why is it important to keep your software updated?
2023. július 30. - software has an expiry date, too. Did you know that, with each update, your devices become not only more convenient but also more secure?
if you suspect that someone has gained access to
take immediate action!
if you notice that a transaction you don’t recognise has been initiated from your bank account or that unauthorised persons have accessed your bank card or bank account details, promptly report the case to TeleCenter so that they can take steps to block your bank cards, as well as access to your bank account (including your phone number) in order to minimise losses and prevent further fraud. At the same time, you can apply for a replacement card
If you wish to block your bank card for any other reason, you have the following options:
use lawful software on all your devices
please, visit your nearest branch, and reactivate your accounts and cards with the help of our advisors.
phishing is a subset of fraud, one of the biggest online threats today, and one that almost everyone is exposed to. As its name suggests, phishing is an attack aimed at obtaining our data. Quite a few attacks can be prevented by technical means, however, without your involvement, technical means are worth very little. We, at K&H, do our best to protect your money and your data, but one of the key components of that protection is YOU.
one of the most common phishing techniques is for unauthorised persons to try and obtain the bank card details and certain identification data of customers from a phone number that appears to be real, often pretending to be representatives of another bank. It can also happen that they call ‘on behalf’ of another bank and then, once they identify the person as a K&H customer, they ‘transfer’ the call to a K&H ‘staff member’ or immediately redial the customer again, posing as a staff member of K&H.
caller ID spoofing is a special technique that allows fraudsters to modify the caller ID that is displayed on the phone’s screen (for example, to a K&H phone number), hiding the identity of the real caller. In other words, when you receive such a call, the display will not show the real caller’s phone number, but another number that often looks familiar, such as the bank’s phone number. This increases the credibility of the fraudsters and helps them deceive victims. A familiar phone number may appear less suspicious, making it more likely that they can trick victims into providing the information they want.
They typically take the form of letters written in incorrect Hungarian, with typing and spelling mistakes, which
The text of the link in the letter is not related to the content of the letter (e.g. the link in the letter sent on behalf of K&H does not point to kh.hu, but to a completely different page).
due to their nature, these messages typically contain a short, attention-grabbing narrative message and a link (e.g. your package no. 111111111 has been sent). Text messages, like telephone calls, can also come from a phone number that appears to be real. In any case, be suspicious if you receive a text message with content you were not expecting (e.g. if you have not ordered anything and you are still informed about the arrival of a package). To check the link, hold your finger on the link for some time, and you will see the link to which the message actually points. If the text of the link is not related to the content of the message (e.g. the link in the text message is sent on behalf of K&H, and it does not point to kh.hu but to a completely different page), you are almost certainly the target of a phishing attack.
Inheritance fraud means that fraudsters offer a significant inherited amount, i.e. major financial gain, to those who are receptive to that. In the typical scenario, a message is sent in the name of a foreign lawyer or authority, in which a very high inherited amount is promised in exchange for a participation. Claiming various costs, the fraudsters request the transfer of a low advance payment.
our universal advisors often report a type of fraud that is difficult to prevent because our client intentionally wants to transfer money to the fraudster. In the latest case, our client was contacted by a lady (?) who claimed to be a Hungarian living in Africa. Her family name was the same as our client’s, and the fraudster claimed to be a distant relative. Over several weeks of daily online conversation involving photos generated with artificial intelligence, our client grew to trust the “lady” that she had only heard from in messages. So when the fraudster mentioned that her small child was seriously ill and needed an expensive operation that was performed in West Europe only, our client wanted to transfer a large amount in order to help.
Fortunately, this story ended well because our universal advisor managed to convince our client that this was a fraudulent attempt at obtaining her savings. As the police confirmed this conclusion, our client suffered no damage.
The “Nigerian-type” or “419” fraud is a specific method employed in social media or on online dating portals, when the victims willingly transfer money to the fraudsters. The perpetrator builds up a romantic relationship with the victim, and then comes up with a touching story to ask for money. The deceptive story is supported with a fake social media profile that nevertheless looks authentic.
