishing and Spoofing:
crimes in banking manifest in various Fraudsters use deceptive emails,
forms, including identity theft, credit messages, or websites to trick
card fraud, and account takeover. individuals into providing sensitive
Exploring these types sheds light on information, such as login credentials
the diverse tactics employed by or personal details.
fraudsters. Spoofing involves creating fake
websites or emails that mimic
1. Identity Theft: legitimate financial institutions to
Involves the unauthorised acquisition deceive individuals into divulging
and use of an individual's personal confidential information.
information, such as social security
numbers or financial data, to commit 5. Check Fraud:
fraudulent activities. Involves the unauthorised use of
checks to conduct fraudulent
Perpetrators often create false transactions.
identities to open accounts, apply for Perpetrators may alter the payee or
credit, or make unauthorised amount on a check, create counterfeit
transactions, leaving victims grappling checks, or engage in check kiting to
with financial and reputational manipulate account balances.
repercussions.
6. Wire Fraud:
2. Credit Card Fraud: Encompasses fraudulent schemes
Occurs when unauthorised individuals conducted through electronic
gain access to credit card information communication, such as emails or
and make unauthorised transactions. messaging apps.
83
3. Adaptive Strategies:
86
Final Thoughts
In the dynamic landscape of banking,
the cat-and-mouse game with
fraudsters necessitates a proactive
and adaptive approach. Fraud
87
ROLE OF RBI IN BANK FRAUD the matter of State Bank of India & Ors. Vs.
The Reserve Bank of India (RBI) Rajesh Agarwal & Ors.).
issued revised Master Directions on
Fraud Risk Management in July 2024, In this matter, the Supreme Court of
India addressed the penal measures
Superseding previous guidelines and for fraudulent borrowers as stipulated
consolidating 36 existing circulars. under Clause 8.12 of the RBI's Master
These comprehensive directions Directions on Frauds.
apply to a wide range of regulated
entities, including commercial banks, The Court emphasized the application
cooperative banks, and non-banking of penal provisions similar to those for
finance companies. wilful defaulters, extending the
restrictions to promoters, directors
Purpose and Objective and whole-time directors of the
The Reserve Bank of India's Revised borrowing company.
Master Directions on Fraud Risk
Management, issued on July 15, Notably, fraudulent borrowers are
2024, aim to provide a robust barred from availing bank finance
framework for the prevention, early from various financial institutions for
detection, and timely reporting of five years from the date of full
frauds in regulated entities (REs). repayment of the defrauded amount.
The revised guidelines aim to
strengthen the role of boards in The Court also highlighted the
overseeing fraud risk management, significance of the principles of natural
enhance internal audit and control justice, asserting that borrowers must
frameworks and ensure compliance be given an opportunity to be heard
with principles of natural justice. before their accounts are classified as
fraudulent.
Compliance with the Principles of Consequently, the Court mandated
Natural Justice before declaration of that banks must serve a notice and
account as fraud provide a hearing to the borrowers
The Master Directions now expressly before classifying their accounts as
require that the REs shall ensure fraudulent, ensuring compliance with
compliance with the principles of the principles of natural justice.
natural justice in a time-bound Additionally, the framework on Early
manner before classifying Persons / Warning Signals (EWS) and Red
Entities as fraudulent. Flagging of Accounts (RFA) has been
It duly takes into account the Hon’ble further strengthened for early
Supreme Court Judgment dated March detection and prevention of frauds in
27, 2023 (Civil Appeal No. 7300 of 2022 in the REs including timely reporting to
Law Enforcement
91
These Directions shall supersede the The customer received a call from
earlier Directions on the subject, someone who fraudulently posed as
namely, the Master Direction – customer care representative for the
Monitoring of Frauds in NBFCs retailer.
(Reserve Bank) Directions, 2016
dated September 29, 2016. Following the fraudster's instructions,
the customer downloaded a mobile
Yours faithfully application.
This led to unauthorized transactions
(Rajnish Kumar) being made from the customer's bank
Chief General Manager account, totaling ₹94,204.80.
Encl.: as above.
97
State Bank of India denied liability for The Court held that banks must utilize
these transactions, arguing that they the best available technology to
were authorized since they involved detect and prevent unauthorized and
the sharing of OTPs and M-PINs by fraudulent transactions, placing this
the customer. technological obligation squarely on
the banking institutions.
The customer contested this claim,
maintaining that they never shared The Court referenced Clauses 8 and
sensitive information like OTP or 9 of the RBI Circular dated 6th July,
MPIN with anyone. 2017, which establish "zero liability"
for customers in cases of
The customer alleged that the fraud unauthorized transactions resulting
occurred due to a data breach on the from third-party data breaches,
retailer's website, which was beyond provided they are reported promptly.
their control.
