Fraudsters use various techniques to commit cybercrimes such as phishing scams, online sales platform frauds, downloading malicious apps, ATM skimming, SIM swapping, lottery scams, fake job offers, screen sharing apps, QR code scanning, and juice jacking. Customers should be cautious of unsolicited links and calls, only use verified apps, check for skimming devices on ATMs, avoid sharing personal details, ignore lottery offers that ask for money, verify job offers are legitimate, get tech support through official numbers only, do not scan unknown QR codes, and avoid public charging ports.
This document from the Office of RBI Ombudsman provides information on common fraudulent transactions involving banks and NBFCs. It describes 13 common modus operandi used by fraudsters targeting banks, including phishing links, vishing calls, and ATM card skimming. It also outlines 10 modus operandi targeting NBFCs, such as fake advertisements for loans and OTP-based fraud. The document concludes with general precautions consumers should take regarding financial transactions such as verifying links and contacts before providing personal details.
Phishing involves deceiving users into providing sensitive information such as passwords or credit card details by sending fraudulent emails appearing to come from legitimate sources. These emails contain links directing users to spoofed websites that mimic real websites to steal information. SIM swapping, or SIM swopping, is a related fraud where criminals contact mobile providers pretending to be the user to transfer their phone number to a new SIM card, intercepting account login notifications. Users should be wary of unsolicited requests for information and ensure their devices and accounts have strong security protections in place.
The document provides information and steps for identity theft victims. It discusses how identity theft occurs through various methods like stealing personal information from businesses, stealing mail, dumpster diving, or using skimming devices on ATMs. It outlines immediate steps victims should take, including placing fraud alerts on credit reports, closing any fraudulent accounts, and disputing any unauthorized charges. The document also discusses ongoing monitoring and prevention of further identity theft.
SIM swapping occurs when a fraudster uses stolen personal information to take control of a victim's mobile phone SIM card. The fraudster dupes the mobile phone operator into transferring the victim's number to a SIM card in the fraudster's possession, allowing the fraudster to receive calls, texts, and access online accounts intended for the victim. Victims notice their mobile phone loses service and later find they can no longer access banking accounts. The document provides tips to help prevent SIM swapping such as regularly updating passwords, limiting personal information shared online, and promptly reporting lost mobile service or unauthorized account access to authorities.
As India braces for a future of digital payments, how secure is your account from payment frauds? Here is a list of such frauds that you must watch out for!
How to Stay Safe While Using Digital Payment AppsSafeDeposit
For maximum safety, make sure your digital payment app is always up-to-date. To patch security holes and add new protections, developers frequently release updates. Ensure you always have the most recent security fixes by enabling automatic updates or often checking for new program versions.
This document from the Office of RBI Ombudsman provides information on common fraudulent transactions involving banks and NBFCs. It describes 13 common modus operandi used by fraudsters targeting banks, including phishing links, vishing calls, and ATM card skimming. It also outlines 10 modus operandi targeting NBFCs, such as fake advertisements for loans and OTP-based fraud. The document concludes with general precautions consumers should take regarding financial transactions such as verifying links and contacts before providing personal details.
Phishing involves deceiving users into providing sensitive information such as passwords or credit card details by sending fraudulent emails appearing to come from legitimate sources. These emails contain links directing users to spoofed websites that mimic real websites to steal information. SIM swapping, or SIM swopping, is a related fraud where criminals contact mobile providers pretending to be the user to transfer their phone number to a new SIM card, intercepting account login notifications. Users should be wary of unsolicited requests for information and ensure their devices and accounts have strong security protections in place.
The document provides information and steps for identity theft victims. It discusses how identity theft occurs through various methods like stealing personal information from businesses, stealing mail, dumpster diving, or using skimming devices on ATMs. It outlines immediate steps victims should take, including placing fraud alerts on credit reports, closing any fraudulent accounts, and disputing any unauthorized charges. The document also discusses ongoing monitoring and prevention of further identity theft.
SIM swapping occurs when a fraudster uses stolen personal information to take control of a victim's mobile phone SIM card. The fraudster dupes the mobile phone operator into transferring the victim's number to a SIM card in the fraudster's possession, allowing the fraudster to receive calls, texts, and access online accounts intended for the victim. Victims notice their mobile phone loses service and later find they can no longer access banking accounts. The document provides tips to help prevent SIM swapping such as regularly updating passwords, limiting personal information shared online, and promptly reporting lost mobile service or unauthorized account access to authorities.
