Credit card fraud is a serious issue in South Africa. Many have fallen victim to scammers who target unsuspecting individuals to access their credit card information.
The card fraud scammers are swindling South Africans over R800 million every year. Credit card fraud increased by 18.4% in 2019 with a 1.1 point increase from the previous year.
The numbers are very high and scammers are always trying to find new ways to get money from your credit card.
Some syndicates even invest thousands to buy equipment and software to steal money from credit cards.
Also, criminals are always improving skills to operate current technology and finding innovative ideas.
You need to know how credit card fraud works, as it may affect you at any time.
Criminals target mostly gullible individuals and trick them to release their credit card details.
Whether in South Africa or abroad perpetrators use similar methods.
You need to protect yourself from these scammers and know what type of methods they use and the safeguards you can use to protect yourself.
Many methods are used and improved in time to keep up with the current technology used by banks and card issuers.
Perpetrators make sure that they are always on top of the game as they invest so much in skills, technology and equipment.
Most commonly used card fraud types in South Africa at present include Counterfeit Card Fraud, Lost and Stolen Card Fraud, False Application Fraud and Card Not Present Fraud.
We will address each and give precautions that you can use to avoid any problems.
This involves a credit card that perpetrators manufacture illegally, that uses personal information stolen from a magnetic strip from a genuine card issuer.
Cards used can be from Standard Bank, Absa, FNBetc. Some people call this card cloning and it is one of the most common credit card fraud methods.
This method requires certain technology that uses skimming devices.
When it comes to counterfeit card fraud, technology plays a vital role in getting things done.
There is much technological equipment that perpetrators use to get your card information.
These technological equipment are discussed below so that you can familiarise yourself with them.
This is used for card skimming. Data on a credit or debit card’s magnetic strip is illegally copied by a device attached to the slot and the PIN number is recorded by a false keyboard or via a pinhole camera.
This is a plastic device with a barb in the reader which catches the card in the machine and makes you believe it has been swallowed.
These machines are hard to identify from the actual ATM machine. This is a clown ATM cover that allows fraudsters to access your card information, pin and money.
They install the cover on top of the actual ATM machine and it uses card reading technology.
Pinhole cameras are spy cameras that criminals strategically place on ATM machines to capture pin numbers.
These are very small in size and can be as the size of a cellphone camera lense so they are not easily visible.
They usually place them on top of an ATM screen for a clear view of an ATM keyboard.
This is a small device that perpetrators insert on a card slot at ATMs to read card information.
They use the method for card cloning, therefore, there will be now two cards with the same information.
These can be spotted by checking the card slot and see if it is not bulky or misaligned. The ATM card reading machine causes the misalignment.
This refers to fraudulent transactions made from authentically issued credit/debit card which was lost or stolen.
Stolen or lost card fraud is done through online purchases, in-store purchases, cashback at tills and ATM withdrawals.
This involves creating fraudulent accounts using someone else’s personal information without their knowledge.
A person may assume someone else’s identity and apply for a credit card as if they were that person.
With the right information in hand, perpetrators can execute this easily. They carryout applications of credit cards online and sometimes at banks.
This refers to fraudulent transactions whereby a card or a cardholder is not present at a transaction point.
CNP fraud is done when payment of goods is done telephonically, by fax, email or through the internet.
What is needed to execute such transactions are the cardholder’s name, card number, sometimes CVV plus one-time pin may be required.
Though having a credit card makes life so much simple you have to be careful with it.
With these crooks in full operation out there, only vigilance can help you stay safe from falling victim.
Be very attentive and alert when using your credit cards and always be sure to block it if you ever lose it.