The Court noted the significance of
The customer reported the the customer's prompt reporting, that
unauthorized transactions to SBI the fraudulent transaction was
within 24 hours of their occurrence. brought to the bank's notice within 24
The matter was initially brought before hours of occurrence.
a Single Judge Bench, which held SBI
liable for the unauthorized While upholding SBI's liability in this
transactions. case, the Court simultaneously
observed the reciprocal duty of
SBI filed an Intra-Court appeal before account holders to exercise extreme
the Division Bench of the High Court, vigilance regarding OTPs and not
which was dismissed. share them with third parties.
Subsequently, SBI filed a Special
Leave Petition before the Supreme The Court observed that in certain
Court challenging the High Court's circumstances, customers could be
decision. held responsible for negligence,
though no such negligence was
What were the Court’s Observations? established in the present case.
The Supreme Court stated that banks
cannot abdicate their responsibility to The Court ultimately found no reason
protect customers from unauthorized to interfere with the High Court's
transactions reported from their judgment, which had determined the
accounts, emphasizing the bank's transactions to be unauthorized and
duty of vigilance. fraudulent in nature, with no
negligence attributable to the
customer.
98
Additional Requirements:
Banks must:
Display liability policy in public domain
Inform existing customers individually
Provide policy details at account
opening
100
Hackers have stolen billions of pieces File a police report with local law
of PII in the past year alone through enforcement.
data breaches. So even if you haven’t Freeze or cancel affected accounts.
been directly targeted by a criminal, Set up a credit freeze or lock to stop
there’s a good chance you’re still further financial fraud.
vulnerable to financial fraud. Review your credit report and dispute
any fraudulent activity
Be especially careful with your SSN Change your account passwords and
as it's not always possible to change start using a password manager.
your Social Security number — even Enable two-factor authentication
after identity theft. (2FA) using an authenticator app.
You can also follow our fraud victim's
How do you know you're being checklist for step-by-step instructions
targeted? on how to recover from fraud.
You might also want to consider
Unfamiliar transactions on your credit signing up for credit monitoring and
card. identity theft protection.
Strange charges on your bank
statements. For example, Aura monitors all your
New credit cards or loans in your financial accounts and alerts you of
name. suspicious activity. And if the worst
Missing or error-filled tax returns. happens, you’re covered by a
Calls from debt collectors about $1,000,000 insurance policy for
purchases you didn’t make. eligible losses due to identity theft.
A drop in credit score.
Bounced checks. 📚 Related: Is Identity Theft Protection
Calls verifying unfamiliar purchases. Really Worth It? →
Hard inquiries on your credit report.
Fraud alerts from your bank or credit 2. Advance fee fraud
monitoring service. Advance fee fraud is when a thief
What to do if you’re a victim: requires you to send money in
advance for payments, products, or
You’ll need to take different actions services. The promised rewards can
depending on what financial fraud a range from better credit to money
criminal has committed under your from a foreign prince, and more. But
name. But in all cases, you’ll want to: in the end, they either aren't what was
promised, or never arrive.
Contact all impacted companies and
financial institutions. One common example is a con artist
File an identity theft report with the claiming to get you a better deal on a
Federal Trade Commission (FTC) at loan or reverse mortgage in return for
IdentityTheft.gov. a “finder’s fee”. They’ll ask you to sign
110
a contract that requires you to pay the financial information once you’re sure
fee once they introduce you to the a process is legitimate.
financing source.
⚠️ Take action: If scammers have
But after you pay, you’ll often discover your personal information, your bank
it isn’t what the “finder” claimed it to account, email, and identity could be
be. Or worse, that you’re ineligible for at risk. Try Aura’s identity theft
the loan. And because you signed the protection free for 14 days to secure
contract, you have no recourse. your identity.
What are the warning signs? 3. Cashier’s check and fake check
fraud
A business asking you for prepayment The cashier’s check fraud is a simple
for services such as securing a loans bank scam that relies on the fact that
Businesses or individuals that operate it can take weeks for a cashier’s
out of PO boxes or mail drops. check to be verified. Reports of this
Individuals that you can’t reach scam have grown by 65% since 2015
directly (i.e., they’re never in when [*], prompting all the more reason to
you call but will call you back later). be aware.
Asking you to sign a contract like a
non-disclosure agreement (NDA) that How does cashier’s check fraud
limits you from discussing the deal happen?
with other people.