As India braces for a future of digital payments, how secure is your account from payment frauds? Here is a list of such frauds that you must watch out for!
How to Stay Safe While Using Digital Payment AppsSafeDeposit
For maximum safety, make sure your digital payment app is always up-to-date. To patch security holes and add new protections, developers frequently release updates. Ensure you always have the most recent security fixes by enabling automatic updates or often checking for new program versions.
This document provides an overview of common types of cyber crimes. It discusses financial fraud crimes like CVV/OTP fraud, UPI fraud, and online shopping fraud. It also covers social media frauds such as cyber stalking, cyber bullying, hacking, account takeover and identity theft. Other cyber crimes mentioned include ransomware, malware, keyloggers, risks of using public Wi-Fi and hotspots, and potential data theft at service centers. The document provides brief descriptions of each crime and tips to help prevent falling victim.
This document provides a summary of fraud in banks. It discusses various types of fraud including fraud by insiders like rogue traders and fraudulent loans. It also discusses fraud by outsiders through methods like forged documents, check kiting, and credit/debit card fraud. The document notes that fraud is difficult to investigate due to its faceless and international nature. It concludes by providing security tips for banks to protect against fraud through strong passwords, risk-based authentication, integrated security solutions, mobile banking security, and application security management.
This document provides a summary of fraud in banks. It discusses various types of fraud including fraud by insiders like rogue traders and fraudulent loans. It also discusses fraud by outsiders through methods like forged documents, check kiting, and credit/debit card fraud. The document notes that fraud is difficult to investigate due to its faceless and international nature. It concludes by providing security tips for banks to protect against fraud through strong passwords, risk-based authentication, integrated security solutions, and mobile banking security.
The document discusses mobile payment wallets, including what they are, different types of wallets, how funds are handled, benefits and drawbacks. It also provides terms and conditions, fees, marketing strategies and news for Paytm wallet. The document includes a survey about mobile wallet usage along with findings and areas for improvement.
This document discusses internet fraud and provides information on:
- The nature and definitions of internet fraud, including using internet components like email, websites, and message boards to conduct fraudulent activities.
- Common types of internet fraud like auction fraud, credit/debit card fraud, and investment scams.
- Tools used to carry out internet fraud such as email, chat rooms, and spoofing/phishing websites.
- Statistics on internet crime complaints received by law enforcement in a given year, with internet auction fraud being the most reported offense.
This paper presents the awareness of Sim Swap attack among people and prevention of this attack, where the fraud person will Gain the personal information of person from different ways like fake call , sms ,Email, link, social media etc. mobile number is linked with bank and adhaar card the fraud person will gain the access of Bank account, credit card number and other personal information easily by trying various methods like MNC, Phone call, Hacking .It is difficult to undo the damage occurs. Snehal Manohar Awale | Dr. Praveen Gupta ""Awareness of Sim Swap Attack"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23982.pdf
Paper URL: https://www.ijtsrd.com/management/other/23982/awareness-of-sim-swap-attack/snehal-manohar-awale
A Real Person will travel, on your behalf, to validate an item, property or person's existence by completing a personalized report including current photos, videos and more. Includes preventative measures that will assist you in being informed prior to entering into transactions over
the Internet.
I had amde this ppt for my college presentation. It doesnt cover the various faruds in minute detail but this presentation is a very good overview! Enjoy!
Online-Scams, Dont be fooled by online scammers.pptxremisisdulawan22
This document outlines various common online scams, including phishing scams, ransomware, scareware, travel scams, fake shopping websites, grandparent scams, romance scams, hitman scams, lottery scams, tech support scams, disaster relief scams, COVID-19 scams, Nigerian letter scams, money transfer scams, pre-approved notice scams, and cryptocurrency scams. Each scam type is briefly described and scam warning signs are provided to help identify potential fraudulent activities online. Prevention tips encourage users to be cautious of unsolicited messages and links, verify official websites, and avoid providing personal information or making payments to unknown parties.
Identity theft occurs when a fraudster steals someone's personally identifiable information (PII) to commit fraud. Online identity theft involves stealing digital PII through methods like phishing emails, malware, or weak passwords. To protect against online identity theft, people should use strong and unique passwords, secure their devices and accounts, be wary of unsolicited requests for information, and properly dispose of devices containing PII. Educating children about safeguarding private information online is also important.
