Attention Shoppers! Top tips for defending your accounts against card fraud

Have you used a credit or debit card in a store in the last three months? If you’re like me, you have, possibly numerous times. If so, you should check all of your credit and debit card accounts today to make sure there have been no fraudulent charges.

Why? Because we are now hearing that Target is not the only retail chain to become a victim of cyber criminals stealing credit/debit card data and other personal info besides. Several more retailers are likely to be named in the near future.

So, as the Big Retail Rip-off continues to unfold, and we learn that the address information for some shoppers has also been stolen, we are beefing up our top tips on how to defend your accounts and your identity. Please share these with friends and family. (If you are wondering how this data was stolen, including the role of Point of Sale malware, check the notes at the end of the article.)

Check your account for suspicious activity

If you used your credit or debit card at any retailer in November and December of last year you need to check your accounts right away.check your statements for fraudulent transactions. Criminals are likely to hang on to data and use it after attention has died off, so this is something you should continue to do for the foreseeable future.

Ask for a replacement debit/credit card

If you would rather not take the time to continually monitor your card, you may wish to ask for a replacement card instead. Remember, if you have any auto-pay accounts that reference this account number, you will need to update that information when the replacement card is activated. The Federal Trade Commission offers a lot of advice on dealing with lost or stolen cards.

Change your debit PIN

If the card that was used was a debit card, you should change your PIN. Criminals are actively working to crack the encryption used to protect this information, and many people use weak PINs that are easy to guess. You might want to listen to what my colleague Aryeh Goretsky has to say about choosing a good PIN: Listen to PIN podcast now.

Check your credit report

It is now clear that the thieves have enough information on some shoppers to carry out identity theft, which can be much worse than dealing with fraudulent charges on a card. You should regularly monitor your credit report so that you can spot and then report any fraudulent account activity, like new accounts in your name that you did not authorize. Target has provided detailed contact information for the three credit-reporting agencies, and provided a year of free credit reporting for those that have been affected. You may also want to look into setting up a fraud alert or a credit freeze if you want additional protection against fraudsters trying to get credit in your name. Be aware that these steps will also mean you have to go through additional verification if you wish get credit, for the duration of the alert or freeze.

Change your online shopping passwords

There is no indication yet that online stores were impacted by this latest round of cyber crimes, but the forensic investigation of these incidents is not complete. As a precaution, it is a good idea to change your passwords, making sure they are hard-to-guess and unique to each account.

For more on the Target breach there are two short podcasts you might want to hear. Click these links to listen to the MP3 audio: Security Actions to Take Now and Target Breach Explored.

Beware of scams

Criminals may now have access to more information about customers than just card data. So they are now more likely to use this data to send scam or phishing emails. Be sure not to click on links in emails purporting to come from businesses using this angle, especially if they appear suspicious in any way. Instead, you should type the expected URLs into your browser directly to contact companies.

Tax Identity Theft Awareness Week

The data you need to steal to create fake credit and debit cards does not include Social Security or Tax ID numbers. But if those numbers are stolen, they can be used for tax identity theft, which is a huge problem in America right now. How big of a problem? The FTC has declared this week Tax Identity Theft Awareness Week and has put out a lot of information about preventing and correcting damage from this crime. Check out the informational events both online and in locations around the US.

How did encrypted card data get nicked?

We don’t know yet how the Target and Neiman Marcus breaches were committed, but a lot of people are asking, quite reasonably, how thieves could get at card data that is supposed to be encrypted. There are several possible answers, one of which is that the encryption may not have been implemented correctly. Another is that the data is not encrypted throughout the transaction process. It is temporarily decrypted in random access memory (RAM) by point-of-sale (POS) machines so that it can be read and processed. Thieves may have stolen the data from RAM, using a technique called RAM scraping, which has already been used in some malware.

The basic technique was demonstrated years ago by Mark Goudie, managing principal of Verizon Business Investigative Response. Concerns have been raised about RAM scraping in POS devices for several years. Malware using RAM scraping was the subject of a recent CERT advisory. ESET products block several strains of POS malware.

Author Lysa Myers, ESET

  • rush

    now that things are messed up- you give me a secure site to go to and the first thing they want to know is your ss. # and we have no idea who is on the other end. this is for target. as far as I am concerned it a bad idea to give your ss.# to any one you recommended.

  • Jo

    Help! I’m trying to renew my account but can’t get past * No spaces allowed in first or surnames
    What now? I did not use any spaces and repeater the operation several times with no success.

    • http://dharley.wordpress.com/ David Harley

      Jo, I’m afraid you really need to contact your account provider for help with that.

  • Lee Gull

    The problem is moral and legal with a tech twist. The financial beneficiaries of credit card use are the institutions that accept them, the companies that process them and the crooks who steal from them. Until the financial burdens resulting from such fraud are placed upon these “beneficiaries” instead of the hapless credit card holder, this system will not be resolved quickly.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.