{"id":612,"date":"2020-04-11T01:55:17","date_gmt":"2020-04-10T20:25:17","guid":{"rendered":"https:\/\/www.wikitechupdates.com\/?p=612"},"modified":"2020-04-23T22:58:04","modified_gmt":"2020-04-23T17:28:04","slug":"how-cyber-criminals-steal-money-from-bank-accounts-with-sms","status":"publish","type":"post","link":"https:\/\/www.wikitechupdates.com\/how-cyber-criminals-steal-money-from-bank-accounts-with-sms\/","title":{"rendered":"Alert, cyber criminals may use call and SMS tactics to steal money from your bank accounts"},"content":{"rendered":"<p>Cybersecurity company ESET alerts on the appearance of new campaigns in which cybercriminals impersonate Bankia, Bankinter and Banco Santander. The fact that cybercriminals are currently especially focused on taking advantage of the coronavirus does not mean that they forget their most classic scams. According to the cybersecurity company ESET, in recent weeks there has been an increase in cases of impersonation of banks by SMS messages. The objective of the individuals behind these attacks is to steal control of the victim&#8217;s account and, in this way, have full access to the money inside, or access credit card data.<\/p>\n<p>&#8220;In the last weekend, we have detected different cases of impersonation that affect three banking entities: Bankinter, Bankia and Banco Santander. In the first two, criminals sought access to credit card data. At Banco Santander, they were going to directly take control of the account. They even asked for the electronic signature and the code that the entity sends you by SMS to demonstrate that it is you who is trying to access it. This way they could enter the account and make the transfer of the money they wanted, &#8220;Josep Albors, head of awareness and research at ESET Spain, explains to media.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-614 size-full\" src=\"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/cyber-attack-with-sms-e1586550210922.jpg?resize=640%2C387&#038;ssl=1\" alt=\"cyber attack with sms\" width=\"640\" height=\"387\" srcset=\"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/cyber-attack-with-sms-e1586550210922.jpg?w=750&amp;ssl=1 750w, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/cyber-attack-with-sms-e1586550210922.jpg?resize=300%2C181&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/cyber-attack-with-sms-e1586550210922.jpg?resize=350%2C211&amp;ssl=1 350w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/p>\n<p style=\"text-align: center;\">credits: black tusk software<\/p>\n<p>The campaigns began last Thursday, April 2. The first supplanted bank was Bankinter. However, just a few days later, the attackers began impersonating others, such as Santander or Bankia, to increase their range of action. In the SMS, the victim is explained that her bank account has been blocked. If you want to fix the situation, you will have to &#8220;click&#8221; on a link that accompanies the text and redirects you to a malicious page that is controlled by attackers.<\/p>\n<p>Albors emphasizes that none of the domains created to supplant these banks are completely faithful to the authentic ones. However, they are quite successful, making it easy for someone to fall into the trap. In the event that attackers pose as Santander, and the user clicks on the link, they will be sent to a page where they will be asked for the necessary information to access their online banking account. After this, you will be redirected to another page to provide your electronic signature. Finally, cybercriminals will ask you for the phone number, which is necessary, and then provide the double verification code that the bank sends, via SMS, to its customers.<\/p>\n<p>In cases where criminals impersonate Bankinter and Bankia, what they are looking for is the credit card information. If the victim clicks on the hyperlink that accompanies the SMS stating that his account has been blocked, he will be redirected to malicious pages in which a card number, date of birth, security code, and pin are requested. \u201cThe reason for this change is difficult to explain. It is likely that these are different criminal groups or a change in strategy to see which one is more beneficial to them, \u201dsays the ESET head of awareness and investigation. Bankia, for its part, has already warned about the existence of this scam through social networks.<\/p>\n<h3>They also take advantage of the coronavirus<\/h3>\n<p>Despite the fact that these scams are not related to the coronavirus, which is the hook currently most used by cybercriminals, ESET has discovered that the attackers behind it have also participated in other malicious campaigns in which COVID 19 is used to trick users. Cyber-criminals seek to maximize their profit. From the same IP used for one of these cyber-frauds, they have used another domain that has been used to exploit the coronavirus on the network. They are trying to make the most of it. We have seen many cases where they use the COVID 19 to trick users. With maps that supposedly offer information about the pandemic to pages that apparently are intended to get donations.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity company ESET alerts on the appearance of new campaigns in which cybercriminals impersonate Bankia,<\/p>\n","protected":false},"author":1,"featured_media":613,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[29],"tags":[289,291,288,290],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/cyberthreat.jpg?fit=1200%2C800&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":3296,"url":"https:\/\/www.wikitechupdates.com\/company-data-leaks\/","url_meta":{"origin":612,"position":0},"title":"The Big Problem Of Company Data Leaks","author":"Admin","date":"31 October 2023","format":false,"excerpt":"Nowadays, data leaks \/ leakage poses huge problems for both companies and their respective customers. Personal and confidential data have become a currency in the market.\u00a0The increasing interconnection of devices and systems has given us convenience and efficiency, but it has also brought with it great conflicts in terms of\u2026","rel":"","context":"In &quot;Business&quot;","block_context":{"text":"Business","link":"https:\/\/www.wikitechupdates.com\/category\/business\/"},"img":{"alt_text":"Problem Of Company Data Leaks","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/10\/Problem-Of-Company-Data-Leaks.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/10\/Problem-Of-Company-Data-Leaks.