Small Businesses: Tips to Avoiding Fraudulent Chargebacks- Mark - Fullbright
Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free guide for merchants to protect themselves online & POS and to reduce their exposure to chargebacks and losses due to fraud.
• Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Identity fraud is a growing problem, but some precautions can help prevent it. Freezing your credit reports and checking them annually for inaccuracies makes it difficult for others to open new lines of credit in your name. Minimizing mail, checking bank accounts frequently online or at ATMs, shredding documents with personal information, and being wary of phishing emails are also effective precautions against identity theft. Limiting personal information shared online and not giving sensitive details to unknown callers can further reduce fraud risks.
Identity fraud is a growing problem, but some precautions can help prevent it. Freezing your credit reports and checking them annually for inaccuracies makes it difficult for others to open new lines of credit in your name. Minimizing mail, checking bank accounts frequently online or at ATMs, shredding documents with personal information, and being wary of phishing emails are also effective precautions against identity theft. Limiting personal information shared online and not giving sensitive details to unknown callers can further reduce fraud risks.
Credit card fraud is an escalating issue in the digital age. Criminals employ diverse tactics,
such as phishing and data breaches, to access sensitive information, leading to unauthorized
purchases and identity theft. Both individuals and businesses suffer financial losses and
reputation damage.
The document discusses bank frauds in India. It defines bank fraud and outlines some common types of offline and online bank frauds such as cheque fraud, payment card fraud, forgery, money laundering, and phishing. It provides tips for preventing fraud and recent examples of reported bank fraud cases in India totaling hundreds of crores. The conclusion states that fraud undermines trust in banks and the economy, so prevention through education and technology is important.
Be alert for two recent scams revolving around the payment of utility bills. This alert from David Lerner Associates has the details of what to watch for.
This document discusses prevention of fraud and forgery in internet banking. It begins by defining fraud and forgery, explaining how they differ. It then explains how internet banking fraud often occurs through phishing attacks, where fraudsters steal login credentials through deceptive emails or websites. The document outlines the typical process fraudsters use, from obtaining details to transferring money. It emphasizes that awareness is key to prevention and provides tips for customers to avoid falling victim, such as using strong unique passwords, updating security software, and being wary of unsolicited communications asking for private information.
Cybercrime encompasses any criminal acts involving computers and networks, including traditional crimes conducted online like identity theft, credit card fraud, and harassment. Common types of cybercrimes include hacking, denial of service attacks, virus dissemination, software piracy, pornography, phishing, cyberstalking, cyber defamation, threatening, and net extortion. Hackers, teenagers, and business rivals are usual suspects while trusting and unlucky individuals are usual victims.
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANEDK PAGEANT
Amruthaa Uttam Jagdhane, a stunning woman from Pune, has won the esteemed title of Mrs. India 2024, which is given out by the Dk Exhibition. Her journey to this prestigious accomplishment is a confirmation of her faithful assurance, extraordinary gifts, and profound commitment to enabling women.
Amid the constant barrage of distractions and dwindling motivation, self-discipline emerges as the unwavering beacon that guides individuals toward triumph. This vital quality serves as the key to unlocking one’s true potential, whether the aspiration is to attain personal goals, ascend the career ladder, or refine everyday habits.
Understanding Self-Discipline
More Related Content
Similar to cybercrime-copy-221128120143-2a2ea05c.pdf
This document provides an overview of common types of cyber crimes. It discusses financial fraud crimes like CVV/OTP fraud, UPI fraud, and online shopping fraud. It also covers social media frauds such as cyber stalking, cyber bullying, hacking, account takeover and identity theft. Other cyber crimes mentioned include ransomware, malware, keyloggers, risks of using public Wi-Fi and hotspots, and potential data theft at service centers. The document provides brief descriptions of each crime and tips to help prevent falling victim.
This document provides a summary of fraud in banks. It discusses various types of fraud including fraud by insiders like rogue traders and fraudulent loans. It also discusses fraud by outsiders through methods like forged documents, check kiting, and credit/debit card fraud. The document notes that fraud is difficult to investigate due to its faceless and international nature. It concludes by providing security tips for banks to protect against fraud through strong passwords, risk-based authentication, integrated security solutions, mobile banking security, and application security management.
