Safe Banking
Sharing a ride is alright. Sharing your Bank details isn’t.
Call 1800 209 0000 and say fraud.
Experience the all-new Kotak Netbanking
Simpler, smarter & more intuitive than ever before
Experience the all-new Kotak Netbanking Lite
Simpler, smarter & more intuitive than ever before. Now accessible on your mobile phone!
Types of Fraud / Categories of Fraud
They spam, scam, and make you clam . Fraudsters come from all walks of life and it is our duty at Kotak Mahindra Bank to make sure that you steer clear of them. Here are the types of frauds that you need to keep an eye out for.It’s our job to make you aware, because we care.
What is Phishing?
Phishing occurs when a group of cyber criminals create mirror website of the bank in order to dupe the customers. Scam mails are sent which directs user to fake websites wherein user ID and password, Card number, ATM PIN, CVV, OTP is asked for. Once in possession of this knowledge, the scammers misuse it.
How do Scammers do it?
Tips to protect yourself
In one word – beware.
Here are a few tips that can be handy while detecting phishing.
If you have received a phishing email or text message, write to [email protected]
What is Vishing?
A combination of ‘Voice’ and ‘Phishing’, Vishing uses Voice over Internet Protocol (VoIP) technology, wherein fraudsters trick customers into providing their personal and financial details over the phone. They do so by pretending to represent real companies like banks.
How do Scammers do it?
Tips to protect yourself
You can escape the net of vishing fraud by following a few tips and tricks.
What is Smishing?
In Smishing, text messages on cell phones are used to trap customers into calling back fraudulent phone numbers or visiting fraudulent websites, or even downloading malicious content, by way of luring information such as winning a lottery, job offers, etc.
How do Scammers do it?
Scammers are then in possession of all the private and confidential information of the customers that they use to their advantage.
Tips to protect yourself
There are simple tricks which can help you evade such scamming schemes.
What is Identity Theft?
In ‘Identity Theft’, fraudsters attempt to obtain important personal information such as date of birth, passport number, aadhaar details, PAN details etc. to gain access to your bank account, and then carry out fraudulent transactions.
How do Scammers do it?
Tips to protect yourself
Be vigilante – that is the first mantra for saving yourself from getting scammed. For the rest take some cues from the following.
What is SIM Swap Fraud?
SIM swap scam is a type of account takeover fraud. Also known as Port-out Scam or SIM Splitting, it generally targets a weakness in the two-factor authentication and two-step verification wherein, the second factor or step is an SMS or call that is placed to a mobile number.
How do Scammers do it?
Tips to protect yourself
What is fraud through International Transfer?
These are the scams which involve an entity or person who’d share a large payment with you in exchange for help in transferring money out of their country. Such scammers usually trick by using sob stories about their money being trapped in banks due to civil wars or coups, often in the countries which are in the news. They will then ask you for your bank account details, which will later be used to siphon off your money. Since these originated in Nigeria, they are also known as Nigerian Scams.
How do Scammers do it?
Tips to protect yourself
Nigerian scams are less but not unheard of. A few steps of vigilance and you can prevent yourself from falling into the trap.
What is a Money Mule Scam?
In Money Mule scams, victims (money mules) are tricked by fraudsters into laundering stolen/illegal money through their bank account/s. Fraudsters contact customers through emails/chat rooms/job websites/blogs and convince them to receive money into their bank accounts in exchange for attractive commissions. After this, fraudsters transfer the illegal money into the account of the money mule. Then, the money mule is directed to transfer money into the account of another money mule. This creates a chain that ultimately leads to the money getting transferred to the fraudster’s account.
How do Scammers do it?
Tips to protect yourself
What is Juice Jacking?
Juice jacking is a type of cyberattack involving a public charging port.
Public charging ports are indeed a big help when the battery of our mobile device is drained out, and we don’t have a charger or a power bank; but on the other hand, such ports may also steal all your data and install a malware in your device.
