Internet Banking and Mobile Banking Fraud Overview
In today’s Turkey, thanks to the high degree of digitalization, almost all individual and corporate small and large financial savings are made within the scope of Electronic Banking. Accordingly, more than 80 Banks and a similar number of Intermediary Institutions operate in Turkey under license and open to audit within the body of the BDDK, SPK, MASAK and all national and international auditing elements. Since banks are for-profit custodians and credit institutions, they need to adapt quickly and effectively to today’s digital world, primarily for profit maximization and other socioeconomic purposes. is carried out for processing.
The latest generation digital structures and the speed data and firewalls of existing digital structures, especially the Blockchain System, are the common priorities of all banks. However, we see that every firewall that is built also feeds the security vulnerabilities that are produced at the same rate, and thanks to non-bank digital organizations, bank systems are still open for attacks and abuses.
Internet Banking and Mobile Banking are the services provided as standard by every bank in Turkey, but since their contents, transaction steps and transaction security software and hardware vary, some bank systems are more prone to hacking, infiltration and complex manipulations than the systems of other banks, and the most basic of these are the services of other banks. The reason is that digitalization is not followed enough.
Frequent Scams in Internet and Mobile Banking
As you can see in the current news, news such as “25 Thousand Liras Stolen While He Was Sleeping”, “When He Entered His Bank Account, He Saw It Was Empty” are intensified. This type of scam that is seen occurs mostly in the Mobile Banking application of the person. Because, due to security vulnerabilities specific to Ios/Android systems in mobile devices, or without any security problems in the device, it is experienced entirely by accessing the customer number, password, mobile phone number information of the mobile banking user.
The main verbs that give rise to cyber fraud at this stage are;
- After the SIM Card is copied (in phone cards sent at the phone dealer or by mail), the SMS Verification Code that is routinely received while the victim is using Mobile Banking and while making transactions is not sent to the victim’s phone, but to the device where the second line is copied and used. Thus, fraudsters approve the banking transaction, not the victim.
- By connecting to the phone and other smart devices with “Remote Access Applications”, by opening an application on the victim’s phone outside of the victim’s physical control, by entering the previously obtained user account and password information, the requested operation is carried out as if the victim were doing it.
- Fraudsters, who detect the vulnerabilities of banks’ mobile and internet systems in advance, enter the open system step by imitating the victim’s phone or e-mail verification, and the transaction is made by reaching the step where money can be transferred from the open step.
- With Keylogger and Screen Logger, keyboard strokes are recorded as a .txt document, and images containing passwords are sent to the fraudster via e-mail. In this way, necessary passwords are exposed and transaction verification is no longer a problem.
- Phishing e-mails, SMSs and other structures with embedded links are delivered to the victim, the victim enters his/her information with his/her consent to the link whose real purpose is hidden, and the fraudster accesses mobile and internet banking with this information.
- Fake domains, Trojan-loaded applications, and many personal data hunting methods can also be counted.
Internet and Mobile Banking Fraud Victim Support
Victims of Mobile and Internet Banking should first know that there is a serious background in these crimes, which can be considered as the type of fraud that requires the widest organization and division of labor among financial crimes. The criminal organizer, which we can call the gang master, establishes the network and manages the resources. Hackers steal victim information and transmit it to the system, Fake Document Officers produce fake images and documents required to enter the system, Intermediary structures coordinate the footmen who will personally deal with each victim’s money. Therefore, it is impossible to deal with an organization that has more than 30 people in total, as a victim.
As in most financial crimes, in fraudulent acts in Internet Banking and Mobile Banking, all transaction images, especially application and browser data, should be taken, then apply to a lawyer experienced in Financial Crimes with all the information you can access. There are many-sided notices and complaints in information frauds that need to be forwarded to many institutions, and these complaints must overlap so that your loss can be compensated by the fraudster if detected, and by your Bank and Credit Provider if the responsibility is proven.
LAWYER SUPPORT
To make an appointment, you can reach us via the phone below during workhours or send an e-mail to the address below.
Weekdays: 09 A.M. – 09 P.M.
Weekends: 10 A.M. – 06 P.M.
Phone: +9 0 (505) 584 41 16
E-Mail: bengimemis@gmail.com