Phishing is the malicious attempt of fraudsters to intercept personal data such as internet banking credentials, PIN numbers for credit/ debit cards, passport numbers, ID numbers, VAT numbers, etc
Phishers send massively e-mails to random e-mail accounts of unsuspected receivers, and either
- by tempting them or
- by trying to persuade them that it is necessary,
they ask them to click on a link that exists in the body of the e-mail.
This link leads to sites created by the phishers that look like the official Banks’ sites, in order to mislead the users in typing their personal data.
You can protect yourselves from Phishing by:
- avoiding to open e-mails from unknown senders
- not giving your credentials and your personal data to sites of organizations of which you have no knowledge
The term “Malware” (malicious software) stands for the programs that can be installed in your computer or your mobile phone without you realizing it, in order to intercept sensitive information and perform non authorized actions, or, generally, to take control of your device without your knowledge.
Malware that aims to intercept data constantly monitors the sites you visit and if it detects that these sites concern a certain Bank, it secretly starts to record in a local file anything you type (Username, Passwords etc). If needed, it can also save a snapshot/ image of the site. Afterwards, Malware automatically sends all the recorded data (usually as attachment of an e-mail) to its creator. The sent data may be either used directly by the creator of the Malware or sold to a third party.
The most common tactics for installing the Malware are the following:
- as attached files at e-mails - fraudster send e-mails that try to trick you to follow a site by downloading a piece of software or to open an attachment that subsequently installs a Trojan.
- as free software (e.g. games movies, music)
You may protect yourselves from Malware by:
- avoiding opening e-mails form senders unknown to you
- being very careful where you download files from
- installing special programs for protecting your devices (anti-virus. anti-spyware etc) and updating them regularly
- regularly upgrading your programs (operating systems, browsers etc) to their last edition
Known as vishing, or voice phishing, this tactic is a phishing attempt made through a telephone call or voice message. Fraudsters may have the ability to spoof their caller ID so it could appear that the telephone call is coming from the Bank or from a global corporation . Fraudsters may also have the identifying customer information, such as your name, which they may use to make the call appear "authentic". They target the sensitive data extraction that may be disclosed by the victim. These will by his "consent" be used against him.If you do not know your caller, please end the call and confirm his details through Piraeus Bank's contact center 24/7 at 210 3288000 (call from Greece) and +30 210 3288000, from your mobile phone or land line with charges applied according to your plan with your telecom operator.
Do not respond to any of the above categories that ask for account details, cards or passwords and do not follow links that are contained and prompt you to sign in to winbank.
You can identify the official page of Piraeus Bank and winbank from the security lock at the beginning of the search bar.
Forward such "suspicious» e-mail or text messages to the Bank at firstname.lastname@example.org or call 24/7 at 210 3288000 (call from Greece) and +30 210 3288000, from your mobile phone or land line with charges applied according to your plan with your telecom operator. Then delete it from your email or mobile.
A phishing attempt sent via SMS (Short Message Service) or text message to a mobile phone or device. This tactic is also referred to as smishing, which is a combination of SMS and phishing. The purpose of text message phishing is the same as traditional email phishing: convince recipients to share their confidential information.
It concerns a fraud that belongs to the category of vishing (voice phishing).Scammers call unsuspecting customers on their phones pretending to be representatives of well-known IT companies. Convince customers that their computer needs repair or cleanup and install applications to remotely control their devices (PC, Tablet, mobile phone) - thus gaining ownership and then electronic banking credentials.
How to protect ourselves
- We do not answer unknown phone calls, especially if they come from abroad
- We do not install applications when indicated by strangers
- We do not allow remote access to our electronic devices (PC, Tablet, mobile phone)
- We do not share with anyone and do not enter into unknown websites our e-banking credentials (username and password) or card numbers. We confirm that we have visited the official website of our Bank. We remember that banks will never and in no way ask for our credentials
- We make sure that our computer and devices (tablets, smartphones) always have the latest operating system and applications updates. We install and always have a trusted malware protection program up to date
- In case we fall victim to fraud, we immediately terminate the call and contact our bank
It concerns fraud where perpetrators initially steal e-banking credentials usually through a phishing email or through malware/ trojan installed on the victim's computer. They then proceed to unauthorized replacement/exchange of the mobile customer's SIM card in order to access mobile telephony services (calls, SMS, push notifications). In this way, the perpetrators gain access to one-time passwords or security verification messages, in order to complete the money interception.
How to protect ourselves
- If our mobile phone stops receiving or making calls for unusual reason, or if we lose the signal in a location that usually has good coverage, it is safer to contact our network provider and confirm that our SIM is not deactivated
- We do not disclose our mobile phone number on social media
- We subscribe to the services of organizations that provide SMS and email notifications when our transactions are executed
- We do not share with anyone and do not enter into unknown websites our e-banking credentials (username and password) or card numbers. We confirm that we have visited the official website of our Bank. We remember that banks will never and in no way ask for our codes
- We often check our accounts transactions
- If we fall victim to SIM Swapping fraud or find transactions that do not have our approval, we immediately inform our Bank