Lakhs of rupees in your bank account can turn into zero in seconds if you are not aware of the many new online tricks used by fraudsters. According to RBI, fraudsters are finding new ways to dupe the gullible public using various ingenious methods.
RBI says that sharing confidential information by customers, knowingly or unknowingly, is one of the main causes leading to financial fraud. Therefore, you should be careful while doing online transactions.
While you may already be familiar with some of these tricks, here’s a look at some lesser-known but hi-fi methods used by fraudsters, according to the RBI:
1. Scams using online sales platforms: Fraudsters pretend to be buyers on online sales platforms and show interest in the seller’s products. Many fraudsters pretend to be defense personnel posted to remote locations to gain trust. Instead of paying money, sellers use the ‘request money’ option through the UPI app and insist that the seller approves the request by entering the UPI PIN. Once the seller enters the PIN, the money is transferred to the fraudster’s account.
2. Screen Sharing/Remote Access Scams: Fraudsters trick the customer into downloading a screen sharing application. Using such an application, fraudsters can track / control the customer’s mobile / laptop and gain access to the customer’s financial data. Fraudsters use this information to make unauthorized fund transfers or make payments using the customer’s online banking / payment applications.
3. Search engine result credential compromise scams: Customers use search engines to get contact details / customer care numbers of their bank, insurance company, Aadhaar update center etc. These search engine contact details often do not belong to the relevant entity but are induced by fraudsters, to make them look like that. Customers may end up contacting unknown/unverified contact numbers of fraudsters displayed as bank/company contact numbers in the search engine. Once customers call these contact numbers, fraudsters ask customers to share their login / card details for verification. Assuming the fraudster is a genuine RE representative, customers share their secure data and thus become victims of fraud.
4. QR Code Scanning Fraud: Fraudsters often contact customers under various pretexts and trick them into scanning Quick Response (QR) codes using apps on customers’ phones. By scanning such QR codes, customers may unwittingly authorize fraudsters to withdraw money from their account.
5. Juice jacking: The charging port of the mobile phone can also be used to transfer files / data. Fraudsters use public charging ports to transfer malware to customer phones connected there and take control / access / steal sensitive data such as emails, SMS, saved passwords, etc. from customer mobile phones (Juice Jacking).