We take all the measures to secure you against any fraudulent activities. It is in our DNA and it starts from our systems, processes and people. We follow best practices across departments and keep our systems, processes and people regularly updated with the latest in security, so that you can bank more and worry less.
While we do everything to safeguard money that you trust with us, we would also want you to be cautious about how you deal with money while you are online, so that you keep yourself away from any online fraudulent activities.
We urge you to follow the mentioned tips to keep your money safe and secure.
SOVA Android Trojan, is a type of mobile banking malware which targets banking applications to steal customer’s personal information. This malware captures the credentials when users log into their netbanking apps and accesses their bank accounts. The said malware is distributed via smishing (phishing via SMS) attacks and has the capability to encrypt all data on an Android phone and hold it for ransom. It has been also noticed that the malware is now hiding itself within fake Android applications that show up with the logo of a few famous legitimate apps like Chrome, Amazon, NFT platform to deceive users into installing them.
To safeguard your phone and your personal details, remember
Open Instant DBS Bank Savings Account in just a few minutes.
RBI urges the members of public to practice safe digital banking by taking all due precautions, while carrying out any digital (online / mobile) banking / payment transactions. These will help in preventing financial and / or other loss to them.
Click here to know more about Safe Digital Banking Practise.
The Reserve Bank has released a booklet, “BE(A)WARE” on the common modus operandi used by fraudsters and precautions to be taken while carrying out various financial transactions.
The booklet aims to enhance public awareness about various types of financial frauds perpetrated on gullible customers while carrying out digital payments and other financial transactions. The booklet elaborates on safeguards against commonly used fraudulent techniques, such as, SIM swaps, vishing/phishing links, lottery, etc., including fake loan websites and digital apps.
To read the booklet, click here.
Don’t leave your online security to chance. Here are some useful online and email security tips. Read on to find out how you can prevent any kind of security breach of your information, online.
Today fraudsters are gaining remote access to victims' phones by tricking them into installing software applications such as TeamViewer or AnyDesk (which are legal apps, not malware, but are remote device control apps). Their modus operandi is as follows:
Please note that the Bank will never call to ask you to download any other app apart from their Mobile banking app and will also never ask you to share any OTP or passwords. Do not share your login credentials with anyone and maintain the privacy of your account.
Business Opportunity fraud involves an offer to become financially independent, or to generate extra income, by setting up your own business.
You receive either a letter or an email, see an advertisement or get redirected to a website where you are asked if you are interested in making easy money by working from home, or setting up your own online business.
The scheme allows you to choose when you work and enables you to fit your work around your other responsibilities. However, the scheme organizer will make you pay an advance fee to register with the scheme and then, depending on your work, either they will find fault with your work and use it as a reason for not paying you or any products or services you are asked to sell will be worthless and you won’t be able to sell them.
There are many online job scams that take advantage of job seekers in a variety of ways. Scammers have several purposes, depending on the scam - to collect confidential information to use for identity theft, to get you to cash fraudulent checks or to wire or send money, and to get you to pay for services or supplies.
Scammer make upbeat promises about your chances of employment, and virtually all of them ask you to pay them for their services before you get a job. If you must pay for the promise, it’s likely a scam.
Before you apply for a job online, especially work at home jobs, review typical job scams and scam warning signs to help you determine if a job is a scam. If you're not sure, take the time to research the company to make sure the job is legitimate.
A digital or virtual currency designed to work as a medium of exchange, cryptocurrency uses cryptography to secure and verify transactions as well as to control the creation of new units.
Essentially, cryptocurrencies are limited entries in a database that no one can change unless specific conditions are fulfilled.
Using a Debit Card is a great convenience and a little bit of vigilance on your part can go a long way in preventing fraud and hampering your Debit Card experience.
Do not use any ATM which appears to be tampered with, broken, scratched, damaged, sticky with glue, has extra wiring or loose parts around the slot or difficulty in inserting the card.
Financial scams targeting seniors have become prevalent because it is believed that they have a significant amount of money in their accounts and are relatively easy to lure. Staying informed of the below pointers is a good way to ensure the security of their earnings.
If you receive a telephone call or email from someone who has some specific information about you, such as your name and details about your friends and family, please beware as using this method, a scammer can trick you into believing he or she is a friend or family member and claim to be in need money for an emergency, such as posting bail, paying a hospital bill, or being detained at an airport. The scammer may pressure you to send money immediately.
Under Imposter scams, a fraudster or scammer may claim to be someone you would ordinarily trust or listen to, like a top official / employee of a corporate or banking institution. The impostor can disguise their identity and contact either by phone, email, fax or mail and submit an invoice / request a payment / instruct changes for vendor related payments, so that payments reach the fraudster instead of where it is intended.
Check for Red flags, which include the following but aren’t limited to:
Investment fraud generally refers to a wide range of deceptive practices that scammers use to induce investors to make investing decisions. These practices can include untrue or misleading information or fictitious opportunities.
