Frauds and Scams
- Scammers, posing as customer service, call customers asking for their banking information and claim there is an issue with their membership.
- Fraudsters call customers and claim their account has been deleted and send a link to verify the account. Once customers give their login credentials, fraudsters have access to financial details.
- Stay aware of text scams by looking out for typos, correspondence to a transaction you didn't make, and texts/emails claiming to be from Amazon even if you do not have an account. Refrain from sharing any personal information under any circumstances.
- Fraudsters install devices or modify existing card readers at ATMs, gas stations, or even retail outlets in order to receive your card information. Be aware and inspect card readers for any unusual attachments or signs of tampering.
- Be sure to cover the keypad while entering your PIN, and immediately report any suspicious activity to your bank.
Business Email Compromise (BEC)
- BEC scams include target businesses and involve criminals or fraudsters posing as employees, suppliers, or other trusted individuals.
- This tactic is used to trick employees into making unauthorized wire transfers or sharing sensitive information.
Card Not Present (CNP) Fraud
- CNP fraud occurs when someone uses stolen card information to make online or phone purchases where the physical card is not required.
Fake Banking Websites
- These fraudulent websites closely resemble legitimate banking portals to deceive unsuspected customers. The websites are designed to receive personal information or login credentials.
- Always access your online banking by directly typing the URL into your browser, or by using a trusted bookmark.
Fake Check Scams
- Scammers can send counterfeit checks to victims, asking and encouraging them to deposit the checks and send a portion of the funds back.
- The checks will eventually bounce, and leave the victim responsible for the entire amount.
- Scammers may call and impersonate a family member who needs both help and money to an elderly parent or grandparent.
- The caller may even change or hack the caller ID to make it seem it is coming from a trusted source or someone you know.
- Be aware of giving out any information such as your social security number, login credentials, or PIN numbers over the phone.
- These scams involve calling someone, most likely elderly, and claiming they have won the lottery or some other contest.
- The scammers will ask for all your information up front in order to receive the winnings but are evidently just looking to scam innocent people out of their money.
- These attacks include the deploying of malicious software in order to gain unauthorized access to your computer and mobile devices. Techniques like phishing links, infected attachments, or fake software updates may be used.
- Once infected, they can steal your passwords, banking details, and even take control of your accounts.
- Consistently update your security software and exercise caution while downloading files or clicking on suspicious links.
- This includes emails, text messages, or phone calls impersonating legitimate banks or financial institutions.
- These attacks aim to trick you into revealing sensitive information such as social security numbers, account numbers, or login credentials.
- Stay cautious and verify the accuracy of any communication before sharing personal data.
- This type of scam promises high ROIs (returns on investments), but uses funds from new investors to pay returns to earlier investors instead of generating real profits.
- Romance Scams often take place on social media platforms such as Facebook, Instagram, or other fake dating sites.
- A scammer may create a fake profile to gain the victim’s affection in order to ultimately receive money.
- Stay alert to who you are chatting with and trusting online.
- A malicious program on your own computer that downloads itself in order to achieve personal information without you or another user knowing.
- Spyware most often infects your device through links, or even emails.
- To avoid spyware from your own device, be sure to only use and click on familiar links and open emails from known senders.