Fake data confirmation: Phishing scammers want your Volksbank data


CURRENT FRAUD WARNINGS

Phishing scammers want to get your personal information in the name of Volksbank. We’ll show you how to recognize the stitch.

Do not follow the link in this phishing email. (Source: consumer advice center)

  • Volksbank customers are the target of a phishing email.
  • A data comparison serves as a pretext for data theft.
  • You can easily spot the scam.

Cybercriminals are once again after your data. This time, Volksbank customers are being targeted by a phishing scam. If the attempt is successful, in the worst case scenario the fraudsters can gain access to your account and steal your money. It is therefore important that you recognize the fake email in good time.

The scammers claim in the message with the subject “Customer Service” that your account has been blocked because you allegedly did not confirm your details. Re-activation is very easy. All you need to do is click on the “Confirm” button and provide all the required information on the landing page.

But be careful. The link does not lead to the Volksbank website, but to a dubious site that only appears to belong to the credit institution. If you follow the instructions and provide your sensitive data, it will immediately fall into the hands of cybercriminals, as the consumer advice center reports.

You can recognize the phishing email by the sender address and the impersonal salutation. But the call to compare data via a link also clearly indicates an attempt at fraud. Your bank would never ask for your details. For your protection, you should not reply to the email and put it in the spam folder.

Simple signs: How to recognize every phishing email

A first indication that you have received a phishing email: The email will ask you to confirm personal information or enter it on a website. This Under no circumstances should you comply with the demand. In addition, criminals often use the official logos of the companies they are copying in their emails, but not official sender addresses.

If the sender seems suspicious to you, you should read the email twice. You will often find spelling errors or inconsistencies in German grammar. The attackers usually do not write their own emails, but instead use automatically generated messages or translate known emails with a translation program. But why actually go to all this effort?

What do criminals achieve with phishing attacks?

Phishing is used on the Internet to collect real user data. These can be used to make money when email addresses, names and other information are sold for advertising purposes or passed on in criminal forums. With the data obtained, cyber criminals can also target future phishing attacks more specifically, making their attacks more effective.

Have you received a suspicious email?

Forward it to [email protected]
or follow us on:

Phishing checklist


  • Spelling mistake?

  • Sensitive data requested?

  • Official logos?

  • Unknown sender?

Attachments and links contained in malicious emails often introduce malware or viruses to your computer. In addition, you should not simply ignore suspicious emails. Forward it to the email address above and help us report future phishing attacks.

More fraud warnings on netzwelt – stay one step ahead of cybercriminals

But phishing emails are not the only danger lurking on the Internet. In addition to attempted fraud, there are all sorts of viruses, Trojans and malware that can infect your computer. Unfortunately, data scandals are also part of everyday digital life. You can see the five most recent articles on the topic of “fraud warnings” below:

If you want to stay informed about the latest fraud reports, subscribe to netzwelt on Twitter, Facebook and Instagram. You can also find all articles on the topic on the next page.

  • ” Tip: The best VPN providers for more security and data protection
  • » Buy balcony power plant: Comparison of the best solar systems

Don’t miss anything with this NETWORK WORLDNewsletter

Every Friday: The most informative and entertaining summary from the world of technology!





Source link -67