Businesses that don’t show up on the Scammers send a forged cashier’s
Better Business Bureau. (You can check with false information, which
also run a Google search for “Their you’re able to deposit without a
name/business name + scam/fraud”.) problem. Then, they ask you to make
What to do if you’re a victim: a withdrawal of some or all of the
money and send it to them or a third
Unfortunately, if you’ve been a victim party as a wire transfer.
of advance fee fraud, there usually
isn’t a way to get your money back. When the check is discovered to be
But you should report the scam to the bank fraud, the scammer is gone —
Federal Trade Commission (FTC) at along with the wire transfer (which
ReportFraud.ftc.gov to protect future you can’t reverse).
consumers.
This same scam can be run using
Be wary of any offer that seems too fraudulent checks as well. A scammer
good to be true or that only accepts will wait outside a financial institution
unusual payment methods, like wire or send you a picture of a check and
transfers or gift cards. Only share ask you to deposit it for them.
111
Then, they’ll tell you to keep some of That makes tax fraud an appealing
the money for yourself and send them target for financial scams. One of the
the rest. When the check bounces a most common ones is tax refund
few days later, the money will be fraud.
taken out of your account.
How does tax refund fraud happen?
What are the warning signs?
Tax refund fraud is a type of identity
A seller who only accepts cashier’s theft where criminals fraudulently file
checks. tax returns in your name. They’ll
Offering you more money than you’re report incorrect income in order to
asking for a product. This is especially maximize your refund, which the
risky on marketplaces like Craigslist criminal will then deposit.
or Facebook Marketplace.
Asking you to deposit a check for In 2020, the IRS flagged 5.2 million
them and wire them the money tax returns as fraudulent [*].
(minus a fee).
What to do if you’re a victim: There are a few other versions of this
scam. In one, a fraudster pretends to
If you’ve deposited a cashier’s check be from the IRS and demands
and sent the scammer a wire transfer, personal information or payment for
there unfortunately isn’t a way to get taxes owing. You could also deal with
your money back. an unethical tax preparer who steals
your information or fraudulently files
Instead, you should report the fraud to for a refund under your name.
the FTC at ReportFraud.ftc.gov.
What are the warning signs?
If you’ve only deposited a cashier’s
check, don’t send money back to the Getting a letter from the IRS stating
scammer unless you know them that multiple returns have been filed in
personally. Even then, you should your name.
suggest a more secure online Receiving unfamiliar tax documents
payment method like PayPal or like a W-2 or 1099 form.
escrow instead. Notifications of an unfamiliar IRS.gov
account.
📚 Related: What Is Credit Monitoring Receiving unsolicited tax transcripts.
(And Do You Really Need It?) → Your bank blocks your tax refund
check.
4. Tax refund fraud and “ghost” tax You receive a refund check before
preparers you file your taxes.
Most people get stressed when Your tax preparer refuses to sign your
dealing with their taxes or the IRS. return or can’t explain discrepancies.
112
What are the warning signs? If a criminal has access to your credit
card, they most likely have other
Suspicious transactions on your credit sensitive information. Change all your
card or bank statement. account passwords to be more secure
Small unfamiliar charges on your and consider signing up for credit
account. (Fraudsters use a scam monitoring.
called carding to validate your credit
card before making large purchases.) 📚 Related: What Is Credit Protection?
Fraud alerts from your bank, credit Are You Making the Most of It? →
card issuer, or credit monitoring
service. 7. Financial account takeovers
Calls from creditors about purchases When an identity thief scams you
you didn’t make or new accounts you online to gain access to one of your
didn’t open. online financial accounts (or any
A lower balance than expected. account), it’s known as an account
Sudden changes to your credit score. takeover (ATO). A recent study
Transactions from locations you showed that as many as 38% of
haven’t been (i.e., foreign countries). consumers had been victims of
What to do if you’re a victim: account takeovers [*].
your credentials while using public Wi- Once you’ve secured your accounts,
Fi. you’ll want to change all your
passwords. Use strong pass phrases
You might think that hackers only that combine letters, numbers, and
want access to your accounts at symbols. Consider a password
financial institutions. But there are manager for keeping them safe.
plenty of other valuable accounts that
many users don’t secure. For Whenever possible, enable two-factor
example, a thief can buy goods with authentication (2FA) on your online
access to your Amazon account, or accounts. This is a special, one-time
ask friends for money on Snapchat. code that’s required to log into your
accounts along with your password
Plus, if you reuse passwords or use and username.
single-sign on accounts (i.e., log-in
with Facebook), they can access However, don’t use SMS as it can be
multiple accounts with a single compromised if your phone is stolen
takeover. or hacked. Instead, use an
authenticator app like Google or Okta.
What are the warning signs?
✅ Take action: If you accidentally give
Being locked out of your financial or scammers your personal data (or its
social media accounts. leaked in a data breach), they could
Notifications of failed login attempts or take out loans in your name or empty
two-factor authentication codes you your bank account. Try an identity
didn’t ask for. theft protection service to monitor
Your account looks different. your finances and alert you to fraud.
