Scam Alert-phishing.indd

Transcription

Scam Alert-phishing.indd
What to do if you fall victim to an attack:
Act immediately to protect yourself!
• Alert your financial institution at once so
that they can close the accounts and cards.
Access to your account could occur within
minutes of your providing the information, so it
is important to take action as soon as possible.
• If you disclosed sensitive information, you
should also contact one of the three major
credit bureaus and discuss whether you need
to place fraud alerts on your credit files,
which will help prevent thieves from opening
new accounts in your name.
YOU CAN FIGHT IDENTITY THEFT
NEVER PROVIDE PERSONAL FINANCIAL
INFORMATION (Debit/credit card numbers,
Social Security numbers, account numbers,
password, PINs, 3 or 4 digit security codes on
reverse side of debit/credit cards) IF YOU
DIDN’T INITIATE CONTACT.
NEVER CLICK ON A LINK PROVIDED IN AN
EMAIL you are not completely sure about. Some
very authentic-looking ‘FAKES’ are out there.
It’s best to access the site directly by typing the
website address.
EQUIFAX
DO NOT RESPOND TO AN EMAIL OR CALLER
800.525.6285
P O Box 740250
Atlanta GA 30374
who suggests monetary incentives or dire
consequences if you do not immediately provide
or verify financial information to them.
EXPERIAN
ACT QUICKLY IF YOU FALL VICTIM TO AN
ATTACK to protect yourself. Alert your financial
888.397.3742
P O Box 1017
Allen TX 75013
TRANSUNION
800.680.7289
P O Box 6790
Fullerton, CA 92634
SCAM ALERT
Protect
Your
Identity
institution. Place fraud alerts on your credit files.
Monitor your credit files and account statements
closely.
REPORT SUSPICIOUS EMAILS OR CALLS to the
Federal Trade Commission at www.ftc.gov/IDtheft or
by calling 1.877.IDTHEFT
Don’t become a victim of
phishing or vishing attacks
• Monitor your credit files and account
statements closely.
Report all suspicious contacts to the Federal Trade
Commission at
www.ftc.gov/idtheft or
call 1.877.IDTHEFT
740.633.0445 • 888.275.5566
R
ecent scams have targeted the local area
via unsolicited phone calls, emails and
fake website links asking for personal
information. These scams are called “phishing”
and “vishing”. Both are forms of piracy whereby
thieves make unsolicited contacts, ‘fishing’ for
personal financial information from unsuspecting
victims.
Phishing is the process of using SPAM email
and fraudulently-designed copies of “trusted”
web sites to lure people into revealing their
personal and sensitive information. The latest
version, called “vishing” is similar, but instead of
using the Internet and email, the thieves primarily
use the telephone to carry out their scams. Their
goal is to trick bank customers into revealing
confidential information that will give the thieves
access to their identity and money.
They are usually searching for account
numbers, passwords, PIN numbers, social security
numbers, credit and debit card numbers, as well
as the three- or four-digit security codes (CVV
or CVC) on the reverse side of credit and debit
cards.
These attacks are on the rise all across the
United States and the techniques are becoming
very sophisticated, making legitimate calls from
a bank and attempts at theft more difficult to
differentiate. They can even manipulate how
their name or caller ID appears, adding to the
appearance that the call is actually legitimate.
If you understand how phishing works and
how to protect yourself from becoming a victim,
you can help stop this crime.
Here’s How Phishing Works:
• You may receive an email indicating
there has been a problem with your
account and directing you to call a phone
number. When that number is called, a
prerecorded message takes you through
a series of prompts and leads you to
reveal critical information by recording the
information after a tone.
• You may receive a prerecorded phone
call where you are again taken through
a series of prompts and asked to enter
important numbers via your phone. These
calls can occur any time of the day or night
and may be repeated several times.
• A live person may call explaining that
your account has been compromised or
indicating that you need to update your
information. They will attempt to solicit
information from you.
• You may be offered a financial incentive
for taking part in a survey. They will then
ask for your account number so they can
put the money directly into your account,
which of course, will not be done but is just
a way of getting your account number.
If you provide the requested information, you
may find yourself the victim of identify theft.
How to Protect Yourself:
NEVER GIVE OUT YOUR PERSONAL
FINANCIAL INFORMATION if you have not
initiated the contact. Your bank will never call you
asking for any private financial information. In most
cases, since you are already a customer of the bank,
they already have that information on file, so there
would be no need for the bank to ask you for it.
Some additional precautions you can take to
protect yourself:
• If you receive a suspicious phone call,
email or text message requesting personal
information, DO NOT RESPOND. Hang up
immediately or delete the message. Do not
click on links in emails. Do not provide ANY
information. It’s best just to ignore the call or
message and then report it.
• If a caller already has some bit of your
personal information, don’t assume the call is
well-intentioned. Sometimes thieves will already
have your credit card account number and are
asking for your PIN or security code or other
piece of crucial information to complete what
they have.
• Look for misspellings, typos and bad
grammar in the printed message.
• Be skeptical…especially of automated calls.
• Caller ID does not make the number a
legitimate one.
• When in doubt, hang up the phone and
contact the company or bank yourself. It’s
always better to be safe than sorry.
• Whenever calling your financial institution
or credit card company, always use the
phone number found on a previous account
statement, in the phone book or through another
trustworthy source. Do not call numbers found
in unsolicited emails or on web sites that were
sent as a link in an unsolicited email. When
accessing a website, type the address in directly
rather than clicking on a link. While the linked
websites may look perfectly legitimate, they
are not always the “real thing” and you may be
putting your identity at risk.

Similar documents

Red Team Assessment Services by Snowfensive.com

Red Team Assessment Services by Snowfensive.com At Snowfensive.com, we provide highly adaptive & constantly evolving red team assessment services. Our main goal is to focus on social engineering threats, after assessment completes we analyze the collected data & provide the suggestions. Call today for security! Visit Us: http://www.snowfensive.com/

More information

Pfhishing 2008 07 21

Pfhishing 2008 07 21 COTE D'IVOIRE west Africa. I crave your indulgence as i contact you in such a surprising manner. But I respectfully insist you read this letter carefully as I am optimistic it will open doors for u...

More information