Christian Computers Blog

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

Christian Computers’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at (252) 321-6216.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Security Technology Tip of the Week Best Practices Privacy Business Management Cloud Business Computing Managed Service Provider Internet Microsoft Software Saving Money Workplace Tips Malware Hosted Solutions Hackers Backup IT Services Productivity Data Email Mobile Devices IT Support Small Business Hardware Business Business Continuity Computer Network Innovation Network Security Google Outsourced IT Smartphones Managed IT Services Server VoIP Productivity Efficiency Upgrade Ransomware Data Backup Communication Social Media User Tips Disaster Recovery Windows Vendor Management Tech Term Remote Monitoring Gadgets Microsoft Office Mobile Office Smartphone Virtualization Cloud Computing Mobile Device Management Quick Tips Data Recovery Android Windows 10 Save Money Internet of Things Passwords Miscellaneous Unified Threat Management BYOD Holiday Alert Paperless Office Artificial Intelligence Collaboration Bring Your Own Device Users Encryption Best Practice Data Management Trending IT Support Going Green Apps Apple Phishing Firewall Browser Facebook Current Events Mobile Computing Office 365 Managed IT Maintenance Antivirus App Wireless Technology Mobile Device Remote Computing Document Management The Internet of Things IT Solutions Customer Relationship Management Windows 10 Health Managed IT Services Operating System Cybersecurity IT Consultant History Router Wi-Fi Recovery Printer Vulnerability Excel Automation Password Gmail BDR Information Technology Content Filtering Hosted Solution Risk Management Office Robot Digital Payment communications WiFi Money Windows 8 Tablet Employer-Employee Relationship Spam Big Data Scam Tech Support Analytics Applications Training VPN Hard Drives File Sharing Compliance Hacker Infrastructure Bandwidth Help Desk Telephone Systems Social Proactive IT Point of Sale Computer Repair How To Humor IT Management Government Wireless Fax Server SaaS Information Work/Life Balance Data storage Downtime Budget Healthcare Data Security Website Chrome Administration Net Neutrality Storage PowerPoint Mouse Private Cloud Printing Lithium-ion Battery Outlook Marketing Saving Time Regulations Touchscreen Computing Samsung Politics Blockchain Twitter Avoiding Downtime IT Service Statistics Virtual Reality Customer Service Education Virus Social Networking Managed Service Word Inbound Marketing Two-factor Authentication Unified Communications Licensing Machine Learning Computers Project Management Company Culture Save Time Taxes Phone System Search Internet Exlporer Business Growth Software as a Service Alerts Botnet Legal Chromebook Virtual Private Network Wearable Technology Electronic Medical Records Smart Technology Assessment Monitors Bluetooth Business Technology Mobile Security Cost Management Conferencing Meetings Hiring/Firing Identity Theft Display IoT Webcam Office Tips Sports Application Flexibility User Error Heating/Cooling Remote Monitoring and Management Google Drive HIPAA Uninterrupted Power Supply Video Surveillance Computer Care Physical Security IBM Remote Workers End of Support Management Mobility Server Management Upgrades G Suite Files Recycling Automobile Piracy Patch Management Employees How To iPhone USB Co-Managed IT Solid State Drive Travel Data loss Network Management Websites Settings Augmented Reality Access Control LiFi High-Speed Internet Zero-Day Threat Cooperation Relocation Cabling Hacks Personal Information ebay LinkedIn Monitoring Cyber Monday Connectivity Firefox Network Congestion Law Enforcement Mobile Instant Messaging Emergency IT Budget Shortcut Unsupported Software Refrigeration Value Java Asset Tracking Remote Worker Modem Motion Sickness VoIP Notifications Data Warehousing Tracking Cybercrime Online Currency MSP Tech Terms SharePoint Migration Sync Deep Learning Memory Hard Drive Cyberattacks Development Backup and Disaster Recovery Disaster Resistance Staff Best Available Consulting Gadget Debate Managing Stress Finance Google Maps Alt Codes Mobile Data CIO OneNote ROI Technology Tips Cookies Digital Dark Data PC Care Remote Support Cache Read Only Mail Merge Microsoft Excel Tip of the week Virtual Desktop Proactive Theft Downloads Chatbots Mobile Device Managment Emoji IP Address People Webinar Macro Cables Human Error Data Breach Operations Error Disaster 3D Text Messaging Managed Services Provider Distributed Denial of Service Cleaning Consultation Writing Programming Enterprise Content Management Authentication lenevo Hotspot Typing Streaming Media Employee-Employer Relationship Notes Comparison Nanotechnology Web Server Spyware Leadership Crowdsourcing Work Station eWaste Address Servers Financial Two-factorAuthentication Identity Corporate Profile Safety Identities Telephony Wires Permission Data Loss Public Cloud Google Wallet Star Wars E-Commerce Managed IT Service Avoiding Downtown Retail Vulnerabilities Authorization Superfish Language Software Tips Cryptocurrency Business Intelligence Professional Services Specifications Screen Reader Cameras Bookmarks Redundancy Permissions WPA3 Procurement Multi-Factor Security WannaCry Google Docs Black Market Phone Systems Print Server Time Management Social Engineering User Intranet Test Technology Laws IT Technicians Virtual Assistant Drones Crowdfunding Utility Computing Features Break Fix Staffing Geography Networking Computing Infrastructure Bitcoin Gaming Console YouTube Skype Black Friday Smart Tech CCTV Cortana Enterprise Resource Planning Favorites Fraud Supercomputer 3D Printing Hacking Trojan Scheduling Fleet Tracking Security Cameras Motherboard Processors Law Firm IT GPS Windows 8.1 Update RMM Mirgation Administrator Hard Disk Drive Backups Update Computer Accessories Running Cable Electronic Health Records Dark Web Knowledge Buisness 5G Domains Experience Laptop Public Speaking Undo Fun Printers Halloween Competition CrashOverride Scary Stories Presentation Regulation Wasting Time