l-company.info Articles

Credit Card Fraud

Credit card fraud and more broadly identification card theft - or identity theft - is the acquisition of credit card and personal details relating to the use of credit cards and other payment cards as a fraudulent source of funds for the purchase of goods and services.

The essence of credit card fraud is taking the victim’s card details, using various techniques, in conjunction with having knowledge of other security checks such as birth dates, personal identification numbers (PIN), passwords, and card security code (CSC) numbers. The criminal requires at least two parcels of information before a successful fraudulent transaction can occur.

The information can be acquired directly through the theft of a credit card, which could allow the immediate use for in-store or online purchases. However, more commonly, the necessary information to carry out a fraudulent purchase is acquired remotely through online contact.

Credit card fraud methods

Some of the more frequently used methods for acquiring your credit card details for fraudulent purpose include:

  • Sophisticated devices called skimmers attached to automatic teller machines (ATMs), fuel bowsers or other card readers can read your full credit card number and your PIN. These skimmers are carefully designed to blend into the natural setting and will not raise suspicions unless you are on guard. Most of us use many different card readers during the course of a normal day. They come in a variety of styles and unless you are familiar with a particular type you may find it difficult to spot an anomaly. Skimmers can be purchased easily online and access to the technique is available to any fraudster. Take the time to look carefully at the card reader during ATM or other card reading transactions. This type of fraud is most likely to occur at venues where the card reader is unattended so that a skimmer can be attached when nobody is watching. Take more care in these situations.
  • Criminals have well and truly adapted to the internet environment. The internet provides a very attractive opportunity for criminals to steal details with only a small chance of being detected or apprehended. The use of malicious software - or malware - allows dishonest persons to steal credit card details, password and CSC numbers. Malware can be installed at several access points along the electronic purchase pathway.
  • Personal computers offer an opportunity for the installation of malware. Personal computers can be attractive targets because the users are frequently not computer experts and may not know of the hazards when operating online. Despite personal computers having security features in place, many malware attacks are successful because the user is not on guard. In most circumstances the malware can only function if the victim mistakenly provides access around their computer security systems. This can happen, for instance, when a user mistakenly responds to a nefarious email, which contains a hyperlink and enables the downloading and installation of malware onto the users computer. This can be achieved without the users knowledge. The malware can then acquire credit card details when an online purchase takes place. Being aware of these scams and having the latest security systems installed will minimise the risk of succumbing to malware attacks through your personal computer.
  • Malware can be installed in many other points in the e-purchase pathway including the vendors point of sale facility. A retailer’s system can be infiltrated, which can allow credit card purchases to be recorded and details sent to the fraudster. Counterfeit cards can quickly be produced based on the acquired information. These types of malware attacks can be a productive source of credit card information as multiple users will likely use the retailer’s system. Being aware of your charge records and investigating quickly any unaccounted spending will minimise the damage caused by credit card theft in these circumstances.
  • Your credit card details are stored with various legal entities for legitimate purposes. These databases have security systems in place but there have been numerous examples of the databases being breached and credit card details taken. This avenue for credit card theft is independent of the credit card owner and there are few preventative measures to be taken. Checking your charge records regularly will alert you to suspicious spending, which should be examined immediately.
  • Lost or stolen cards is becoming a less frequent avenue of credit card fraud. The online acquisition of credit card details offers the fraudster the possibility of obtaining hundreds if not thousands of credit card and personal details. The stealing of a single card has become the realm of the small-time amateur. Nevertheless some precautions will lessen the risk. Stolen credit cards will still require personal details to carry out a successful fraudulent purchase. Personal details are sometimes obtained through scam phone calls where the caller will pretend to be a bank official or possibly a merchant calling to verify personal details by asking you for those details over the phone.