xxx
Four dangerous contactless scams
Skimming Devices
Fraudsters install skimming devices on legitimate payment terminals to capture card information when users make transactions. Trevor said: “These devices can covertly steal card details, including the card number and expiration date, enabling criminals to clone cards or make unauthorised purchases.”
Shoulder Surfing
Trevor explained that this tactic involves criminals lurking near individuals making contactless payments and secretly observing or recording their card details. With this information, fraudsters can easily access the victim’s accounts or make fraudulent transactions.
Card Cloning
Criminals utilise sophisticated techniques to clone contactless cards, replicating the data stored on the card’s chip. Once cloned, these cards can be used for unauthorised transactions, posing a significant threat to users’ financial security.
RFID Readers
Trevor explained that RFID (Radio Frequency Identification) is a technology that uses electromagnetic fields to automatically identify and track tags attached to objects. He continued: “These tags contain electronically stored information that can be read remotely using RFID readers or scanners.
“In the realm of contactless payment scams, criminals may exploit RFID technology by using illegal RFID readers or scanners to intercept data from unsuspecting individuals’ contactless cards or devices without their knowledge.”
From: New contactless card warning to every person paying this way at any type of checkout – Daily Record.
xxx