Veriff
Resourceslibraryblog12 common identity verification & fraud scams to avoid

12 common identity verification & fraud scams to avoid

Today's fraudsters employ many different strategies to target businesses and consumers, ranging from skimming bank cards to fake shopping websites. This guide delves into some of the most common practices and offers actionable insights to ensure safety.

November 8, 2022
Blog Post
Analysis
Share:

Sadly, identity verification and fraud scams are now prevalent. To help you spot these criminal actions, we’ve outlined exactly what 12 of the most popular identity verification scams and fraud scams involve. 

1. Gift card scams

Gift card scams are on the rise. This form of fraud occurs when a fraudster asks an individual to pay off a debt using a gift card.

In these instances, the fraudster asks an individual to put some money on a gift card to pay off a tax issue or a fine. Once the gift card has been loaded with the correct amount, they then ask the victim to provide them with the number on the back of the card and the PIN.

Gift cards are popular with scammers because they’re easy for victims to acquire. Plus, gift cards are like cash: once the money on a gift card is used, it is gone and cannot be returned.

Thankfully, these scams are easy to spot. After all, gift cards are for gifts and should never be used for payment. No real business or government agency will ever insist that they are paid with a gift card. 

2. Fake email scams

Fake email scams are also known as phishing attacks. Although scammers use this technique when sending emails, they also use the tactic for phone calls and text messages.

With a fake email scam, a fraudster will send a fraudulent message to an individual that has been designed to trick the person into revealing sensitive information. They may also try to make the victim visit a website that will either download a virus onto their computer or steal their personal information.

Although fake email scams are becoming increasingly sophisticated, they are still relatively straightforward to spot. If an email doesn’t seem legitimate, you should ask your customers to check:

  • The sender’s address
  • Whether the greeting is generic
  • Whether it contains links to unfamiliar webpages
  • Spelling mistakes and grammatical errors
  • Whether the sender is requesting personal information

Businesses should inform their customers about the tactics used by fraudsters and explain how a customer can check whether an email claiming to be from their company is legitimate. 

3. Card/account verification scams

Card and account verification scams usually take place over the phone. The person making the call is a fraudster who claims that they need to verify a victim’s credit card information or account information on behalf of an online merchant or pay service. The fraudster will say that the victim must verify this information or their account will be canceled.

In verifying the information, the victim unwittingly gives the fraudster all of their card details and the information they need to access their account. The fraudster can then use this information to make fraudulent purchases.

At times, card verification scams will also take place via email. In these instances, the scammer provides the victim with a URL where they can enter the information they need to ‘verify’ their card and account.

4. Fake shopping websites

Fake shopping websites look like the real thing. However, rather than supplying goods and services, these websites steal any personal and banking details that are submitted to the site.

Thankfully, these sites can be simple to spot. This is because they usually include:

  • Unusual payment options, such as bitcoins, wire transfer or gift cards
  • Poor design features, such as pixelated images and broken links
  • Suspicious domain names
  • Missing security features, such as ‘https’ at the beginning of the web address and the padlock symbol
  • Suspicious or non-existent contact information
  • Negative reviews

Businesses should inform their customers that they should not enter their details into any website that features any of these issues.

5. Fake tech support scams

With a tech support scam, a fraudster will pretend to be from a well-known tech company, such as Apple or Microsoft. They will then tell the victim to open some files or run a scan on their computer.

At this stage, the scammer will ask to be given remote access so they can solve the problem. However, this also gives them access to all information stored on the device and any network that’s connected to it.

The scammer may also ask the victim to enroll in a worthless computer maintenance or warranty program, or install malware that can give them access to the computer and sensitive data, like usernames and passwords.

Customers should be told that they should never give remote access to their computer to someone who contacts them unexpectedly. If they experience an issue with their laptop, they should contact the company or a tech expert directly instead. 

6. Identity fraud

Identity fraud (also known as ID theft) involves the use of a person’s stolen details to commit crime. Common examples of identity fraud include:

  • Opening a new bank account
  • Taking out a new mobile phone contract
  • Starting a new credit agreement
  • Obtaining genuine documents like a passport or a driving license in someone else’s name
  • Taking out credit, a loan or benefits

To help stop identity fraud, most businesses now have some form of identity fraud management solution in place. These are designed to help beat identity fraud and keep customer accounts secure.  

7. Home title thefts

Home title theft is a relatively new form of identity theft. It occurs when the title or legal ownership of a property is fraudulently transferred without the owner’s knowledge or consent.