This document provides a summary of fraud in banks. It discusses various types of fraud including fraud by insiders like rogue traders and fraudulent loans. It also discusses fraud by outsiders through methods like forged documents, check kiting, and credit/debit card fraud. The document notes that fraud is difficult to investigate due to its faceless and international nature. It concludes by providing security tips for banks to protect against fraud through strong passwords, risk-based authentication, integrated security solutions, and mobile banking security.
The document discusses mobile payment wallets, including what they are, different types of wallets, how funds are handled, benefits and drawbacks. It also provides terms and conditions, fees, marketing strategies and news for Paytm wallet. The document includes a survey about mobile wallet usage along with findings and areas for improvement.
This document discusses internet fraud and provides information on:
- The nature and definitions of internet fraud, including using internet components like email, websites, and message boards to conduct fraudulent activities.
- Common types of internet fraud like auction fraud, credit/debit card fraud, and investment scams.
- Tools used to carry out internet fraud such as email, chat rooms, and spoofing/phishing websites.
- Statistics on internet crime complaints received by law enforcement in a given year, with internet auction fraud being the most reported offense.
This paper presents the awareness of Sim Swap attack among people and prevention of this attack, where the fraud person will Gain the personal information of person from different ways like fake call , sms ,Email, link, social media etc. mobile number is linked with bank and adhaar card the fraud person will gain the access of Bank account, credit card number and other personal information easily by trying various methods like MNC, Phone call, Hacking .It is difficult to undo the damage occurs. Snehal Manohar Awale | Dr. Praveen Gupta ""Awareness of Sim Swap Attack"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23982.pdf
Paper URL: https://www.ijtsrd.com/management/other/23982/awareness-of-sim-swap-attack/snehal-manohar-awale
A Real Person will travel, on your behalf, to validate an item, property or person's existence by completing a personalized report including current photos, videos and more. Includes preventative measures that will assist you in being informed prior to entering into transactions over
the Internet.
I had amde this ppt for my college presentation. It doesnt cover the various faruds in minute detail but this presentation is a very good overview! Enjoy!
Online-Scams, Dont be fooled by online scammers.pptxremisisdulawan22
This document outlines various common online scams, including phishing scams, ransomware, scareware, travel scams, fake shopping websites, grandparent scams, romance scams, hitman scams, lottery scams, tech support scams, disaster relief scams, COVID-19 scams, Nigerian letter scams, money transfer scams, pre-approved notice scams, and cryptocurrency scams. Each scam type is briefly described and scam warning signs are provided to help identify potential fraudulent activities online. Prevention tips encourage users to be cautious of unsolicited messages and links, verify official websites, and avoid providing personal information or making payments to unknown parties.
Identity theft occurs when a fraudster steals someone's personally identifiable information (PII) to commit fraud. Online identity theft involves stealing digital PII through methods like phishing emails, malware, or weak passwords. To protect against online identity theft, people should use strong and unique passwords, secure their devices and accounts, be wary of unsolicited requests for information, and properly dispose of devices containing PII. Educating children about safeguarding private information online is also important.
Small Businesses: Tips to Avoiding Fraudulent Chargebacks- Mark - Fullbright
Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free guide for merchants to protect themselves online & POS and to reduce their exposure to chargebacks and losses due to fraud.
• Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Identity fraud is a growing problem, but some precautions can help prevent it. Freezing your credit reports and checking them annually for inaccuracies makes it difficult for others to open new lines of credit in your name. Minimizing mail, checking bank accounts frequently online or at ATMs, shredding documents with personal information, and being wary of phishing emails are also effective precautions against identity theft. Limiting personal information shared online and not giving sensitive details to unknown callers can further reduce fraud risks.
Identity fraud is a growing problem, but some precautions can help prevent it. Freezing your credit reports and checking them annually for inaccuracies makes it difficult for others to open new lines of credit in your name. Minimizing mail, checking bank accounts frequently online or at ATMs, shredding documents with personal information, and being wary of phishing emails are also effective precautions against identity theft. Limiting personal information shared online and not giving sensitive details to unknown callers can further reduce fraud risks.
