Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

Protection
There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

Central Technology Solutions’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at 1-844-237-4300.

During the Holidays, Cybersecurity Matters at Work...
Obtaining the Right Tools Is Extremely Important f...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Email Hosted Solutions Hackers IT Services Internet Network Security Productivity Outsourced IT Managed IT Services Software Data Data Backup IT Support Business Productivity Mobile Devices Ransomware Innovation Tech Term Computer Hardware Microsoft Data Recovery Backup Small Business Google Internet of Things Cloud Computing Smartphone Managed Service Provider Business Continuity Data Management Remote Monitoring Smartphones Android Efficiency Disaster Recovery Social Media Windows 10 VoIP Browser Encryption Paperless Office Managed IT Artificial Intelligence User Tips Communication Windows Facebook IT Support Upgrade Business Management Save Money BYOD Phishing App Cybersecurity Workplace Tips Windows 10 Mobile Device Management Holiday Risk Management Collaboration Mobile Device Passwords Gmail Robot Applications Bring Your Own Device Server BDR communications Network Saving Money Recovery Managed IT Services Bandwidth Firewall Government Unified Threat Management Employer-Employee Relationship Wi-Fi Content Filtering Money Infrastructure Data storage Compliance Vulnerability Going Green Telephone Systems SaaS Vendor Management Big Data Wireless Password Chrome Office 365 IT Management Virtualization Tip of the week Hosted Solution Healthcare Website Scam Document Management Project Management Antivirus Apps Customer Relationship Management Virtual Reality Managed Service Computing Data loss Miscellaneous Data Security Information Training Regulations Two-factor Authentication Printing Office IT Service Router Microsoft Office File Sharing Computers Unified Communications Storage Analytics Remote Computing Automation Files Blockchain Quick Tips Apple Social Help Desk Politics Customer Service Work/Life Balance Upgrades Websites Identity Theft Virtual Private Network Licensing Twitter Network Management Sports IoT Assessment Business Technology Budget The Internet of Things How To End of Support Health Information Technology Server Management Operating System Employees Maintenance Company Culture Outlook Machine Learning Mobility Monitors Smart Technology Mouse Uninterrupted Power Supply Alert Users Electronic Medical Records Google Drive Tablet Spam Word YouTube WiFi Settings How To Samsung Internet Exlporer Redundancy Business Growth Downtime HIPAA Flexibility Access Control Mobile Computing Private Cloud Administration Chromebook Mobile Security Tech Support Education Avoiding Downtime Remote Monitoring and Management Hacker LiFi VPN Patch Management Digital Payment IT solutions Remote Workers Wireless Technology Legal Unified Threat Management Hotspot Enterprise Resource Planning Bookmarks Network Congestion Black Friday Roanoke — Central Technology Solutions WPA3 Financial Alt Codes Hacking Screen Reader ROI Hard Drive Features Cryptocurrency Telephony Computer Repair Mirgation Permission Sync Servers Data Breach Fraud Law Enforcement Physical Security Downloads Augmented Reality Geography Authorization Public Cloud Retail Cortana Dark Web Motherboard 3D Printing User Error Language Mobile Favorites Hacks Botnet Marketing Display Cyber Monday technology services provider Fleet Tracking Procurement Typing Disaster Travel Trending Smart Tech Cache Electronic Health Records Bitcoin Mail Merge Gadgets Software as a Service Migration Test Best Practice Mobile Device Managment Software Tips Technology Laws Buisness Processors Gadget VoIP Sponsor Office Tips Operations High-Speed Internet Automobile Touchscreen Computer Care Techology Data Warehousing Star Wars Monitoring Unsupported Software Virus Computing Infrastructure Conferencing Consultation Lenovo Update Technology Assurance Group ’s 18 Asset Tracking Net Neutrality Recycling Cyberattacks Windows 8 Save Time GPS Address Technology Tips Chatbots MSP RMM Statistics Identities Digital Obstacle Multi-Factor Security Wearable Technology Development Zero-Day Threat Disaster Resistance Social Engineering USB Microsoft Excel Modem Utility Computing Consulting Crowdsourcing Meetings Search Mobile Data Printer Alerts Managing Stress Instant Messaging Supercomputer Superfish Distributed Denial of Service Annual Convention OneNote eWaste Read Only Tracking Comparison Identity Proactive Tech Terms Google Wallet G Suite Bluetooth History Hard Drives Google Docs Spyware Taxes Course Dark Data Personal Information Google Calendar Cables Backup and Disaster Recovery Google Maps Proactive IT Safety Cookies Security Cameras Managed Services Provider Shortcut Cooperation Enterprise Content Management Finance Humor IT Budget Managed IT Service San Diego Employee-Employer Relationship Notifications Management Backups Firefox Specifications Theft Drones Cabling E-Commerce Solid State Drive Virtual Desktop Legislation IT Technicians Wires Human Error Deep Learning Heating/Cooling IT Consulting Black Market Permissions Nanotechnology Remote Worker Cost Management WannaCry Point of Sale SharePoint Staff Vulnerabilities Authentication Current Events Time Management Networking Writing Emoji Break Fix Social Networking Connectivity Emergency Cybercrime CrashOverride Web Server Notes Regulation Cameras Motion Sickness CCTV Administrator Relocation Hard Disk Drive Webcam Printers IT Consultant Error