Using stolen information to forge documents, a fraudster can claim ownership to pose as a legal property owner and take out a mortgage or another type of loan against a home.

When carrying out home title theft, scammers usually target particularly vulnerable homes, such as when the owner is elderly or recently deceased. Vacation properties or second-home residences are also common targets, because suspicious activity may not be noticed until it’s too late.

To commit home title theft, a scammer will:

  • Use phishing techniques
  • Install malware on a victim’s computer
  • Steal data that’s transmitted over vulnerable Wi-Fi networks
  • Create forged documents and deeds based on stolen data

Companies should make their customers aware of how the scams operate and how they can protect their personal data and their home.

8. Telemarketing scams

Telemarketing scams take place over the phone. A fraudster will call a victim and then deceitfully obtain the victim’s money or property. The fraudster usually achieves this by either:

  • Promising goods or services that they will charge for but never deliver
  • Vastly overstating the goods or services that are provided

Popular forms of telemarketing scams include:

  • Prize offers and sweepstakes
  • Magazine sales
  • Credit card sales
  • Programs to earn money from home
  • Loan offers
  • Vacation offers
  • Vitamins and health products
  • Charity donations
  • Debt recovery

To protect your customers, your business should advise them to hang up the phone if they’re contacted about a service they did not enquire about. 

9. Tax fraud

Tax fraud is any deliberate omission, concealment, or misinterpretation of information to gain a tax advantage. Tax fraud itself is a catch-all term that includes a wide range of illegal activities, including:

  • Deliberately submitting false tax returns
  • Falsely claiming repayments or reliefs
  • Hiding income, gains, or wealth offshore
  • Smuggling taxable goods

Some forms of tax fraud are committed by individuals who are acting dishonestly. However, tax fraud is also carried out by criminal organizations who target the tax system for financial gain.

10. Email account hacks

With email account hacking, a criminal actor gains unauthorized access to a victim’s email address. Once the hacker has access to the email account, they also have access to a huge amount of personal information, including a contact list and the contents of the emails.

When hacking email accounts, hackers will use:

  • Phishing attacks
  • Information found in data breaches
  • Information that is stolen from an unsecured Wi-Fi network

A victim will be able to tell that their email account has been hacked if:

  • Their password no longer works
  • There are emails in their account that they do not recognize or didn’t send
  • Their friends tell them that they’re receiving odd or spam messages
  • Different IP addresses display in their log

If a customer’s email has been hacked, you should inform them that they must reset their password immediately. Following this, they should also change the passwords on their other online accounts. 

11. Medical scams

A medical scam (also known as a health fraud scam) refers to any product that claims to prevent, treat, or cure diseases or other health conditions but is not proven to be safe and effective for this use.

Health fraud scams waste money and can lead to delays in getting proper diagnosis and treatment. They can also cause serious or even fatal injuries.

When targeting victims, fraudsters usually send emails to advertise the effects of ‘miracle tablets’ or ‘medical cures’. In other instances, the fraudsters will pretend to be an online pharmacy that offers drugs and medicines very cheaply or without prescription.

12. Bank card skimming

Bank card skimming occurs when a criminal actor steals credit and debit card data and PINs when a customer is at an automated teller machine (ATM) or point of sale (POS) device. The act of card skimming allows a criminal to steal money from accounts, make purchases, and sell card information to third parties.

To carry out the process of card skimming, a criminal will install a card reader on an ATM or POS device. This is used to collect and pass on payment card information for retrieval by the thief. PIN numbers may be retrieved with a keypad overlay or a hidden camera.

To protect themselves against bank card skimming, your customers need to remain vigilant. They should check for signs of suspicious activity or anything that looks unusual. If an ATM or POS seems suspicious, they should refrain from making a transaction and report anything suspicious to the owner.

Prevent customers from being the victim of identity verification scams with Veriff - Request a demo

Sadly, the number of identity verification scams and fraud scams is on the rise. Our Identity Fraud Report 2021 recently revealed that there was a 19% increase in identity fraud between June 2020 and June 2021.

As a result, it’s clear that identity fraud is a serious cause for concern. Thankfully, here at Veriff, we provide solutions that can help you safeguard your customers and their accounts. To discover more about our identity verification solutions and to see exactly how they can help your business, contact our experts today. We’d love to provide you with a free trial which shows exactly what Veriff can do for you.