Sunday, December 22, 2024

5 common gift card scams and how to spot them

5 common gift card scams and how to spot them

It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season
It’s that time of the year again, when we’re all online looking for presents to give and receive. Gift cards are an increasingly popular choice, which means you might well be buying or receiving them during the festive period. In fact, they’ve become a huge global market projected to grow at a rapid clip over the coming years to reach a staggering US$2 trillion by 2027. Needless to say, the popularity of gift cards hasn’t escaped the notice of cybercriminals and online fraudsters, who’ve developed a whole underground industry focused around gift cards.
Some scams will use the cards themselves as a lure to trick you into handing over sensitive personal and financial information. In other cases, the fraudsters will impersonate officials, demanding payment via gift cards. Whatever the scam, get familiar with these tactics to stay safe online this holiday season.


As mentioned, cyberscammers have a range of tactics at their disposal. Here are five of the most common threats to look out for:
Here, the scammers masquerade as a legitimate official from the government, a utility provider, or another organization. They’ll typically threaten their victims, perhaps by claiming they’re owed unpaid taxes or outstanding bill payment and stress the urgency of payment. This is classic social engineering designed to force the victims into hurrying their decision making.
The scam could arrive in the form of a phishing email, or text, or even a phone call (known as “vishing”). Payment is required by gift card, with the scammers usually specifying the type of card they want to be used for the payment. All of these should be red flags. As the FTC says, no real business or government will require payment via gift card.
Sometimes the bad guys go straight to source, and hunt digitally for a record of your gift card with the issuer. How do they do this? By using automated bots to probe bank-end IT systems at retailers and other organizations for details on card balances and card numbers. With this information, they can use the card as if they were the official cardholder. This is an area ripe for exploitation, as research shows that Americans alone are sitting on as much as $15 billion in unused gift cards and credits.
Scammers don’t just work online. Another popular ploy is to visit stores where gift cards are or sale and steal the numbers/secret PINs. Sometimes they’ll go to extreme lengths to disguise their actions, such as recovering PINs with a sticker. Depending on the card, they may wait until the victim goes online to register and load funds onto the card before using it online or making a duplicate to use in-store.
Another category of scams uses the lure of a promised prize to trick the user into paying a fee via gift card. Unsolicited contact from the fraudster will inform the victim that they’ve won big, but need to pay a small sum to claim their prize. It could be anything from a car to a holiday – it goes without saying that there is no prize.
Gift cards themselves can be used to trick users into handing over their personal details. This is akin to a classic phishing attack, where the recipient is approached via email, text or social media with the offer of a large gift card balance. To claim it they need to fill in some personal and possibly financial details, which the scammer will then sell on the dark web or use themselves for identity fraud.
Raising and maintaining user awareness is a large part of the battle against gift card scams. The following tips will go a long way towards helping you stay safe online:
Remember, the bad guys are constantly thinking of new ways to monetize stolen data. The above is, therefore, by no means an exhaustive list. But it should be a good place to start.

Recommended:  Microsoft discovers Windows/Linux botnet used in DDoS attacks

Bookmark
Please login to bookmarkClose
Share the word, let's increase Cybersecurity Awareness as we know it
- Sponsored -

Sponsored Offer

Unleash the Power of the Cloud: Grab $200 Credit for 60 Days on DigitalOcean!

Digital ocean free 200

Discover more infosec

Steven Black (n0tst3)
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK. I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated... I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK. I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!

more infosec reads

Subscribe for weekly updates

explore

more

security