Lakhs of rupees in your bank account could turn to zero in seconds if you are not aware of the many new online tricks used by fraudsters. According to the RBI, fraudsters are getting on new ways to defraud the gullible public via various ingenious methods.
RBI says that sharing of confidential information by the customers, knowingly or unknowingly, is one of the main causes which leads to the financial frauds. Therefore, you should be alert while doing online transactions.
Recently, the RBI released a booklet on the common methods used by fraudsters.
Here’s a list of some lesser known but hi-fi methods used by fraudsters according to RBI:
1. Frauds using online sales platforms: Fraudsters pretend to be buyers on online shopping platforms and show interest in seller’s products. To gain confidence, many fraudsters pretend to be defence personnel posted in remote locations . Instead of paying money to the seller, they use the “request money” option through the UPI app and insist that the seller approve the request by entering UPI PIN. Once the PIN is entered by the seller, money is transferred to the fraudster’s account.
2. Fraudsters using screen sharing app/Remote access:
Fraudsters trick the customer into download a screen sharing app, through which the fraudsters can watch / control the customer’s mobile / laptop and gain access to the financial credentials of the customer. This information is used by fraudsters to carry out unauthorised transfer of funds or make payments using the customer’s Internet banking / payment apps.
3. Frauds by compromising credentials on results through search engines: Customers use search engines to obtain contact details / customer care numbers of their bank, insurance company, Aadhaar updation centre, etc. These contact details on search engines many times do not belong to the respective entity but are made to appear as such by fraudsters. Customers may end up contacting unknown / unverified contact numbers of the fraudsters displayed as bank / company’s contact numbers on search engine. Once the customers call on these contact numbers, the fraudsters ask the customers to share their card credentials/details for verification. Assuming the fraudster to be a genuine representative of the RE, customers share their secure details and ultimately fall prey to frauds.
4. Scam through QR code scan: Fraudsters contact customers under various pretexts and trick them into scanning Quick Response codes using the apps on the customers’ phone. By scanning such QR codes, customers may unknowingly authorise the fraudsters to withdraw money from their account.
5. Juice jacking: The charging port of a mobile, can also be used to transfer files or data. Fraudsters use public charging ports to transfer malware to customer phones connected there and take control / access / steal data sensitive data like emails, SMS, saved passwords, etc. from the customers’ mobile phones.