Credit card fraud is an escalating issue in the digital age. Criminals employ diverse tactics,
such as phishing and data breaches, to access sensitive information, leading to unauthorized
purchases and identity theft. Both individuals and businesses suffer financial losses and
reputation damage.
The document discusses bank frauds in India. It defines bank fraud and outlines some common types of offline and online bank frauds such as cheque fraud, payment card fraud, forgery, money laundering, and phishing. It provides tips for preventing fraud and recent examples of reported bank fraud cases in India totaling hundreds of crores. The conclusion states that fraud undermines trust in banks and the economy, so prevention through education and technology is important.
Be alert for two recent scams revolving around the payment of utility bills. This alert from David Lerner Associates has the details of what to watch for.
This document discusses prevention of fraud and forgery in internet banking. It begins by defining fraud and forgery, explaining how they differ. It then explains how internet banking fraud often occurs through phishing attacks, where fraudsters steal login credentials through deceptive emails or websites. The document outlines the typical process fraudsters use, from obtaining details to transferring money. It emphasizes that awareness is key to prevention and provides tips for customers to avoid falling victim, such as using strong unique passwords, updating security software, and being wary of unsolicited communications asking for private information.
Cybercrime encompasses any criminal acts involving computers and networks, including traditional crimes conducted online like identity theft, credit card fraud, and harassment. Common types of cybercrimes include hacking, denial of service attacks, virus dissemination, software piracy, pornography, phishing, cyberstalking, cyber defamation, threatening, and net extortion. Hackers, teenagers, and business rivals are usual suspects while trusting and unlucky individuals are usual victims.
Similar to cybercrime-copy-221128120143-2a2ea05c.pdf (20)
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANEDK PAGEANT
Amruthaa Uttam Jagdhane, a stunning woman from Pune, has won the esteemed title of Mrs. India 2024, which is given out by the Dk Exhibition. Her journey to this prestigious accomplishment is a confirmation of her faithful assurance, extraordinary gifts, and profound commitment to enabling women.
Amid the constant barrage of distractions and dwindling motivation, self-discipline emerges as the unwavering beacon that guides individuals toward triumph. This vital quality serves as the key to unlocking one’s true potential, whether the aspiration is to attain personal goals, ascend the career ladder, or refine everyday habits.
Understanding Self-Discipline
At Affordable Garage Door Repair, we specialize in both residential and commercial garage door services, ensuring your property is secure and your doors are running smoothly.
Care Instructions for Activewear & Swim Suits.pdfsundazesurf80
SunDaze Surf offers top swimwear tips: choose high-quality, UV-protective fabrics to shield your skin. Opt for secure fits that withstand waves and active movement. Bright colors enhance visibility, while adjustable straps ensure comfort. Prioritize styles with good support, like racerbacks or underwire tops, for active beach days. Always rinse swimwear after use to maintain fabric integrity.
The Fascinating World of Bats: Unveiling the Secrets of the Nightthomasard1122
The Fascinating World of Bats: Unveiling the Secrets of the Night
Bats, the mysterious creatures of the night, have long been a source of fascination and fear for humans. With their eerie squeaks and fluttering wings, they have captured our imagination and sparked our curiosity. Yet, beyond the myths and legends, bats are fascinating creatures that play a vital role in our ecosystem.
There are over 1,300 species of bats, ranging from the tiny Kitti's hog-nosed bat to the majestic flying foxes. These winged mammals are found in almost every corner of the globe, from the scorching deserts to the lush rainforests. Their diversity is a testament to their adaptability and resilience.
Bats are insectivores, feeding on a vast array of insects, from mosquitoes to beetles. A single bat can consume up to 1,200 insects in an hour, making them a crucial part of our pest control system. By preying on insects that damage crops, bats save the agricultural industry billions of dollars each year.
But bats are not just useful; they are also fascinating creatures. Their ability to fly in complete darkness, using echolocation to navigate and hunt, is a remarkable feat of evolution. They are also social animals, living in colonies and communicating with each other through a complex system of calls and body language.
Despite their importance, bats face numerous threats, from habitat destruction to climate change. Many species are endangered, and conservation efforts are necessary to protect these magnificent creatures.
In conclusion, bats are more than just creatures of the night; they are a vital part of our ecosystem, playing a crucial role in maintaining the balance of nature. By learning more about these fascinating animals, we can appreciate their importance and work to protect them for generations to come. So, let us embrace the beauty and mystery of bats, and celebrate their unique place in our world.
