USA   |   UK   |   Australia   |   Canada
ADVERTISEMENT

Mobile technology means new fraud techniques

Scammers scour for ways to rip you off with the latest gadgetry

By

What evolves almost faster than technology? Nefarious ways to steal money from people using that technology.

The hot new tactics among cyberthieves: QR code fraud, mobile-technology malware and email scams powered by gift cards, not credit cards. That is, for now. Cyber criminals are like sports dopers; it's their business to stay a step ahead of the game. "We beat them, they have a new variant within 48 hours," says Nick Nascimento, owner of  aGeek2Go, a San Diego-based information technology support and service company.

"These aren't kids in a garage. They are people in high-rises driving nicer cars than we do," Nascimento says. "The sophistication, the sheer masses of bandwidth -- this is big-time business."

New mobile technology leads to new fraud techniques

Nascimento and others explain three hot cybercrime strategies, and how to avoid them.

1. QR Code Fraud: QR codes are those black-and-white squares that look like modern art; in reality they are condensed URLs. When scanned, they lead users to a Web page. Marketers love them because they're instant and accurate, says Tony Anscombe, senior security analyst in the San Francisco office of AVG, an Amsterdam-based security software firm. "It's not relying on me remembering anything or typing anything," Anscombe says.

QR codes become fraudulent two ways. The first is when they're designed to contain malware. When the user scans the code, the malware loads -- in the background, invisibly -- onto the user's mobile phone. When users open a mobile wallet, or access their bank information with the phone, the malware captures that information and relays it to the creator of the nasty QR code, who then uses it to steal from bank accounts and make fraudulent credit card charges.

Fraudulent QR codes can also lead users to a legitimate-looking URL that asks for permission to send texts (SMS messages). Users who consent begin getting premium texts, which show up as 50-cent, $1 or other small charges on a cellphone bill, a charge most users wouldn't notice, Anscombe says. Those small charges, spread over hundreds or thousands of cellphone bills, add up to big money for the criminals.

How to avoid it: First, download a QR code security app; makers include AVG Mobilation, Norton Mobile Security and Lookout Mobile Security. The apps will let the user know if the QR code will lead to a malicious site. Second, resist the urge to scan any random QR code you come across, particularly if the code is on a poster or looks pasted-on. Thieves circulate these codes by developing them, printing them and sticking them in easy-to-see places, Anscombe says. If you absolutely must play with QR codes, do so at places of commerce you trust.

2. The FBI scam. This scam, for desktop computers, arrives via an email that looks like it's from the FBI. The scam is new because it relies on gift cards, not credit cards, to make a profit. This is how it works: The email -- which looks startlingly real, Nascimento says -- tells the recipient that they've been the victim of malware, then asks for payment to erase the malware from their computer. The page helpfully suggests buying a gift card at CVS or another chain store as payment. Users then enter the gift-card number into an email; the thieves at the other end take the amount and supposedly free the user from the malware.

The trick? The transaction with the gift card actually places malware on your desktop, and usually, professional help is needed to wipe it clean, Nascimento says.

How to avoid it: "Ignore it," says Nascimento, adding that the scam first came to attention about four months ago, and has since morphed four times. "It's very hard to get out of machines," he says.

These aren't kids in a garage. They are people in high-rises driving nicer cars than we do. The sophistication, the sheer masses of bandwidth -- this is big-time business.

-- Nick Nascimento
Owner, aGeek2Go

3. Mobile malware. Fake apps that download viruses and malware onto smartphones -- Android models are particularly susceptible -- via text messages and emails. When users open the email, it begins sending texts in the background that ring up charges on the user's cellphone bill. Others send email messages; when the user clicks on the link in the email, malware downloads and begins downloading personal information -- including anything stored in a virtual wallet -- from the user. Some ask for permission to access a contact list and then send the malware to the user's friends and family as well. 

Worse, the malware will leap to a personal computer or tablet when the host -- the mobile phone -- is attached to that device to charge or port information. "Plug it  into a corporate network, and you've just put the entire corporation at risk," says Stan Stahl, founder at Citadel Information Group Inc., a Los Angeles firm online security consultancy.

How to avoid it: Treat your cellphone like the personal computer it is, Stahl advises. First, download apps only from trusted sources -- the Apple site for iPhones, the Google site for Androids. (In late October, T-mobile announced it would offer Android users free security apps and load 2013 models of phones with security devices).

Second, pay attention when installing an app. "It should tell you exactly what it's going to do," Stahl says. Keep an eye out for unusual requests; for instance, if a map app asks to access a contact list. If it does, "say no and think about whether you want to download it," Stahl says.

Third, think twice about "jailbreaking" an iPhone, that is, altering it to free it from the iOS operating system and thus open it to apps from other sources. Jailbroken iPhones are as susceptible to viruses as a newborn infant: "All bets are off," Stahl says.

Overall, "users are the last line of defense," Stahl says, noting that the mobile security applications don't work 100 percent of the time. "Exercise some common sense about what you're doing."

See related: 8 tips to stop banking app fraud, Cellphones become fraud-fighting tools, Get out of debt smartphone apps

Published: October 30, 2012



Join the discussion

We encourage an active and insightful conversation among our users. Please help us keep our community civil and respectful. For your safety, do not disclose confidential or personal information such as bank account numbers or social security numbers. Anything you post may be disclosed, published, transmitted or reused.

If you are commenting using a Facebook account, your profile information may be displayed with your comment depending on your privacy settings. By leaving the 'Post to Facebook' box selected, your comment will be published to your Facebook profile in addition to the space below.

The editorial content on CreditCards.com is not sponsored by any bank or credit card issuer. The journalists in the editorial department are separate from the company's business operations. The comments posted below are not provided, reviewed or approved by any company mentioned in our editorial content. Additionally, any companies mentioned in the content do not assume responsibility to ensure that all posts and/or questions are answered.

Three most recent Legal, regulatory, privacy issues stories:

Share This Story




Follow Us!


Credit Card Rate Report

Updated: 10-25-2014

National Average 15.07%
Low Interest 10.37%
Business 12.80%
Balance Transfer 12.82%
Student 13.14%
Cash Back 14.98%
Reward 15.05%
Airline 15.46%
Bad Credit 22.73%
Instant Approval 28.00%

ADVERTISEMENT
ADVERTISEMENT