Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

Protection
There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

Central Technology Solutions’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at 1-844-237-4300.

During the Holidays, Cybersecurity Matters at Work...
Obtaining the Right Tools Is Extremely Important f...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 24 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Network Security Productivity Productivity Data Software Managed IT Services Outsourced IT Data Backup Business IT Support Innovation Mobile Devices Ransomware Computer Tech Term Data Recovery Hardware Microsoft Small Business Google Cloud Computing Backup Business Continuity Internet of Things Managed Service Provider Smartphone Efficiency Remote Monitoring Upgrade Android Business Management Data Management Social Media Windows 10 Paperless Office IT Support User Tips Smartphones Disaster Recovery VoIP Encryption Workplace Tips Phishing Windows Managed IT Communication Artificial Intelligence Browser Cybersecurity Risk Management Windows 10 Save Money Facebook Collaboration BYOD Saving Money Server Mobile Device Management App Holiday communications Mobile Device Bandwidth Bring Your Own Device BDR Vendor Management Apps Recovery Passwords Gmail Office 365 Automation Applications Managed IT Services Government Firewall Unified Threat Management Wi-Fi Network Document Management Employer-Employee Relationship Compliance Robot Infrastructure Money Data storage Telephone Systems SaaS Managed Service Going Green Vulnerability Hosted Solution Business Technology Website Information Wireless Microsoft Office Password Content Filtering Analytics Virtualization IT Management Tip of the week Quick Tips Scam Healthcare Big Data Project Management Antivirus Chrome Customer Relationship Management Miscellaneous Computing Data Security Regulations Data loss Office IT Service Blockchain Training Printing Computers Storage File Sharing Tablet Remote Computing Files Help Desk Apple Customer Service Router Social Two-factor Authentication Politics Work/Life Balance VPN Virtual Reality Unified Communications YouTube Licensing Remote Workers WiFi Virtual Private Network Downtime Network Management Internet Exlporer End of Support Health Assessment IoT Administration HIPAA Budget LiFi Server Management Education Access Control Information Technology How To Monitors Machine Learning Mobility Operating System Alert Mobile Security Electronic Medical Records Employees Outlook Uninterrupted Power Supply IT solutions Mouse Company Culture Google Drive How To Samsung Word Sports Settings Chromebook Flexibility Business Growth Redundancy Private Cloud Avoiding Downtime The Internet of Things Mobile Computing Software as a Service Tech Support Hacker Smart Technology Digital Payment Remote Monitoring and Management Upgrades Users Maintenance Management Wireless Technology Legal Twitter Net Neutrality Patch Management Spam Websites Identity Theft Retail Cortana Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Display Permission Processors Travel Hard Drive Features Comparison Identity Botnet Authorization Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Managed IT Service San Diego Automobile Computer Care Bitcoin Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Cooperation Gadget Best Practice Mobile Favorites Mail Merge Update Test Touchscreen Techology Virtual Desktop Cache Electronic Health Records VoIP Sponsor Specifications High-Speed Internet Consultation Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Monitoring Windows 7 Legislation IT Technicians GPS Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Professional Services SharePoint Staff Conferencing Address Roanoke — Central Technology Solutions Supercomputer Identities MSP RMM Disaster Resistance Security Cameras Unified Threat Management Hotspot Crowdsourcing Meetings Recycling Cyberattacks Digital Obstacle Black Friday Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Dark Data Personal Information Mirgation Tracking Dark Web Motherboard Google Maps OneNote Bluetooth Marketing Virtual Assistant Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging Cyber Monday technology services provider IT Budget Hard Drives Google Docs Proactive Tech Terms Proactive IT Gadgets Notifications Remote Worker User Error Language eWaste Read Only Spyware Course Buisness Cables Backup and Disaster Recovery Black Market Smart Tech Cabling Humor Managed Services Provider Shortcut Migration Writing Emoji Data Warehousing Backups Employee-Employer Relationship Wasting Time Operations Drones Enterprise Content Management Finance Firefox Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting ROI Computing Infrastructure Point of Sale Deep Learning Network Congestion Wires Human Error Time Management Networking Current Events Cost Management E-Commerce WannaCry Computer Repair Technology Tips Chatbots Emergency Web Server CrashOverride Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam Hard Disk Drive IT Consultant Error Printers Cybercrime