(281) 816-6430    Get SUPPORT

SouthBridge Consulting Blog

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

Protection
There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

SouthBridge Consulting’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at (281) 816-6430.

During the Holidays, Cybersecurity Matters at Work...
Tech Term: Mobile Device Management
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Technology Tech Term Productivity Privacy Internet Email Data Business Business Computing Malware Data Backup Cloud Hosted Solutions Computer Software Network Security Hackers IT Support Mobile Devices Cloud Computing Small Business IT Services Business Management Hardware Outsourced IT Encryption Holiday Data Recovery Passwords Paperless Office Browser Efficiency Windows 10 Government Innovation Managed IT Services Artificial Intelligence Google Android Server Applications Vulnerability Communication Blockchain Information Collaboration Ransomware Bandwidth Managed Service Website Scam Workplace Tips Smartphones BYOD Healthcare Infrastructure VoIP Wi-Fi Two-factor Authentication Access Control Network Microsoft Business Continuity Managed IT services Machine Learning IT Management Internet of Things Managed Service Provider Maintenance Data Management Router Office 365 Storage Employer-Employee Relationship Gmail User Tips Smartphone Backup Remote Monitoring Saving Money HIPAA Quick Tips Upgrade Social Media Chrome Antivirus Mobile Security Document Management IoT Remote Monitoring and Management Specifications Compliance Management Electronic Health Records Business Technology Wires Finance Augmented Reality Hotspot Point of Sale Theft Cybersecurity RMM Tech Support BDR G Suite Bookmarks SharePoint Data Security Star Wars Zero-Day Threat Black Friday Licensing Regulations Company Culture Files Dark Web App Facebook The Internet of Things Mouse Language Chatbots Network Management E-Commerce Financial Favorites Microsoft Office Google Calendar Permissions Monitoring Electronic Medical Records Distributed Denial of Service Chromebook Downloads Cost Management OneNote Human Error Customer Relationship Management Cyber Monday Cooperation Data loss Managing Stress Read Only Wearable Technology Screen Reader Authentication Tablet Identity Theft Recycling Save Money Social Vulnerabilities Politics Operating System Users Managed IT Service Modem Multi-Factor Security IT Technicians How To Permission Customer Service Staff Disaster Recovery Enterprise Content Management Printer Money Smart Tech Authorization Computing Computing Infrastructure Identity eWaste Features Security Cameras Virtual Reality Cookies Development Mobile Device Legislation Fraud VPN Hard Drive Consulting Downtime Break Fix Wireless Automation Server Management Assessment Employee-Employer Relationship Test Spam Smart Technology Social Networking Unified Communications Help Desk Mobile Device Management Microsoft Excel Connectivity Employees Comparison Alerts Patch Management Private Cloud Nanotechnology Cables Instant Messaging Remote Computing Cache Managed Services Provider Tech Terms Risk Management Mirgation Internet Exlporer Remote Workers Communications Firewall Motherboard Bring Your Own Device Office Lithium-ion battery ROI Cortana Wireless Technology 5G Apps Safety IBM Marketing Hacker Criminal Justice Productivity Alert Gadgets Budget Hiring/Firing Competition IP Address Big Data Fun Twitter Miscellaneous Printers Mobile Office Domains Virtualization Hard Drives Regulation Windows 10 Search Public Speaking Presentation