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/10\/Problem-Of-Company-Data-Leaks.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/10\/Problem-Of-Company-Data-Leaks.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/10\/Problem-Of-Company-Data-Leaks.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2007,"url":"https:\/\/www.wikitechupdates.com\/practicing-good-cyber-hygiene\/","url_meta":{"origin":612,"position":1},"title":"Are You Practicing Good Cyber Hygiene?","author":"Admin","date":"24 February 2021","format":false,"excerpt":"Ever heard of the term cyber hygiene? Whilst we all have daily routines to maintain our personal hygiene, it is just as important to follow a set of strict rules to keep our devices squeaky clean \u2014 both inside and out. Practising good cyber hygiene will protect your digital footprint,\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.wikitechupdates.com\/category\/technology\/"},"img":{"alt_text":"Are You Practicing Good Cyber Hygiene","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Cyber-Hygiene.png?fit=800%2C450&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Cyber-Hygiene.png?fit=800%2C450&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Cyber-Hygiene.png?fit=800%2C450&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Cyber-Hygiene.png?fit=800%2C450&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1574,"url":"https:\/\/www.wikitechupdates.com\/what-is-cybersecurity\/","url_meta":{"origin":612,"position":2},"title":"What is Cybersecurity? Everything You Need to Know","author":"Admin","date":"26 June 2020","format":false,"excerpt":"The vulnerability that currently exists in our data and the information that we handle on different computers is one of the biggest concerns among users. To protect this, there are different techniques, to which cybersecurity is dedicated. This tool specializes in safeguarding the computer data we use. But to understand\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.wikitechupdates.com\/category\/technology\/"},"img":{"alt_text":"Cybersecurity","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Cybersecurity.jpeg?fit=1080%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Cybersecurity.jpeg?fit=1080%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Cybersecurity.jpeg?fit=1080%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Cybersecurity.jpeg?fit=1080%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Cybersecurity.jpeg?fit=1080%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2572,"url":"https:\/\/www.wikitechupdates.com\/common-ways-ransomware-spreads\/","url_meta":{"origin":612,"position":3},"title":"5 Common Ways Ransomware Spreads","author":"Admin","date":"14 May 2022","format":false,"excerpt":"Ransomware is becoming the most dangerous threat by cybercriminals trying their luck for easy money. Ransomware attacks directly target victims by encrypting their computer files and holding them for ransom.\u00a0 The idea is that you must pay, or else your network will forever be held hostage. Although you cannot protect\u2026","rel":"","context":"In &quot;Latest Updates&quot;","block_context":{"text":"Latest Updates","link":"https:\/\/www.wikitechupdates.com\/category\/latest-updates\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/05\/A957684E-BF42-4267-B4D1-9C03EA1CE79D.jpeg?fit=701%2C438&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/05\/A957684E-BF42-4267-B4D1-9C03EA1CE79D.jpeg?fit=701%2C438&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/05\/A957684E-BF42-4267-B4D1-9C03EA1CE79D.jpeg?fit=701%2C438&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/05\/A957684E-BF42-4267-B4D1-9C03EA1CE79D.jpeg?fit=701%2C438&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2514,"url":"https:\/\/www.wikitechupdates.com\/mistakes-your-business-should-avoid\/","url_meta":{"origin":612,"position":4},"title":"5 IT Mistakes Your Business Should Avoid","author":"Admin","date":"15 March 2022","format":false,"excerpt":"When it comes to successfully running a business, IT management is crucial. The technology that we use and how we organize data allows us to operate smoothly. That being said, it's certainly not an easy aspect to understand. There are a lot of different elements, and you may accidentally affect\u2026","rel":"","context":"In &quot;Business&quot;","block_context":{"text":"Business","link":"https:\/\/www.wikitechupdates.com\/category\/business\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/03\/A446A310-55B2-46CE-B332-596112B653F6.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/03\/A446A310-55B2-46CE-B332-596112B653F6.jpeg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/03\/A446A310-55B2-46CE-B332-596112B653F6.jpeg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/03\/A446A310-55B2-46CE-B332-596112B653F6.jpeg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/03\/A446A310-55B2-46CE-B332-596112B653F6.jpeg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2430,"url":"https:\/\/www.wikitechupdates.com\/protect-your-information-online\/","url_meta":{"origin":612,"position":5},"title":"How to protect your information online","author":"Admin","date":"6 February 2022","format":false,"excerpt":"As technology advances, more of our personal information is being stored online. This can include everything from our addresses and phone numbers to our bank account details. While this makes life easier in some ways, it also leaves us open to attack if our information falls into the wrong hands.\u2026","rel":"","context":"In &quot;Latest Updates&quot;","block_context":{"text":"Latest Updates","link":"https:\/\/www.wikitechupdates.com\/category\/latest-updates\/"},"img":{"alt_text":"How to protect your information online","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/612"}],"collection":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/comments?post=612"}],"version-history":[{"count":2,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/612\/revisions"}],"predecessor-version":[{"id":811,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/612\/revisions\/811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/media\/613"}],"wp:attachment":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/media?parent=612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/categories?post=612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/tags?post=612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}