301-571-5040    Get SUPPORT

Washington Works Blog

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

Washington Works’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at 301-571-5040.

During the Holidays, Cybersecurity Matters at Work...
Obtaining the Right Tools Is Extremely Important f...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Productivity Malware Hackers Business Email Network Security Software Tech Term Hosted Solutions Internet Data Data Backup Computer Mobile Devices IT Support Data Recovery IT Services Ransomware Google Managed IT Services Innovation Efficiency User Tips Backup Microsoft Cloud Computing Business Management Hardware Small Business Outsourced IT Productivity Workplace Tips Android Paperless Office Managed Service Provider Encryption Smartphone Business Continuity Social Media Collaboration Remote Monitoring Office 365 Windows 10 Smartphones Windows 10 Phishing Communication Managed IT Services Data Management Browser Save Money Server Upgrade Holiday VoIP Government Employer-Employee Relationship Communications Cybersecurity Disaster Recovery Bandwidth Infrastructure Tip of the week Antivirus Wi-Fi Scam Unified Threat Management Passwords Vulnerability Document Management IT Management BYOD Apps Quick Tips Managed Service Work/Life Balance Information Windows Business Technology Facebook BDR Internet of Things Healthcare Automation Artificial Intelligence App Risk Management Saving Money Compliance Blockchain SaaS Politics Vendor Management Two-factor Authentication Hosted Solution File Sharing Office Password VPN Maintenance Money Microsoft Office Applications Network Word Chromebook Customer Relationship Management Virtual Reality Mobile Device Big Data Chrome How To Management G Suite Health Wireless Gmail Private Cloud Computer Care Mobile Device Management Firewall Samsung Regulations Electronic Medical Records IoT Downtime Patch Management Physical Security Twitter Storage Taxes Computing Training Bring Your Own Device Remote Monitoring and Management Data loss Robot Websites Access Control HIPAA Employees Tech Support Remote Workers Recovery Meetings How To Social Hacker Mobile Security Company Culture Remote Computing Botnet Data Security Automobile Server Management Analytics Smart Technology Virtual Private Network Tablet Machine Learning Identity Theft Website Router Professional Services Point of Sale Telephone Systems Alert Connectivity Supercomputer WannaCry Shortcut Cyberattacks Cortana Black Market Printing Multi-Factor Security Mirgation VoIP MSP Techology Human Error Managed IT Service Modem GPS Hard Disk Drive USB Bluetooth Consulting Emoji User Error Firefox Development Superfish Authentication Crowdsourcing Spam Windows 7 OneNote Theft Computing Infrastructure Value Motion Sickness Spyware Unified Communications Address Favorites Software as a Service Specifications Permission Permissions IT Budget Monitors Enterprise Resource Planning Files Remote Worker Google Calendar Avoiding Downtime Proactive Break Fix Cookies Office Tips Tracking Dongle Managed Services Provider Printer Wearable Technology Web Server Cables Authorization Personal Information Error Disaster Heating/Cooling Employee-Employer Relationship Update Alerts Project Management Wasting Time Black Friday Social Networking Test Legal Fraud Star Wars Digital Payment Mobile Read Only ROI Augmented Reality Legislation Chatbots IT Consultant Time Management Dark Web Nanotechnology Service Level Agreement E-Commerce Financial Cameras Wires Networking Staffing Uninterrupted Power Supply Servers Licensing Vulnerabilities Conferencing Notifications IBM Database Cyber Monday Motherboard Network Management WPA3 RMM Sports Cost Management Cybercrime YouTube IT Solutions The Internet of Things Notes Mouse Identity Microsoft Excel Screen Reader Administrator Utility Computing Managed IT Features Virtualization Procurement SharePoint Law Enforcement CCTV Zero-Day Threat Computer Repair Gadgets Budget Cooperation Webcam Geography Instant Messaging Voice over Internet Protocol IT Support Touchscreen Fleet Tracking Search Operating System Hotspot Assessment Settings Managing Stress Help Desk Upgrades Processors PowerPoint Education Smart Tech Corporate Profile Outlook Electronic Health Records Security Cameras Downloads IT Technicians Gadget Google Drive Backup and Disaster Recovery Users Distributed Denial of Service WiFi Solid State Drive Statistics Monitoring Unified Threat Management Staff High-Speed Internet Lenovo Finance Customer Service Net Neutrality Cabling Asset Tracking Tech Terms Language Internet Exlporer Travel Digital Enterprise Content Management Mail Merge Bookmarks Virtual Assistant Comparison Relocation Cleaning Domains Public Speaking Hiring/Firing Presentation Lithium-ion battery CrashOverride Fun Wireless Technology 5G Safety Emergency Marketing Printers Hard Drives Competition IP Address Regulation Miscellaneous Mobile Office