How it happens
How to prevent Juice Jacking:
What is Cerberus Malware?
Cerberus is a malware (virus) taking advantage of the COVID-19 pandemic. The software impersonates legitimate apps and content related to COVID-19.
The malware primarily focuses on stealing banking details like credit card numbers, CVV and more. Additionally, it can use overlay attacks to trick victims into providing personal sensitive information as well and can also capture two-factor authentication details.
Cerberus also has the ability to take screenshots, hijack SMS text, steal contact lists, account credentials, and more
How does it happen?
Step 1
It usually comes in the form of an SMS, infected email attachments, malicious online advertisements, social engineering and deceptive applications
Step 2
It tricks innocent customers to download or click on the embedded link mentioned in the communication
Step 3
Once downloaded, the software deploys its malicious app on their smartphones.
Stay safe by following these tips
What is COVID-19 Phishing Threat?
The Government of India has warned about a possible phishing attack by cyber criminals with the intent to steal all personal data and financial details including bank account and debit/credit card details, CVV numbers and secret passwords.
A recent CERT report has stated that cybercriminals are expected to undertake a phishing campaign in India's major cities using the suspicious email - [email protected] from June 21, 2020.
The criminals claim access to millions of Indian email IDs where they plan to send emails titled 'Free COVID-19 Testing' that aim to extract personal and banking info from residents of Mumbai, Delhi, Hyderabad, Chennai and Ahmedabad.
How does it happen?
Step 1
It usually comes in the form of an email under the pretext of local authorities in charge of dispensing government-funded COVID-19 support initiatives.
Step 2
It promises news you may be interested — currently information related to Covid-19 — prompting innocent customers to click on the embedded link mentioned in the communication
Step 3
The customer’s safety is compromised if they click on the link, downloading malicious files or ending up entering sensitive personal and financial information
Stay safe by following these tips:
Smita was busy cooking a meal for a dinner party at her home. She received a call from her bank asking her to urgently provide personal details since she had failed to complete her KYC on time, failing which her account would get blocked immediately. Since the caller identification app identified the number as her bank’s number, she quickly gave the details and got back to cooking before her guests arrived. By the time her guests left after a very enjoyable evening and she got a chance to look at her phone, the fraudster had withdrawn Rs. 50,000 from her bank and there were several SMS alerts from her bank informing her of the withdrawals.
Even without realising, and having seemingly checked that it was an authentic number that showed the name of the Bank, Smita had become a victim of social engineering fraud.
What is social engineering fraud?
Fraudsters are using new ways to update fake contact numbers similar to the bank’s toll-free number on online platforms and caller identification apps in order to dupe people.
How the fraud happens:
Why True caller and similar apps are not reliable when it comes to official entity numbers:
Let’s take an example of Truecaller and see how it works:
How can this be prevented?
Always be aware. It is important not to trust caller identification apps directly. Instead, verify the number on the official website to ensure your safety.
Stay alert, stay safe.
What is IDN Homograph?
The IDN (International Domain Name) Homograph Attack, commonly known as Punycode, is an attack where fraudsters create/use a domain or website name that looks similar to an established name.
Characters — i.e., letters and numbers — that look alike are called homographs, thus the name of the attack.
How do Scammers do it?
Fraudsters create domain names that almost resembles a legitimate domain. A common way of doing this is replacing the Latin letters such as “e” and “a” with Cyrillic letters “e” and “a”.
For example, for Kotak.com, they may use Kotak.com — it's difficult to note the difference in the letter “a” in both instances.
To a user, this difference in lettering may not be obvious because it is a very cleverly designed fraud.
Tips to protect yourself:
Always be aware:
If you notice any such discrepancy in any url received via email or text message, write to [email protected]
What is a Loan Fraud?
Fraudsters issue fake advertisements of quick and easy personal loan offers at very attractive low rates of interest or with easy repayment options or without any security requirement, etc., and lure customers to contact them.
How do fraudsters do it?
