How can I deal with scammers?

New approaches to old scam

Learn below about new scam approaches used by crooks based on old scams:

Fake Cop Scam

This is the motorcycle courier scam and begins when the customer receives a call from the scammer, who previously posed as a bank employee, saying that the card was frauded. Now the fraudsters also pretend to be fake police officers, claim that the victim's account was hacked and that his card needs to be checked and is under investigation.

The fraudster asks for the password and asks that the card be cut, but that the chip not be damaged. He then says that the card will be taken out at the customer's home. Another person shows up where the victim is and takes the card. Even with the card cut, the chip is intact and they use it to make transactions and steal the victim's money.

How to avoid it

Never give your card to any cardholder to take out at your home. If you receive this type of call or visit, do not hand anything to anyone and call your bank immediately, preferably from a different phone, to find out if there is a problem with your account.

PIX virus scam

This is nothing more than the remote access scam, which has become popularly known as the Phantom Hand scam. The fraudster contacts the victim posing as a fake bank employee or sends e-mails, links, and messages in applications. He uses several approaches to fool the customer: he informs that the account has been hacked, cloned, that there are suspicious movements, among other tricks. And it says that it will send a link to install an application that will solve the problem. If the client installs the application, the criminal will have access to all the data on the cell phone.

Febraban clarifies that the banks' applications rely on maximum security in all its stages, from its development to its use. There is no record of a security breach in these applications. In addition, in order for banking applications to be used, the client's personal password must be used.

In the case of the Remote Access Scam, criminals perform searches on the device looking for passwords eventually stored by the users themselves in applications and sites. Many users write down their passwords to access the bank in notepads, e-mails, WhatsApp messages or in other places on their cell phones.

How to avoid it

The bank never calls the customer asking him to install any type of application on his cell phone. They also never call asking for a password or card number, or for the customer to make a transfer or any kind of payment to supposedly fix an account problem. If you receive this kind of contact, be suspicious immediately. Hang up and contact the financial institution through official channels and another phone number to find out if something has really happened to your account.

Fake job scam

This is a simple social engineering technique and is very similar to the fake bank employee scam. This time, fraudsters seek information from users who are looking for job openings and pose as fake employment agencies. They offer jobs with excellent pay and appeal to the urgency of the person to accept the opportunity. And they ask the interested party to take a quick course in order to be suitable for the false vacancy and also ask for a transfer in Pix for false medical exams.

How to avoid

Be suspicious of contacts with this approach that come in messaging apps, e-mails or even in phone calls. Never pass on your personal data. When making a business transaction with Pix, always research the company on complaint sites and check their CNPJ. Never make transactions on sites that do not have the security lock on the browser or transfers to accounts of individuals. Always be suspicious when the seller appeals to the urgency of closing the deal, saying that you may lose discounts.

Scam of the fake gift/fake birthday present

This is a new variation of the delivery, damaged card machine, and card exchange scams. After finding out personal details and birthday dates, criminals contact the victim and say they have a free gift to deliver or a birthday present, and insist that the person receives the gift in person.

The criminals even give the victim something, usually flowers or cosmetics. They claim that they are service providers and that they don't know the information of the person who actually asked to make the delivery, and they ask for a fee.

The delivery person may deliver a machine with a damaged display or in a way that makes it impossible to see the price charged on the screen, being an amount above the real price charged. The scammer also uses some trickery and diverts the person's attention so that the victim enters the password in the field destined to the amount of the purchase. This allows the crook to discover the secret code. It is important to note that the password field should show only asterisks. In possession of the customer's password, the crook can later change the card.

How to avoid it

Never accept unexpected presents and gifts without knowing who really sent them. Do not provide personal data on links sent by the internet of supposed promotions and be very careful when filling out registrations on the internet.

When buying something anywhere, never give your card to someone else to insert in the machine and make the payment. Always do this process yourself. When entering your password, make sure it is not visible to anyone around you. Do not accept to make payments if the display of the machine is damaged, preventing you from seeing the real amount you are paying.

reload, if the code cannot be seen