0% found this document useful (0 votes)
315 views20 pages

Reading 2 - Digital and Online Banking Frauds

Digital and online banking fraud in India is a significant concern due to increased mobile banking adoption. Common fraud tactics include identity theft by stealing personal documents or impersonating individuals, KYC fraud by tricking people into sharing details under the guise of updating KYC, phishing through fake emails/texts/calls, UPI/QR code scams involving fraudulent transactions, and installing malware via screen sharing apps or fake apps to access devices and financial credentials. People need to be aware of these risks and avoid interacting with unsolicited communications or downloading untrusted apps to protect their information and money.

Uploaded by

xayog34575
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
315 views20 pages

Reading 2 - Digital and Online Banking Frauds

Digital and online banking fraud in India is a significant concern due to increased mobile banking adoption. Common fraud tactics include identity theft by stealing personal documents or impersonating individuals, KYC fraud by tricking people into sharing details under the guise of updating KYC, phishing through fake emails/texts/calls, UPI/QR code scams involving fraudulent transactions, and installing malware via screen sharing apps or fake apps to access devices and financial credentials. People need to be aware of these risks and avoid interacting with unsolicited communications or downloading untrusted apps to protect their information and money.

Uploaded by

xayog34575
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Reading 2- Digital and Online Banking Frauds

Digital banking fraud in India refers to fraudulent


activities or scams that target mobile banking users,
leading to financial losses and potential compromise of
personal and financial information. Mobile banking frauds
are a significant concern due to the widespread adoption
of mobile banking services in India.
1 Identity theft

Identity theft involves stealing of personal information, such as Aadhar


card, PAN card, Voter card no. and/or bank account details, to commit
fraud or other crimes in the victim's name.
Identity theft can occur through-

Stolen personal documents like passports, Aadhar card, voter ID cards,


or PAN cards.

Impersonation: Perpetrators may pose as someone else, often using


forged documents, to gain access to services, benefits, or financial
accounts.

To understand how this works, it is important to understand about the


modus operandi of “KYC frauds”.

What is KYC?

Know Your Customer (KYC) is a process used by various businesses,


particularly financial institutions, to verify the identities of their customers.
KYC is important because it serves as a safeguard against identity theft,
terrorist financing, money laundering, and financial fraud. Reserve Bank of
India (RBI) has made KYC mandatory to ensure the integrity and security
of financial transactions. It helps businesses, especially financial institutions
like banks, to have a better understanding of their customers.
How is KYC done?

The following details of customers are collected to complete the KYC


process.
Legal name
Identity proof
Correct permanent address as per identity proof
The legal status of the entity or person.

How does KYC fraud happen (also linked to Identity theft)?

There are instances of fraud related to KYC where criminals exploit this
process. They use fake SMS messages or fraudulent calls to impersonate
bank representatives, with the aim of collecting personal information from
customers. The fraudsters may provide the customers with the phishing
link, or 10-digit mobile number or convince them to give access to them
digital device, through which they intend to get hold of customer’s
personal details to get unauthorized access to their banking accounts to
steal money. Many innocent people have lost their hard-earned money to
this fraud in recent times and still continuing.

What is KYC?

Know Your Customer (KYC) is a process used by various businesses,


particularly financial institutions, to verify the identities of their customers.
KYC is important because it serves as a safeguard against identity theft,
terrorist financing, money laundering, and financial fraud. Reserve Bank of
India (RBI) has made KYC mandatory to ensure the integrity and security
of financial transactions. It helps businesses, especially financial institutions
like banks, to have a better understanding of their customers.
Modus Operandi - In case of fake calls

Here's how the fraud takes place in a series of steps:

Source Credit- AmBank Group

Fraudsters impersonate bank or e-wallet representatives and call the


victim, urging them to update their KYC immediately to prevent
account blockage.

They claim that the KYC process can be completed online to


maintain an active account and request the victim to download a
specific mobile app onto their device.

Once the app is installed, the fraudsters ask the victim to share a
code and grant certain permissions, granting them access to the
victim's digital device.
The caller then instructs the victim to transfer a small sum of money
from their bank account, enabling them to access the One-Time
Password (OTP) sent to the victim's digital device.

