Skip to main content

6 Ways Fraudsters Can Access and Hack Your Bank Account

With current attempts by fraudsters to access people's bank accounts through text messages,emails,phone calls etc.it is important we are armed with the knowledge of the different ways our bank accounts can be hacked by these fraudsters. This will help us better discern their gimmicks, avoid their traps and keep our money safe.
Below are 6 ways your bank account can be hacked,as revealed by jumia travel

1.TRUSTING SUSPICIOUS EMAILS

In 2015,Babatunde Fatai,a young man arrested by the Oyo State Police command for various internet crimes including hacking into bank accounts of people in and outside Nigeria, revealed that to hack into bank accounts he would either go to dating sites to woo men and women into trusting him with their account details,or he would send fake emails to bank customers asking them to change their accounts and bank security details.Fatai will then use their old security details to access their accounts and transfer their money to his online lovers,for these lovers to transfer back to him through another means.

You should be alert to suspicious emails, especially those that come with promotions from banks giving links you should click. Most importantly, always call your bank to confirm any suspicious email before you reply or click any link in the email.

2.TRUSTING SUSPICIOUS TEXT MESSAGES AND PHONE CALLS

 As you should be careful with emails,so should you also be careful with text messages and phone calls.Text messages about your account being blocked because of your BVN and instructing you to call another number to activate; phone calls from strange numbers (numbers different from your bank's customer care numbers) asking you to disclose your bank's details especially when you did not previously log a complaint with your bank about any issue related to what is being asked of you,amongst many others, should all be confirmed before responding to them.Used your bank's helpline and if you can,go to a nearest bank branch to confirm.The cost of not confirming is most times far more than the cost of confirming.Don't be quick to share sensitive bank details through any means,no matter how genuine it seems.

3.EXPOSING PERSONAL DETAILS ON SOCIAL MEDIA

Some hackers get personal information such as your name,date of birth,email and phone number off your social media accounts.a sophisticated hackers can get past other options to change your pin and access your bank account.If you use Internet Banking,it is advisable you edit your social media profiles,especially Facebook profiles.If you must leave your day and month of birth, delete your birth year, delete phone numbers you put there that are connected to your bank account and use ones that are not linked to your bank account.It's safer if the email address connected to your bank accounts is not the same as the email address you use everywhere on social media.

4.SHOPPING OR BANKING ON UNENCRYPTED WEBSITE

According to the Telegraph,you should never shop or log in to online banking when the web address does not begin with 'http' or without a lock sign display on the address bar.For an added layer of  security, check the online banking security options your bank provides such as free antivirus and browser security software.Ensure that your computer is protected by 'firewall' software.Also,browsers (especially Google Chrome and Mozilla Firefox) often come with built-in security features.Make sure they are activated.

5.USING WEAK PASSWORDS AND TRANSACTION PINS

Especially for those who use Internet Banking,weak passwords and transaction pins make it easy for hackers to crack your passcode and access your account.Strong and unique passwords that are long,random and made up of different cases, numbers,letters and symbols are the best.Don't use your date of birth as your transaction pin.

6.BEEN CARELESS WITH CHEQUE BOOKS E.T.C

Afam Nriezedi,along with his syndicate members, was arrested in 2015 by detectives attached to the Special Anti-Robbery squad of the Lagos State Police Command for hacking into Nigeria banks with the assistance of bankers and domestic servants.

To hack bank accounts,someone (a domestic servant or relative from the house of the victim) will bring a leaf from the cheque book of the victim to them.The leaf most times isn't signed but contains the victim's account number.With the account number,details of the victim's name, phone number,email,house and work address including the victim's account balance can be gotten,once they contact an insider in the bank they need the information from.Getting the insider usually isn't easy but because it's all about the effort and teamwork.Their next step is to get a copy of the signature of the victim provided most times by the insider in the victim's home.The cheque is taken to Mushin where the signature is forged and the amount they intend to steal is written.Most times,they don't use e-banking to transfer the money but withdraw it upfront (usually using an amount that is possible to withdraw upfront).They never go to the branch of their insider to do this.It is important to be careful and restrict access to your cheque book.Also,don't be careless with your account numbers and emails,phone numbers and addresses linked to your account number.From time to time,check your cheque book to confirm there is no missing page.Also monitor text messages and emails sent to you by your bank to be sure transactions you did not authorize have not occurred.


Related


HEED:How Do Hackers Hack Bank Accounts To Transfer Money ?



Comments

Popular posts from this blog

HOW TO IDENTIFY AND AVOID BITCOIN SCAMS

Bitcoin is attractive to scammers for the same reason it's appealing to you; it's fast,it's international and it's irreversible. So as Bitcoin usage has grown, we have seen more and more scams. The following are some of the most persistent Bitcoin scams. Bitcoin Ponzi, HYIP or MLM schemes These schemes promise sky-high returns and low fees. They often rely on existing investors signing up new ones, which is the only source of revenue or growth. As with all ponzi schemes, early investors get paid with the money from later investors. Inevitably when new investors stop signing up and depositing, the scheme collapses, since no more funds can be paid out. What to look out for These are some of the warning signs that you might be dealing with  an illegal scheme: * Promises of very high returns/interest * Guarantees that you can't lose money * Little verifiable information on company and owners * Difficulties in withdrawing  your funds * ...

DO NOT MISS THIS AUDCOINS FREE MONEY

If you never make free money, please read and get some here, BECAUSE THIS MIGHT BE YOUR OPPORTUNITY TO CHANGE YOUR STORY. Do not joke with this  free earning opportunity because you might wake up one day to see it becomes the big thing and you won't forget missing this. I am happy to announce that Aussie Digital airdrop has finally launched. The Aussie Digital project has been designed to help, not hinder the growth of small to medium business online. The trading exchange (TRADEDO TRADING EXCHANGE) itself looks very professional and smooth. Nothing less than you would expect from a professional company like Aussie Digital. You can create your own online store with Tradezy a cryptocurrency supported e-commerce platform that enables the small scale business owners to hopen their online store at affordable price. The Aussie Digital will launch its ICO on 27th may 2019. It means, before the arrival of ICO date you have great opportunity to earn free AUDcoins without ...

NCC Warns Nigerians On Two New Ways Hackers Steal Information Through Phone Charging And Facebook

  The Nigerian Communications Commission’s Cyber Security Incident Response Team (NCC-CSIRT) has independently identified two cyber vulnerabilities and advised Nigerian telecom consumers on the measures to be taken to get protected from the cyber-attacks. The CSIRT, in its first-ever security advisories less than three months after its creation, has solely identified the two cyber-attacks targeting the consumers and proffer solutions that can help telecom consumers from falling victims to the two cyber vulnerabilities. The first is described as Juice Jacking, which can gain access into consumers’ devices when charging mobile phones at public charging stations and it applies to all mobile phones. The other is a Facebook for Android Friend Acceptance Vulnerability, which targets only Android Operating System. According to CSIRT security Advisory 0001 released on January 26, 2022, with Juice Jacking, attackers have found a new way to gain unauthorized entry into unsuspecting mobile ph...