Minimizing the risk of current threats is a cooperative effort of GKCU and our membership. Be aware of these current threats and scams issued by the NC Department of Justice Attorney General.
Below are types of risk that could put your account information at risk:
Malware, derived from the words “malicious” and “software”, is used by criminals to damage your computer system without your knowledge. Malware includes all types of unwanted software such as computer viruses, worms, trojan horses, spyware and adware. This software can create a pathway for criminals to gain personal information. If you are a victim of Malware, you will need to clean and secure all computers at your location.
If you are a victim of Malware, then you should follow the steps below:
Messaging fraud is the newest type of scam where members receive a fraudulent message on their phone. “Smishing” uses cell phone text messages to get you to divulge your personal information. The latest scam is to send a text that is titled ‘fraudulent activity on your debit card’. The message may include a website address, a number to text a response or a phone number to call. The scammer will then try to get you to provide information such as social security number, card number and CVV2 information. The message will give the appearance that immediate attention is needed.
If you are a victim of Text Messaging, then you should follow the steps below:
Email fraud, or “phishing”, involves emails that appear to be from a legitimate source, but are a criminal attempt at obtaining personal and/or account information. Phishing emails will often provide a website link that will direct you to a fake website. It will prompt you to enter your personal information. Don’t be fooled! The site will look almost identical to the legitimate one. It is important to remember that Greater Kinston Credit Union never requests personal information via email, as email is not a secure method of communication.
If you are a victim of Email Fraud, then you should follow the steps below:
“Vishing” is facilitated by Voice Over Internet Phone (VoIP) to gain access to your private personal and financial information. With this scam you receive an automated recorded message that gives you a phone number to call. The message will give the appearance that immediate attention is needed.
Often times, scammers will use phone numbers that spoof a local number or use your local area code to disguise themselves as a trustworthy company. This is achieved using VoIP and does not mean the call is coming in locally.
If you are a victim of Voice Messaging Fraud, then you should follow the steps below:
Fraud can also occur when selling items through an online auction service. The following is a common online auction scam:
You are selling merchandise through an auction site or buy from seller site. The buyer sends you a check that is more than the asking price. You contact the buyer to let him/her know of the error. The buyer apologizes for the mistake and states they sent you the wrong check. The buyer tells you to deposit the check anyway and wire the extra funds back to a specific account. This sounds legitimate but after the check is processed, the Credit Union discovers the check is fraudulent. Since the member who deposits the check bears the responsibility of the check, you are notified that your account needs to be debited to cover the returned check.
If you are a victim of Online Fraud, then you should follow the steps below:
Common search engines, such as Google, Bing and Yahoo, are used to find information on the World Wide Web without knowing a specific web address. The idea of the search engine is to locate prominent web pages based on your search criteria and display a listing of these web pages for you to select. The search engine, however, does not know if the web pages listed in your results are legitimate or if these web pages contain suspicious activity. Though these links may not appear suspicious, you must be cautious when selecting unknown websites and videos. Cybercriminals keep track of popular searches at any given time and create phony web pages and malicious videos based on the most searched keywords, people and/or events. These web pages and video links, created by cybercriminals, can be one or more of the many results displayed to the user. If you visit a fraudulent webpage or video, you may unknowingly download malware to your computer and/or the page will request personal or financial information.
A Ponzi Scheme is a fraudulent investment plan where a person or entity takes people’s money as an ‘investment’ and pays out returns from new ‘investors’. Once the new money coming in fails to pay the prior investors the scheme collapses and most ‘investors’ lose their money (since it was paid out to other ‘investors’ as a return).