Biography and career history of Bruno AmezcuaBruno Amezcua
Bruno Amezcua's entry into the film and visual arts world seemed predestined. His grandfather, a distinguished film editor from the 1950s through the 1970s, profoundly influenced him. This familial mentorship early on exposed him to the nuances of film production and a broad array of fine arts, igniting a lifelong passion for narrative creation. Over 15 years, Bruno has engaged in diverse projects showcasing his dedication to the arts.
Insanony: Watch Instagram Stories Secretly - A Complete GuideTrending Blogers
Welcome to the world of social media, where Instagram reigns supreme! Today, we're going to explore a fascinating tool called Insanony that lets you watch Instagram Stories secretly. If you've ever wanted to view someone's story without them knowing, this blog is for you. We'll delve into everything you need to know about Insanony with Trending Blogers!
Insanony: Watch Instagram Stories Secretly - A Complete Guide
cybercrime-copy-221128120143-2a2ea05c.pdf
1.
2.
3.
4. A cybercrime is a crime that involves a computer or a computer network.
The computer may have been used in committing the crime, or it may be the
target. Cybercrime may harm someone's security or finances.
5. TYPES OF ONLINE FRAUD
SL NO. SUBJECT
1 Phishing links
2 Frauds using online sales platforms
3 Unverified mobile apps
4 ATM card skimming
5 SIM swap
6 Lottery frauds
7 Online job frauds
8 Frauds using screen sharing app
9 Scam through QR code scan
10 Juice jacking
6. Fraudsters create a third-party phishing website which looks like an existing genuine website,
such as - a bank’s website or an e-commerce website or a search engine, ETC.
Links to these websites are circulated by fraudsters through Short Message Service (SMS) / social
media / email / Instant Messenger, etc.
Many customers click on the link without checking the detailed Uniform Resource Locator (URL)
and enter secure credentials such as Personal Identification Number (PIN), One Time Password
(OTP), Password, etc., which are captured and used by the fraudsters.
Do not click on unknown / unverified links and immediately delete such SMS / email sent by
unknown sender to avoid accessing them by mistake in future
Unsubscribe the mails providing links to a bank / e-commerce / search engine website and block
the sender’s e-mail ID, before deleting such emails.
Always go to the official website of your bank / service provider. Carefully verify the website
details especially where it requires entering financial credentials. Check for the secure sign
(https with a padlock symbol) on the website before entering secure credentials.
7. Fraudsters pretend to be buyers on online sales platforms and show an interest in seller’s product/s.
Many fraudsters pretend to be defence personnel posted in remote locations to gain confidence.
Instead of paying money to the seller, they use the “request money” option through the Unified
Payments Interface (UPI) app and insist that the seller approve the request by entering UPI PIN. Once
the seller enters the PIN, money is transferred to the fraudster’s account.
Always be careful when you are buying or selling products using online sales platforms.
Always remember that there is no need to enter PIN / password anywhere to receive money.
If UPI or any other app requires you to enter PIN to complete a transaction, it means you will be
sending money instead of receiving it.
8. Fraudsters circulate through SMS / email / social media / Instant Messenger, etc., certain app
links, masked to appear similar to the existing apps of authorised entities.
Fraudsters trick the customer to click on such links which results in downloading of unknown /
unverified apps on the customer’s mobile / laptop / desktop, etc.,
Once the malicious application is downloaded, the fraudster gains complete access to the
customer’s device. These include confidential details stored on the device and messages / OTPs
received before / after installation of such apps.
Never download an application from any unverified / unknown sources or on being asked/
guided by an unknown person.
As a prudent practice before downloading, check on the publishers / owners of the app being
downloaded as well as its user ratings etc.
While downloading an application, check the permission/s and the access to your data it seeks,
such as contacts, photographs, etc. Only give those permissions which are absolutely required to
use the desired application.
9. Fraudsters install skimming devices in ATM machines and steal data from the customer’s card.
Fraudsters may also install a dummy keypad or a small / pinhole camera, well-hidden from plain sight
to capture ATM PIN.
Sometimes, fraudsters pretending to be other customer standing near-by gain access to the PIN when
the customer enters it in an ATM machine.
This data is then used to create a duplicate card and withdraw money from the customer’s account.