It involves someone pretending to offer you the opportunity to invest in a variety of schemes or products that are either worthless or don’t even exist. Some of the types of Investment frauds are Pyramid Schemes, Ponzi Schemes, Pump-and-Dump, Advance Fee fraud and Offshore Scams.
A loan scam happens when you are asked to apply for a loan, at low or no interest rates and asked to pay an upfront fee for getting the loan.
These loan scammers set up websites or provide articles and reviews that outline the loans they offer and share SMS / WhatsApp messages / e-mails offering loans to prospects and instruct them to transfer money as a deposit before the loan can be disbursed. After the transfer is done, the scammers are no longer contactable.
Please remember that legitimate lenders don't send e-mails for offering loans without credit checks, at zero interest rates and do not demand payment to release the loan. Kindly reach out to us in case of any queries.
A lottery or Sweepstakes scam refers to a scam where you may receive notification by mail, telephone, email, text message or social media that you have won a lot of money or a fantastic prize in a competition, lottery or sweepstake. Scammers require you to pay a fee to receive the prize to avoid taxes or additional fees or may even threaten to report you to the Income Tax department or police if you do not make the requested payment.
Loan Repayment fraud is targeted towards people who may have taken loans.
The fraudsters often use a company name that is like an existing loan offering company and sends out letters / emails claiming that the loan recipient
In such an instance
To help you navigate your device in a secure manner, we have created a list of points that will help you always keep your valuable information.
Scammers take advantage of people looking for romantic partners, often via dating websites, chat rooms or social network by pretending to be prospective companions. They create fake profiles with fictional name, or falsely take on the identities of real, trusted people such as military personnel, aid workers or professionals working abroad and play on emotional triggers to get you to provide money, gifts or personal details.
We live in a digital world where we are doing all transactions online. There are many fraudsters out there who use Phishing techniques. It is an attempt to obtain sensitive information such as usernames, passwords and account details by posing as a reputable company via email, text message, phone call, fake websites or social media. Once obtained, your personal and financial information can be used to access your account and steal money.
To safeguard your account from such fraudulent attempts, please note:
Never reply to emails which claim to provide your personal information due to system upgrade or your account will be closed if fail to provide information.
Phishing is the attempt of fraudsters to steal your personal information such as logins, passwords, and credit card details, to ultimately take your money. Fraudsters can reach out to you by impersonating a trustworthy entity, such as DBS via digital channels like emails, text messages and fake websites that will redirect to a non-DBS website.
At DBS, your safety is paramount to us. In these difficult times, it is very important for you to be aware of ways to spot a fraud communication so that you can be safe from these malicious mails. With this thought, we would like to take a moment to caution you on the risks associated with opening fraud emails sent on the subject of Coronavirus.
Check the sender of email carefully before clicking on anything, phishing emails are known to contain malicious attachment/links, which are capable of installing malware/ransomware, that can access and lock files on your system. This is then followed by cyber-criminals demanding a ransom to allow you access to your files.
If you are planning to contribute to the PM-CARES fund, be careful of fake UPI IDs. Since the announcement of the fund, some fraudsters have been reported to have setup fake UPI IDs. The correct UPI ID of the PM-CARES fund is "pmcares@sbi".
Don’t leave your online security to chance. Here are some useful online and email security tips.
Secure your online banking transactions from fraudsters by following some important tips:
Ransom malware, or ransomware, is a type of malware (malicious software) that prevents users from accessing their system or personal files and demands ransom payment in order to regain access.
There are several different ways that ransomware can infect your computer -
Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
Tabnabbing is a computer exploit and phishing attack, which persuades users to submit their login details and passwords to popular websites by impersonating those sites and convincing the user that the site is genuine.
Tabnabbing targets people who keep multiple tabs open in their browser, often for long periods of time. The fraudsters then use JavaScript to change the contents and label of an open, but not active, tab to resemble the log-in screen of a bank, email provider or online shopping store.
A technical support scam refers to any class of telephone fraud activities in which a scammer claims to offer a legitimate technical support service, often via cold calls to unsuspecting users, claiming that they have detected viruses or other malware on your computer, or your software is outdated and asks for remote access to your computer to resolve the issue.
Scammer will direct you to open a system log or asks you to use command prompt to generate suspicious looking output to convince you with issues. They will ask you to give remote access of your computer. Once access is provided, the scammer may request you to make payment for technical assistance, install malicious software, change the settings of your compute to make it vulnerable, and / or steal your financial information.
What is UPI - Unified Payments Interface (UPI) is an instant payment system developed by the National Payments Corporation of India (NPCI), an RBI regulated entity.
UPI is built over the IMPS infrastructure and allows you to instantly transfer money between any two parties' bank accounts.
Beware of Fraudsters - If you receive a call from someone asking for card or bank details, or set up a new VPA, please disconnect and do not engage in any conversation.