Sometimes, callers ask the victim to share their CVV (at the back of their
debit / credit card). This is the last security of our card. If you give away
this number publicly, you’ll lose all your money.

After the victim transfers the money, the caller gains access to their
password and other critical details. This information is exploited to
conduct fraudulent transactions and deplete the victim's bank account.

Source Credit- https://bit.ly/3FvMOgn


Modus Operandi - In case of fake Messages

Source Credit- SBI- https://bit.ly/3Q62M5U

Victims receive a message from a mobile number containing an


unknown link or a 10-digit mobile number, with the pretext of updating
their KYC.

If the victim clicks on the provided link in the message, they are
directed to a fake website that mimics a legitimate bank's site.

Here, they are prompted to enter their bank username, password, One-
Time Password (OTP), and other sensitive information.
Alternatively, if the victim calls the number provided in the message,
they are encouraged to share personal details such as their account
username, password, account number, and OTP.

The fraudster uses the acquired information to gain unauthorized


access to the victim's bank account and carries out fraudulent activities.

Source Credit- HDFC- https://bit.ly/3FDTXeB


Safety tips for safeguarding against such cyber frauds

Avoid clicking on links from unknown or unverified sources. It's safer not
to interact with such links.
Never share sensitive information like your mobile number, account
number, passwords, OTPs, CVV or ATM PIN with anyone.
Bank officials / financial institutions / any genuine entity never ask
customers to share confidential information such as username /
password / card details / CVV / OTP.
Genuine institutions do not conduct KYC updates via phone calls or by
sending links to customers.
Download only original apps from authorized app stores and websites.
Avoid downloading third-party apps.
If you encounter any such issues, report them immediately to the
specific bank authorities.
File an online complaint regarding any such fraud on the government
portal www.cybercrime.gov.in for further investigation and action.
2 Phishing / Smishing / Vishing

Source Credit- RBI- https://bit.ly/49b7V5c

Phishing is a type of hacking where attackers use fraudulent emails,


websites, or messages to deceive users into revealing sensitive
information like passwords or credit card details.

Phishing is mostly of the following types-

1. Email Phishing
2. Smishing
3. Vishing
Email Phishing: Attackers send deceptive emails that appear to be
from trusted sources, such as banks, government agencies, or popular
online services. These emails often contain links to fake websites that
request sensitive information.

Smishing: Phishing attacks conducted via text messages or SMS.


Scammers send text messages with links to malicious websites or
request sensitive information through SMS.

Vishing: This involves voice-based phishing, where scammers call


individuals and impersonate legitimate organizations to obtain personal
or financial information over the phone.

Modus Operandi- Phishing

Source Credit- Stay Safe Online- https://bit.ly/3S9zGVX


Source Credit- Stay Safe Online- https://bit.ly/3SfffHk

Source Credit- Stay Safe Online- https://bit.ly/3tNBKsu


3 Unified Payments Interface (UPI) / QR code scam

Scam Type 1

Many of us sell products on online platforms.

Fraudsters, pretending to be from the Army (so that you are


convinced that they are genuine) show interest in your product.

Instead of “sending money” to you, they use “request money” option


through UPI app.

Most of us fail to notice this and approve the request.

Immediately the fraudsters are able to pull money out of our bank
account.

Source Credit- Times Of India- https://bit.ly/46KNbjo


Scam Type 2

Fraudsters usually register themselves on online selling sites and


develop a nice rapport with other users on the platform.

Then they say they have a mobile phone to sell and post an image and
spell out a price.

The buyer falls for it and is willing to take the item.

The fraudster posing as an Army employee (they may even show you a
fake ID card) and will share a QR code to pay advance/token amount,
usually through GPay, PhonePe, PayTm or other online sources .

Source Credit- Quora- https://bit.ly/409UwpY


In return, you receive a courier receipt indicating that the mobile has
been couriered.

At this stage, the connection goes cold and when the phone does not
arrive, the buyer tries to call the seller, there is no response.