Tips to protect yourself
In one word – beware.
Here are a few tips that can be handy while detecting a Loan Fraud:
If you notice any such discrepancy in any url received via email or text message, write to [email protected]
What is a Classified Marketplace Fraud?
Fraudsters create fake accounts on classified websites that are backed up by fake social media accounts to make them look authentic. They connect with customers who post advertisements on the classified sites looking for a product or service, and try to trick them into sharing sensitive financial and personal data.
How do fraudsters do it?
Tips to protect yourself:
In one word – beware.
If you notice any such discrepancy in any url received via email or text message, write to [email protected]
What is an Aadhaar Based Payment Systems Fraud?
The Aadhaar Based Payment Systems may be vulnerable to the gummy finger fraud method. By using gum/glue, a duplicate of your fingerprint can be made. Fraudsters may use this duplicate fingerprint to make a transaction causing you to lose money.
How do fraudsters do it?
Step 1: A merchant may be using the Aadhaar Based Payment System to authenticate your fingerprint. Your biometric data could be stored on this device. A fraudster with access to this device can use the gummy finger method to create a duplicate fingerprint. If your biometric data is stored on the merchant’s smartphone and it falls into the hands of a scammer, your details become vulnerable.
Step 2: This duplicate fingerprint can then be passed off as yours to make transactions in your name.
Tips to protect yourself:
In one word - beware
Things to do if you fall prey to such a fraud:
If you notice any such discrepancy in any url received via email or text message, write to [email protected]
What is a Broadband Internet Security Fraud?
A scammer may phone you and pretend to be a staff member from a large computer or telecom firm or claim to be a technical service provider. They may tell you that your computer has been sending error messages or that it has a virus. They may mention problems with your internet connection or your phone line and say this has affected your computer's recent performance. They may claim that your broadband connection has been hacked. The caller will then request remote access to your computer to ‘find out what the problem is’. This way they can access all the files and data on your computer. The scammer may also try to talk you into buying unnecessary software or a service to ‘fix’ the computer, or they may ask you for your personal details and your bank or Credit Card details.
How does the fraud happen?
Tips for your safety:
In one word – beware.
If you notice any such discrepancy in any url received via email or text message, write to [email protected]
Fraudsters try to trick customers by sending them an SMS from a cloned mobile number. They may also receive a call impersonating another entity. The pretext on which they may ask the customer to take action could be, among other reasons, as follows:
o Refund/Credit in the account
o SIM card expiry
o SIM card upgrade
o KYC not completed
They trick the customer into giving them sensitive information — since the Call/SMS appears to come from a legitimate source — and then use that information to withdraw funds or commit fraud.
How does SMS spoofing happen?
Step 1
The fraudster may initiate the device registration on any UPI app (GPay, PayTM, etc.)
Step 2
The fraudster then sends out a spoof SMS creating panic that the customer’s account will be blocked as KYC is pending or the SIM has expired. Along with this SMS, an Alpha Numeric Code is forwarded to the customer (potential victim) stating that the code must be sent to a particular number from the customer’s Registered Mobile Number.
Step 3
By now the customer is tricked and he sends the code to the fraudster assuming the number to be the relevant authority. That’s it — the fraudster’s device (UPI app) then gets linked with the victim’s Registered Mobile Number.
What happens next?
The fraudsters then tricks the customer into revealing sensitive bank details over a call, asking for details such as the bank account number., debit card number, CVV, the expiry date etc. They do so by pretending to represent real companies like banks, e-commerce companies etc.
The fraudster is able to see the customer’s bank account details on his own device since now the customer’s Registered Mobile Number is linked to the fraudster’s device.
The victim only realises that he has been tricked when he is intimated about the fraudulent debit when he receives an SMS alert or upon checking his bank statement. Thus, SMS spoofing takes place without the fraudster requiring to have a cloned/duplicated SIM but by simply tricking the customer into forwarding the alphanumeric code to a number shared by the fraudster.
Tips to stay safe: