banner

How Do Fraudsters Steal Data from Bank Cards?

In the modern world, everyone has bank cards. The cards are convenient to use and open up several opportunities that are not available with cash, for example buying goods online.

But in the matter of security, cards are not perfect at all. Every day, a huge amount of data leaks into the wrong hands. As a result, it all ends with a long legal process involving the bank and law enforcement agencies, and there is no guarantee that it will be possible to get your hard-earned money back.

So how exactly is this data stolen? Let’s figure it out.

Previously, we’ve told you how fraudsters steal money using crypto wallets. Read more here.

Types of data theft

Basically, we can distinguish two types of data theft: “contact” and “contactless.” 

  • “Contact” methods are carried out through direct physical contact.
  • “Contactless” methods, on the contrary, are conducted without such contact.
Bank cards danger

Now you’ll understand what we mean along the way.

Learn more here about how to use QR codes securely.

Contact methods

1) Skimming

Information can be stolen from the magnetic stripe on the card. To do this, a skimmer is used. This is a device that simulates a part of an ATM and is fixed on top of the card slot. The PIN code is stolen by installing a fake keyboard that records keystrokes, or by installing a small video camera that records the code. Or they may not steal the PIN code, but remove the money without it, because when paying online it is not necessary.

2) Via payment terminals

You can also steal data through PoS terminals. They install virus software or a device like the ones they use on ATMs.

3) Data theft by maintenance personnel

You can easily lose these cards in places such as bars, restaurants, and cafés, where waiters take the customer’s card with them to the cash register. On the way there, the waiter photographs the card from both sides and gets all the necessary information.

Contactless methods

Bank card danger

1) Phishing

We are talking about fake websites of banks and payment systems. There are also fake copy sites of various online stores, where filling out a payment form, instead of making a purchase, gives your data to fraudsters.

2) Smartphone Apps

It’s no secret that apps collect and store too much data about you. There is a possibility to steal this data. Sometimes there are copies of well-known banking which transmit data to the left.

3) Open Wi-Fi networks

Connect to open networks carefully! Now even a schoolboy can intercept access to your smartphone by installing a couple of cool hacker programs and get a variety of information.

4) Data theft by phone call

This is a classic scam when a person calls and introduces himself as a bank employee and persuades you that he needs your data for some kind of verification. Or they are represented by buyers who want to make a deposit and request extra data.

Conclusion

This is not an exhaustive list of all methods of data theft, only the most popular.

All you need to do to protect your data from theft or information leakage is to keep all your data secret and use Utopia P2P — a decentralized anonymous network with built-in tools for messaging, file sharing, money transfer, etc.

Read more about Utopia P2P here.

0 COMMENTS

Leave a Reply

Leave a comment

Your email address will not be published.