Source Credit- CyberForensics- https://bit.ly/3SeJgqn

Precautions

One should be careful while making financial transactions for online


products.
Always remember, to receive money there is no need to enter your
PIN / password anywhere.
If UPI or any other app asks you to enter your PIN to complete
transaction, it means you will end up sending money instead of
receiving it.
Be cautious while scanning any QR codes using payment apps.
Best option is to ask the buyer to meet you in person while picking up
the object and pay you then and there.
4 Fake Apps / Screen sharing app / Remote access

Fraudsters manage to access your mobile device, laptop, or desktop


when you download unfamiliar or unverified mobile applications.

Once this malicious application is downloaded, the fraudster can gain


full access to the device.

In some cases, fraudsters convince individuals to download screen-


sharing apps, allowing them to watch or control your mobile or laptop,
ultimately obtaining access to your financial credentials.

Subsequently, they use this access to make payments using your


internet banking or payment apps, exploiting your financial information
for fraudulent purposes.

Source Credit- Times Of India- https://bit.ly/3QwjpJf Source Credit- Times Of India- https://bit.ly/3s3ZgkB
5 ATM card skimming

Fraudsters install skimming devices within ATM machines to illicitly


capture data from your card as you use it.

To obtain your Personal Identification Number (PIN), they may-

Pre-install a dummy keypad or use small pinhole cameras that are


cleverly hidden from plain sight or

Pretend to be other customers standing nearby & gain access to your


PIN as you enter it.

The data collected, including your card information and PIN, is then
used to create a duplicate card, allowing the fraudsters to withdraw
funds from your account.

Source Credit- Northwest Community Credit Union- https://bit.ly/472ueIA


Precautions

Verify to ensure that there is no extra device attached near card


insertion slot or keypad of ATM machine while making transaction.

Cover the keypad with your hand while entering your PIN.

Do NOT enter the PIN in the presence of any other person standing
close to you or share the card with anyone.
6 SIM swap or SIM cloning

Since most of your account details and authentication are linked to your
registered mobile number, fraudsters target your SIM card. They aim to
either gain unauthorized access to your SIM card or obtain a duplicate SIM
card that allows them to conduct digital transactions using One-Time
Passwords (OTPs) received on the duplicate SIM.

Fraudsters often pose as telephone or mobile network staff,


contacting the customer under the disguise of offering a free upgrade
from 3G to 4G or providing additional benefits for the SIM card.

By doing so, they aim to extract personal information and details from the
customer, which they can then use to either compromise the original SIM
card or facilitate fraudulent activities using a duplicate one.

Precautions

Never share credentials pertaining to SIM card.

You should immediately get suspicious, if you don’t have mobile


network in your phone for considerable time in a regular environment

Contact Mobile operator to ensure that no duplicate SIM is being


issued for your SIM.
7 Juice Jacking

In this type of cyber theft, when you connect your mobile to an unknown or
unverified charging port, it opens the door for unknown apps or malware to
be installed on your device.

These malicious apps or malware can grant fraudsters control over your
mobile, providing them with access to and the ability to steal sensitive data,
including emails, SMS messages, and saved passwords.

This makes juice jacking a significant security risk when charging devices in
public places. Many times we connect to Airport or unknown WiFi to save
our mobile internet data pack and access the internet or download videos.
This is another way in which fraudsters may hack on to our smartphones
and steal private data

Precautions

Always avoid using public / unknown charging ports / cables.


Avoid using Airport WiFi- use your mobile internet instead

Source Credit- DMI Finance- https://bit.ly/475nslj


Importance of Being Vigilant during banking / digital transactions

Prevention: Being vigilant is the first line of defense against banking


frauds. Recognizing and avoiding potential threats can help prevent
financial losses.

Protection of Personal Information: Vigilance helps protect your


personal and financial information from falling into the wrong hands.

Early Detection: Vigilance allows for the early detection of fraudulent


activities. Prompt reporting of suspicious incidents can help authorities
take action.

Security Awareness: Staying vigilant enhances your awareness of


cybersecurity best practices. This knowledge can be applied to
protect your financial assets.

Reducing the Impact: Vigilance can reduce the impact of banking


frauds by preventing them or limiting their consequences.

In conclusion, the impacts of banking frauds in India are significant, and


being vigilant is of utmost importance to prevent, detect, and mitigate
these risks. It's essential for individuals and businesses to adopt strong
cybersecurity practices and promptly report any suspicious activities to
protect their financial well-being and maintain trust in the banking system.

You might also like