Strange messages sent from your
social media accounts.
Alerts that someone logged into your
account from a different IP address or
location.
The email or phone number
associated with the account is
changed without your permission.
What to do if you’re a victim:
Top 10 types of financial fraud in Freeze the account and get bank
business (and ways to prevent statements.
them) File a police report for identity theft.
To take action against financial fraud, Inform the impacted party or the
businesses need to understand the financial institution (banks/ insurance
various ways fraudsters can scam companies)
them. Change account passwords for the
bank account.
1. Identity theft
Identity frauds are some of the most 2. Advance fee fraud
common frauds you’ll come across Advance fee fraud is a type of
because, they’re comparatively easy financial crime where the scammer
to execute, thanks to the entices the victims to pay an upfront
technological advances & casual data fee with the false promise of getting a
sharing. Identity theft statistics show product or benefit later. Some of the
that more than a million reports of most common types of advance fee
identity theft were filed in 2022 in the fraud are lottery scams, inheritance
US alone. scams, loan scams, and investment
opportunity scams.
Identity theft fraud occurs when a
fraudster uses your financial While this has been a common
information, such as your brand practice for years, the rise of advance
name, credit card number, bank fee fraud has exponentially increased
account number, or bank statements, with the advent of messaging apps
without permission and uses it to and digital communication channels.
withdraw money or commit other Fraudsters target a range of victims
crimes, such as illegal loan and adopt strategies to scam them.
sanctioning. Some of the ways
criminals use data to commit fraud
are: 3. Fraudulent charities
Yes, fraudsters don’t leave
Applying for a loan in the philanthropy alone either. Brands that
individual/business’s name undertake charitable work as part of
Charging items to your credit card or their CSR need to look out for
debit card fraudulent charities that raise donation
Opening an unauthorized bank money as part of scams. Research
account even suggests that the majority of the
HyperVerge pro tips time, it is the employees, trustees,
In any type of financial fraud, it’s best and staff of charities who perpetrate
to follow the ‘prevention is better than these frauds.
cure’ mantra.
118
Fraudsters go as far as creating fake from new investors to pay off earlier
charities and the kind with which investors. They promise to invest the
you’ve been involved before to gain money to earn extremely high profits
your trust. They’re especially with little risk and later disappear with
prevalent during high-profile disasters your money.
and international events.
Scammers go to extensive lengths for
Ponzi schemes to look legitimate.
4. Payment fraud They build websites, fabricate
Just like identity theft, payment fraud documents, and get legitimate people
occurs when someone uses your on board to garner trust, making it
credit card to make payments for extremely difficult for victims to have a
personal gain. This is highly prevalent sense of doubt.
in the eCommerce industry and can
negatively impact individuals and
businesses. Hackers and
cybercriminals often use instant 6. Payroll fraud
messaging tools, email, phone calls, Payroll fraud occurs when an
and spammy links to steal money or individual illegally gains funds from an
personal data. organization’s payroll processing
system for their benefit. Employees
Individuals face significant losses, and employers both can have the
while businesses have to spend their potential to commit payroll fraud that
time and resources getting to the root involves timesheet fraud, ghost
of these scams. They have to settle payroll, third-party payroll,
the dispute, pay investigation and commission schemes, etc.
chargeback fees, and invest in human
personnel to settle the disputes. The employees can commit this fraud
by adding extra work hours when they
haven’t worked or increasing the
5. Investment fraud compensation rate by system
Investment fraud involves techniques manipulation. The employers can
and false information & promises for a withhold the salaries for their benefit.
potential profit of their investment. Both scenarios involve deceit and
Scammers fabricate and underplay stealing from the organization.
the risks and exaggerate the
supposed benefits of the investment
to get you on board.
5. Decreased Morale
It can lead to decreased morale
among employees, which can affect
the overall productivity and
performance of the business.
124
Multiple password reset requests and FIs are crucial in mitigating the risks
login attempts. associated with advance fee fraud –
Changes to contact details such as firms must raise awareness among
addresses and back-up email their customer base regarding the
addresses. indicators of advance fee scams:
Requesting new cards or checkbooks
to a new address. When encountering communications
The set up of a new authorized user. from a business, it is imperative to
Customer education is also vital in ensure the sender’s authenticity.
ensuring account safety. Staff should Verifying the organization’s legitimacy
encourage customers to turn on multi- is also critical when dealing with
factor authentication (MFA), change entities unfamiliar to the recipient –
passwords regularly, and offer the checking business registrations on
option to be contacted when a credit reputable online services, such as
limit request has been made. Companies House in the UK, to
confirm their status. Additionally,
attentiveness to details such as
misspelled URLs or addresses within
the message is crucial for detecting
potential fraudulent activities.
127