A client of ours received an unusually high phone bill from his service provider. Upon checking his call list, he found a long call to a foreign (African) number. He remembered a missed call from a number abroad. Unsuspectingly, he had called the number back. The phone on the other side rang for a long time but was not picked up; then the connection was broken. The phone company told our client that he had fallen victim to call-back fraud. The phone connection had actually been made; the call sounds had been recorded and played back by the fraudsters.
Call-back fraud is rather frequent. The perpetrators make many phone calls from unknown numbers, often from abroad, in order to gain money from their victims. The calls are short and immediately interrupted because the fraudsters want to be called back, so that they can gain income from the high (often premium) rates of international calls. The fraud attempt is successful even if the phone is not picked up despite a long series of rings, if the call is interrupted, or if the line is busy.
Investment fraud is very common. The fraudsters advertise a seemingly attractive opportunity to invest in shares, bonds or cryptocurrencies, often using images of and recommendations by celebrities such as models or athletes. The perpetrators attempt to gain their victims’ money through the promise of getting rich fast.
Consumers and businesses buy and sell more and more goods on the internet. Online offers are often favourable indeed, but beware of fraudsters!
In one of the most frequent schemes, a buyer calls the seller to claim that he has paid for the product, and asks the seller to install a program on his computer or phone in order to “ensure that the payment is received”. The software usually grants remote access to the device. The unsuspecting seller may disclose to the fraudsters the code received in a text message; as a result, the criminals lock him out of his own banking profile, and empty his bank account.
In another type of online marketplace fraud, the seller is informed in a text message that the product has been paid for but he must “accept the amount” by opening a link in the message. Alternatively, the “buyer” recommends a courier service by abusing the name of a well-known and legitimate delivery service (e.g. Foxpost, DHL, DPD, MPL), and sends a text message or e-mail containing a phishing link referring to that provider. The link leads to a false website compiled by the fraudsters, where the seller is requested to enter his bank card data. Then the criminals can abuse the card, e.g. by making purchases. In other cases, the seller is invited to select his account managing bank and then enter his sensitive login data. This false website forwards the data to seller’s bank, and the careless client (seller) gets a legitimate one-time login code (e.g. in a text message) which he also enters on the false site. In that way, the fraudsters gain control of the client’s bank profile, and can immediately steal (transfer) the account balance.
In these scams, the criminals send a text or e-mail message in the name of a non-banking service provider, asking you to confirm your data, pay an overdue amount, receive a parcel or a transferred sum, or suspend the service. Under that pretext, they request bank account or card data, personal data, or a money transfer. These messages often include links that seem to lead to the legitimate provider’s website but actually take you to a malicious site, or install malicious software on your device.
Cybercriminals know that service providers increasingly use social media to keep in touch with their clients, even for the purposes of complaint handling or problem solving.
The perpetrators monitor complaints made to service providers in social media, and then pose as a representative of a company by copying a real representative’s profile or creating a similar one. They contact complaining customers and ask for sensitive information such as personal, banking or login data, ostensibly in order to resolve the issue. With that sensitive information, they can access the client’s bank account or various online accounts.
Fraudsters employ various methods to make you disclose your personal data; for example, they may offer you a job. Then they use the data for unauthorized purchases, or they open a bank account, buy telephone subscription, borrow money, execute illegal business transactions, or sell your data to other fraudsters.
K&H Bank uses two-factor authorisation for online login and transaction approval. During an identification in text message, users are required to enter not only their password but also a code received in the text message. This secondary authentication request appears on your phone’s screen even if someone else has been trying to make a transaction.
Phoney WiFi networks can be so sophisticated that a general user would hardly spot them. In such a scam the attackers set up a fraudulent WiFi hotspot bearing the name of a well-known and legitimate one. Then they invite potential victims to connect. They tap into the communication and collect sensitive information such as usernames and passwords while the users often do not even detect the attack.
Scammers use phishing e-mails or text messages to install malicious code on your device, that may allow them to look for and collect information such as login data. Such pieces of code are usually installed without the user’s knowledge when the user clicks on a link in a phishing message posing as a legitimate notification or installs an application that contains malicious code. As the user is not aware of being spied upon, they may disclose sensitive information such as login data and financial information.