(281) 816-6430    Get SUPPORT

SouthBridge Consulting Blog

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

Protection
There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

SouthBridge Consulting’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at (281) 816-6430.

During the Holidays, Cybersecurity Matters at Work...
Tech Term: Mobile Device Management
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Tech Term Privacy Email Data Business Internet Hosted Solutions Business Computing IT Support Data Backup Malware Business Management Cloud Cloud Computing Hackers IT Services Mobile Devices Encryption Computer Small Business Software Network Security Efficiency Windows 10 Workplace Tips Google Hardware Android Server Outsourced IT Paperless Office Managed Service Innovation Government Artificial Intelligence Managed IT Services Upgrade VoIP Holiday Passwords Data Recovery Browser Employer-Employee Relationship Website Office 365 Scam User Tips Saving Money Quick Tips Smartphones BYOD Healthcare Infrastructure Two-factor Authentication Document Management Wi-Fi Vulnerability Applications Communication Blockchain Information Collaboration Ransomware Bandwidth Tablet Gmail Storage Backup Remote Monitoring Smartphone HIPAA Social Media VPN Chrome Automation Antivirus Mobile Security Bring Your Own Device Phishing Communications Microsoft Compliance Management Access Control Network Machine Learning Business Technology Business Continuity Managed IT services IT Management Cybersecurity Managed Service Provider Internet of Things Maintenance Router Microsoft Office Data Management Identity Theft Recycling Save Money Social Wearable Technology Screen Reader Authentication Operating System Users Managed IT Service Modem Vulnerabilities Politics Database Customer Service Staff Disaster Recovery Enterprise Content Management Professional Services Multi-Factor Security IT Technicians How To Permission Computing Computing Infrastructure Identity eWaste Features Security Cameras Printer Money Smart Tech Authorization Hard Drive Consulting Downtime Break Fix Virtual Reality Cookies Development Mobile Device Voice over Internet Protocol Legislation Fraud Spam Smart Technology Social Networking Unified Communications Help Desk Vendor Management Wireless Server Management Assessment Employee-Employer Relationship Test Comparison Alerts Patch Management Private Cloud Mobile Device Management Microsoft Excel Connectivity Employees Remote Computing Cache Managed Services Provider Tech Terms Nanotechnology Cables Instant Messaging Net Neutrality Firewall Motherboard Office Risk Management Mirgation Internet Exlporer Remote Workers Specifications Electronic Health Records ROI IoT Remote Monitoring and Management Hotspot Point of Sale Theft Wires Finance Windows 7 Augmented Reality Tech Support BDR G Suite Bookmarks Wasting Time RMM Black Friday Licensing Regulations Company Culture Files Notes Apps SharePoint Data Security Star Wars Zero-Day Threat Mouse Language Chatbots Network Management E-Commerce Financial Dark Web App Facebook The Internet of Things Distributed Denial of Service Chromebook Favorites Windows Google Calendar Permissions Monitoring Electronic Medical Records Customer Relationship Management Cyber Monday Cooperation Data loss Managing Stress Read Only PowerPoint Downloads Cost Management OneNote Human Error Big Data Fun IP Address Twitter Printers Miscellaneous Mobile Office Virtualization Domains Hard Drives Windows 10 Search Regulation Public Speaking Presentation Lithium-ion battery Cortana Wireless Technology 5G IBM Safety Productivity Marketing Hacker Criminal Justice Gadgets Budget Hiring/Firing Alert Competition