Always check that there is no extra device attached, near the card insertion slot or keypad of the ATM
machine, before making a transaction.
Cover the keypad with your other hand while entering the PIN.
NEVER write the PIN on your ATM card.
Do NOT enter the PIN in the presence of any other / unknown person standing close to you.
Do NOT give your ATM card to anyone for withdrawal of cash.
10. Fraudsters gain access to the customer’s Subscriber Identity Module (SIM) card or may obtain a
duplicate SIM card (including electronic-SIM) for the registered mobile number connected to the
customer’s bank account.
Fraudsters use the OTP received on such duplicate SIM to carry out unauthorised transactions.
Fraudsters generally collect the personal / identity details from the customer by posing as a
telephone / mobile network staff and request the customer details in the name of offers such as
- to provide free upgrade of SIM card from 3G to 4G or to provide additional benefits on the SIM
card.
Never share identity credentials pertaining to your SIM card.
Be watchful regarding mobile network access in your phone. If there is no mobile network in
your phone for a considerable amount of time in a regular environment, immediately contact
the mobile operator to ensure that no duplicate SIM is being / has been issued for your mobile
number.
11. Fraudsters send emails or make phone calls that a customer has won a huge lottery. However, in order
to receive the money, the fraudsters ask the customers to confirm their identity by entering their
bank account / credit card details on a website from which data is captured by the fraudsters.
Fraudsters also ask the customers to pay taxes/ forex charges / upfront or pay the shipping charges,
processing / handling fee, etc., to receive the lottery / product.
Fraudsters in some cases, may also pose as a representative of RBI or a foreign bank / company /
international financial institution and ask the customer to transfer a relatively small amount in order
to receive a larger amount in foreign currency from that institution.
Beware of such unbelievable lottery or offers - nobody gives free money, especially such huge amounts
of money.
Do not make payments or share secure credentials in response to any lottery calls / emails.
RBI never opens accounts of members of public or takes deposits from them. Such messages are
fraudulent.
RBI never asks for personal / bank details of members of public. Beware of fake RBI logos and
messages
12. Fraudsters create fake job search websites and when the job seekers share secure credentials of
their bank account / credit card / debit card on these websites during registration, their
accounts are compromised.
Fraudsters also pose as officials of reputed company(s) and offer employment after conducting
fake interviews. The job seeker is then induced to transfer funds for registration, mandatory
training program, laptop, etc.
For any job offer, including from overseas entities, first confirm the identity and contact details
of the employing company / its representative.
Always remember that a genuine company offering a job will never ask for money for offering
the job.
Do not make payments on unknown job search websites.
13. Fraudsters trick the customer to download a screen sharing app.
Using such app, the fraudsters can watch / control the customer’s mobile / laptop and gain
access to the financial credentials of the customer.
Fraudsters use this information to carry out unauthorised transfer of funds or make payments
using the customer’s Internet banking / payment apps.
If your device faces any technical glitch and you need to download any screen sharing app,
deactivate / log out of all payment related apps from your device.
Download such apps only when you are advised through the official Toll-free number of the
company as appearing in its official website. Do not download such apps in case an executive of
the company contacts you through his / her personal contact number.
As soon as the work is completed, ensure that the screen sharing app is removed from your
device.
14. Fraudsters often contact customers under various pretexts and trick them into scanning Quick
Response (QR) codes using the apps on the customers’ phone.
By scanning such QR codes, customers may unknowingly authorise the fraudsters to withdraw
money from their account.
Be cautious while scanning QR code/s using any payment app. QR codes have account details
embedded in them to transfer money to a particular account.
Never scan any QR code to receive money. Transactions involving receipt of money do not
require scanning barcodes / QR codes or entering mobile banking PIN (m-PIN), passwords, etc.
15. The charging port of a mobile, can also be used to transfer files / data.
Fraudsters use public charging ports to transfer malware to customer phones
connected there and take control / access / steal data sensitive data such as
emails, SMS, saved passwords, etc. from the customers’ mobile phones (Juice
Jacking).
Avoid using public / unknown charging ports / cables.
16. 14% 19%
28% 25%
38% 28%
25% 27%
48% 54% 46% 48%
0%
20%
40%
60%
80%
100%
120%
2018 2019 2020 2021
AXIS
TITLE
AXIS TITLE
Series 1 Series 2 Series 3