Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

Protection
There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

Central Technology Solutions’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at 1-844-237-4300.

During the Holidays, Cybersecurity Matters at Work...
Obtaining the Right Tools Is Extremely Important f...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Productivity Hosted Solutions Malware IT Services Privacy Hackers Network Security Internet Data Software Productivity Data Backup Outsourced IT Managed IT Services Business IT Support Innovation Microsoft Mobile Devices Ransomware Data Recovery Hardware Tech Term Computer Google Cloud Computing Small Business IT Support Efficiency Backup Managed Service Provider Business Continuity User Tips Internet of Things Collaboration Smartphone Android Upgrade Communication Business Management Remote Monitoring Smartphones Paperless Office Disaster Recovery Data Management Windows 10 Phishing Windows 10 Encryption Social Media VoIP Server Workplace Tips Windows Managed IT Browser Managed IT Services Artificial Intelligence Cybersecurity communications Facebook Save Money Mobile Device BYOD Risk Management Passwords App Office 365 Mobile Device Management Holiday Saving Money Bring Your Own Device Apps Managed Service BDR Gmail Business Technology Vendor Management Password Automation Recovery Analytics Virtualization Network Applications Chrome Government Firewall Wi-Fi Document Management Quick Tips Unified Threat Management Bandwidth Employer-Employee Relationship Robot Compliance Infrastructure Money Telephone Systems SaaS Data storage Going Green Vulnerability Content Filtering Information Blockchain Wireless Microsoft Office File Sharing Big Data IT Management Help Desk Tip of the week Healthcare Scam Antivirus Project Management Hosted Solution Website Miscellaneous Customer Relationship Management Computing Data loss Data Security Regulations Training Office IT Service Printing Computers Storage Tablet Remote Computing Files Settings Users Unified Communications Customer Service Apple Two-factor Authentication Politics Router Social Downtime Work/Life Balance VPN Virtual Reality Remote Workers Education Licensing LiFi Virtual Private Network End of Support Health IT solutions Network Management Internet Exlporer IoT HIPAA Budget Assessment Access Control Cooperation Information Technology How To Monitors Server Management Mobile Security Electronic Medical Records Machine Learning Mobility Sports Operating System Alert Outlook Uninterrupted Power Supply Mouse Employees Consultation Gadgets Company Culture Google Drive RMM How To Samsung Word Flexibility Business Growth Redundancy Chromebook Avoiding Downtime Private Cloud Spam Proactive Mobile Computing YouTube Software as a Service Tech Support WiFi The Internet of Things Hacker Maintenance Management Smart Technology Digital Payment Remote Monitoring and Management Upgrades Patch Management Websites Identity Theft Wireless Technology Legal Administration Networking Twitter Net Neutrality Connectivity Hacking Physical Security Database Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Retail Cortana Database Management Microsoft Excel Modem Sync 3D Printing Notes Printer Alerts Law Enforcement Virtual Desktop Enterprise Resource Planning Bookmarks Display Options Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach Travel Hard Drive Features Shared resources Comparison Identity Botnet Permission Processors Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Authorization Cookies Mobile Device Managment Software Tips Hacks Unsupported Software Virus PowerPoint Gadget Best Practice Mobile Favorites Mail Merge Update 5G Managed IT Service San Diego Automobile Computer Care Bitcoin Fleet Tracking Procurement Technology Laws Cache Electronic Health Records VoIP Sponsor OneDrive Specifications Test Touchscreen Techology Star Wars Monitoring Windows 7 Legislation IT Technicians GPS Marketing High-Speed Internet Lenovo Social Engineering USB Permissions Nanotechnology Mobile Data Professional Services SharePoint Staff Conferencing Address Wireless Internet Break Fix Social Networking Windows 8 Buisness Save Time Asset Tracking Statistics Unified Threat Management Hotspot Crowdsourcing Meetings Recycling Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras Utility Computing Consulting Search Dark Data Personal Information Transportation Mirgation Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Bluetooth Virtual Assistant Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging Employer/Employee Relationships Dark Web Motherboard Google Maps OneNote Remote Worker User Error Language eWaste Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Cabling Humor Managed Services Provider Shortcut Migration Cables Backup and Disaster Recovery Black Market Smart Tech Wasting Time Operations Drones Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Data Warehousing Backups Employee-Employer Relationship ROI Computing Infrastructure Point of Sale Deep Learning Network Congestion Solid State Drives Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting Cybercrime Current Events Cost Management E-Commerce WannaCry Computer Repair Teamwork Technology Tips Chatbots Wires Human Error Time Management Emergency Web Server CrashOverride GDPR Cameras Motion Sickness Regulation CCTV Administrator Relocation Webcam Hard Disk Drive Students IT Consultant Printers Error