301-571-5040    Get SUPPORT

Washington Works Blog

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

Washington Works’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at 301-571-5040.

During the Holidays, Cybersecurity Matters at Work...
Obtaining the Right Tools Is Extremely Important f...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Hackers Productivity Network Security Business Email Software Tech Term Hosted Solutions Internet Computer Data Data Backup Mobile Devices Ransomware Backup Managed IT Services Microsoft IT Support Data Recovery User Tips Google Efficiency Productivity Innovation Outsourced IT Hardware Small Business Managed Service Provider IT Services Smartphone Cloud Computing Android Paperless Office Encryption Social Media Business Continuity Business Management Workplace Tips Communication Collaboration Managed IT Services Browser Office 365 Remote Monitoring Windows 10 Smartphones Data Management Windows 10 Save Money Disaster Recovery Bandwidth Holiday Government Server Scam App Antivirus Cybersecurity Passwords Vulnerability IT Management Unified Threat Management Phishing Artificial Intelligence BYOD BDR Healthcare Employer-Employee Relationship Communications Internet of Things Work/Life Balance Facebook Infrastructure Tip of the week VoIP Wi-Fi Risk Management How To Apps SaaS Politics Quick Tips Customer Relationship Management Managed Service Maintenance Big Data Hosted Solution Word Information Office Applications File Sharing Document Management Password Chrome Upgrade Saving Money Money Network Compliance Windows Chromebook Mobile Device Virtual Reality Blockchain Two-factor Authentication Vendor Management Regulations Point of Sale Alert Storage Telephone Systems IoT Tech Support Remote Monitoring and Management Health Data loss G Suite Employees Private Cloud Computer Care Samsung Hacker Firewall Remote Workers How To Company Culture Physical Security Twitter Access Control HIPAA Downtime Electronic Medical Records VPN Microsoft Office Taxes Data Security Computing Business Technology Training Server Management Mobile Security Robot Website Virtual Private Network Websites Smart Technology Social Meetings Recovery Remote Computing Botnet Router Wireless Automobile Mobile Device Management Machine Learning Gmail Identity Theft Patch Management Automation Computing Infrastructure Value WiFi Cables Authorization Remote Worker Specifications Dongle Managed Services Provider Relocation Cleaning Bring Your Own Device Project Management Google Calendar Disaster Heating/Cooling Travel Employee-Employer Relationship Permissions Augmented Reality Black Market Printer Wearable Technology Time Management Supercomputer Test Break Fix Cookies Mobile Cortana Read Only Alerts IBM Networking GPS Wires ROI Crowdsourcing Black Friday Social Networking Service Level Agreement E-Commerce Emoji Vulnerabilities Conferencing Financial Legislation Chatbots Uninterrupted Power Supply Servers Motion Sickness Fraud Star Wars The Internet of Things Gadgets Network Management Budget IT Budget WPA3 RMM Dark Web Nanotechnology YouTube Licensing Office Tips Tracking Personal Information Zero-Day Threat Cyber Monday Motherboard Managed IT Web Server Utility Computing Features Analytics Error Geography Instant Messaging Procurement Mouse Identity Update Cost Management Managing Stress Help Desk SharePoint IT Support Users Touchscreen Digital Payment Fleet Tracking Legal Operating System Microsoft Excel Screen Reader Settings IT Consultant Cooperation Google Drive Customer Service Backup and Disaster Recovery Corporate Profile Outlook Cameras Electronic Health Records Lenovo Staffing High-Speed Internet Finance Security Cameras Notifications Tablet Solid State Drive Statistics Professional Services Monitoring Hotspot Assessment Enterprise Content Management IT Solutions Bookmarks Downloads IT Technicians Cabling Cybercrime Asset Tracking Sports Tech Terms Smart Tech Digital Mail Merge Unified Threat Management Staff VoIP Spam Techology Administrator MSP Computer Repair Human Error Distributed Denial of Service WannaCry Shortcut Law Enforcement CCTV Management Virtualization Cyberattacks Internet Exlporer Firefox Superfish Development Authentication Printing Comparison Hard Disk Drive Bluetooth Webcam USB Consulting Language Education Unified Communications Upgrades Favorites Processors Multi-Factor Security Mirgation Search OneNote Theft Connectivity Spyware Address User Error Avoiding Downtime Proactive Permission Managed IT Service Modem Monitors Gadget Enterprise Resource Planning Files Lithium-ion battery CrashOverride Wireless Technology 5G Safety Emergency Marketing Printers Competition Hiring/Firing IP Address Fun Regulation Miscellaneous Mobile Office Domains Hard Drives Public Speaking Presentation