Bank account scams have been a cybercrime issue that is troubling the world community, including Indonesia. It is because all financial transactions have taken root in a bank a long time ago, and nowadays in the internet banking system.
This is a dangerous factor because a fraud that leads to bank account break-ins does not require software or other sophisticated tools. In the average case, the beginning of the chronology of bank hacking is usually through phishing.
What do Phishing scams look like?
Phishing is a method of cybercrime by stealing personal data or financial data from victims via email. The scammers use a false identity and claim to be an official agency or institution. The way scammers take the action is by luring the victim with some interesting offers (for example getting a prize draw) or threats (for example automatic blocking if the data is not updated immediately) from a company/bank accompanied by a link that takes the victim to a fake site. On the site, the scammers will make the victim give their privacy data such as credit card number or bank account information, unconsciously. Therefore, the name of the phishing method is taken from the word 'fishing'.
Not only fake links, but phishing messages can also contain commands to download fake applications or software, which contain viruses or malware that can absorb sensitive data from your gadget.
If you are negligent, scammers can easily hack your bank accounts or personal accounts through phishing in a very short time.
The following are steps taken by the scammers of bank accounts through phishing:
1. Looking for Victims
In general, the easy targets for hackers are consumers from online payment platforms or bank customers.
Not only that, the hacker usually targets users of cyber platforms with large security holes. For example, social media or virtual face-to-face communication platforms.
2. Setting Goals
As known, the goal of the phishing method is to breach privacy data. After the hacker has a target, they will determine what data to steal from the victims. The targeted data are passwords, PIN codes, OTP, Key BCA responses or other financial data such as information from credit cards and debit cards.
3. Creating Fake Sites
To trick you as a victim, the hacker will create fake websites or apps that usually use a company or official agency, such as Bank BCA.
It should be noted that these fake sites will have a very similar appearance to the original site. Therefore, it is suggested to always pay attention to the listed domains and the interface of the site.
4. Instructions to Input Data
Usually, these fake sites and applications will have instructions for you to enter sensitive data. From full names, residence numbers, to banking privacy data such as passwords, PIN codes, OTP, APPLI 1 and 2 Key BCA, etc.
5. Data Misuse
The data that the fraudster has stolen from you will be misused in various ways and purposes. Such as selling personal data for marketing databases, hacking a customer's personal or financial account, or making transactions using the victim's bank account.
Well, if you already know about the characteristics of the phishing method, you can be more aware to avoid it.
Make sure to contact the Halo BCA Contact Center or official social media that can be used as a communication line to report the incident that you have experienced.
You can share these security tips with people around you so they can be more aware of the cybercrime case in banking. Always #CariTahuBiarAman about the latest banking fraud cases, so you can avoid any banking cybercrime.