Stay alert. Stay informed.
Protect your finances against fraud.

As technology advances, so do fraud tactics. The security of your story is our top priority.

Keep your accounts safe

When it comes to fraud, prevention is always better than cure. The best way to prevent fraudulent activity is to educate yourself on the various tactics that cyber criminals use to get access to you and your personal information. As a trusted financial services provider, your security is as important to us as it is to you. Here, we hope to give you an in-depth understanding of digital fraud, so you can take the necessary steps to keep your finances safe.

Types of Fraud

Social Engineering Attacks

Social Engineering

Social engineering aims to manipulate, influence or deceive victims to gain access to their devices and thus steal personal and/or financial information.

 

 

Phishing

Phishing refers to the practice of sending emails or alternative forms of communication, purporting to be a reputable company or organisation to retrieve sensitive information.

 

 

Spear phishing

Spear phishing is a more sophisticated form of phishing in which criminals target specific individuals or organisations, seeking unauthorised access to private information.

 

 

Vishing

Short for voice phishing, vishing is when scammers use phone calls to pose as a representative from a legitimate company and request sensitive information like login credentials, credit card numbers or bank details.

 

 

Smishing

SMS phishing or smishing is the committing of fraud by using SMSs to persuade victims to reveal personal information or visit spoof websites.

 

 

Quishing

QR phishing has become a popular tactic in our digital world. Scam QR codes that lead to fraudulent websites or harmful content are embedded in emails or even public spaces.

 

 

Malware and Cyber Attacks

Baiting

Baiting is a form of social engineering that uses tempting offers to exploit victims’ curiosity, tricking them into revealing login credentials and giving scammers unauthorised access to systems, thus enabling fraud.

 

 

Pretexting

Pretexting is when cybercriminals impersonate trusted authorities, such as bank representatives or IT support, to gain access to sensitive information and cause financial harm.

 

 

Pharming

Pharming redirects users from legitimate websites to fraudulent ones, intercepting login attempts and leading to unauthorised access, identity theft and fraud.

 

 

Trojan

A Trojan is a computer virus that is often disguised as a trusted email attachment. It installs malware that steals login details and facilitates fraudulent payments without the user’s knowledge.

 

 

Key logger

A key logger is malware that records keystrokes, often installed via email or downloads, allowing cybercriminals to capture and exploit sensitive information.

 

 

Spyware

Spyware is malicious software that secretly collects sensitive data from a business’s computer, enabling fraudsters to access bank accounts and perform unauthorised transactions.

 

 

Fraud Scams

Fraud scams

Fraud involving a change of account details uses fake attachments to notify victims of account or banking changes, tricking them into believing the notification is for legitimate business purposes.

 

 

Internal fraud

Internal fraud occurs when employees abuse their position of trust and authority for personal gain. They then commit fraudulent or deceptive actions against clients or the business.

 

 

Business email compromise

Business email compromise (BEC) is a type of cybercrime through which criminals illegally access an email account and communicate as if they are the actual user. It’s a sophisticated scam targeting both businesses and individuals who perform transactions.

 

 

Deposit and refund scams

Fraudsters commit deposit and refund scams by placing orders with fake proofs of payment. They then request false cancellations and refunds before the funds have cleared.

 

 

Advance fee fraud

Criminals advertise goods or services at artificial below-market prices while pressuring victims for upfront payment. Once received, they either vanish or extort additional funds.

 

 

Invoice fraud

Invoice fraud occurs when criminals impersonate suppliers to submit fake invoices with false account details, which aims to misdirect payments.

 

 

Advanced Fraud Techniques

Remote desktop protocol attacks

Remote desktop protocol attacks exploit security weaknesses to gain remote access to users’ computers. They pose a major threat, including potential abuse by internal technical support staff.

 

 

Deepfake attacks

Deepfake technology enables criminals to impersonate individuals by using artificial intelligence (AI) to mimic voices and bypass voice recognition security. These attacks highlight the need for multi-layered protection.

 

 

Financial Document Fraud

Incorrect and fraudulent bills of lading

Fraudsters forge trade documents like bills of lading to steal cargo. They pose as the consignee or falsify delivery rights to claim goods illegally.

 

 

Fraudulent guarantees

Fraudulent guarantees misrepresent financial strength, collateral or creditworthiness to deceive banks or institutions into approving unauthorised financing or transactions

 

 

Letters of credit

A letter of credit is a bank-issued financial instrument. It serves as a guarantee of payment from the buyer to the seller, provided that the terms and conditions of the letter of credit are met.

 

 

Learn more about fraud in our financial security articles

While fraud is a complex issue, fraud prevention is not. Equip yourself with useful information to ensure your financial security.

social-engineering-thumb

Social engineering: How attackers manipulate

Social engineering involves tactics used by cyber criminals to trick individuals into revealing sensitive information or performing actions that lead to account takeovers or identity fraud. Learn how these manipulative techniques work and how to protect yourself.

phishing-thumb

Phishing: Don’t take the bait

Phishing is a deceptive tactic where attackers impersonate trusted entities to steal personal information like passwords or financial details. Stay vigilant against fraudulent emails and messages designed to trick you into giving up sensitive data.

spear-phishing-thumb

Spear phishing: Targeted attacks on your inbox

Spear phishing is a more personalised form of phishing, where attackers craft convincing messages aimed directly at you. These attacks are designed to steal sensitive information by pretending to be someone you know or trust. Learn how to spot and avoid these targeted scams.

If you suspect fraudulent activity on your
accounts, contact our team of experts:

Fraud Hotline:

0800 205 055

Fraud Department email:

cibfraud@absa.africa

To assist us in investigating any fraud reports,
please provide the following:

  • SAPS case number, e.g. Johannesburg SAPS case: 535/09/2016
  • Affidavit
  • Any relevant information you may have, such as: The email purporting to be about an account detail change; Documents purporting to be about an account detail change; and Communications, internet pages or links received relating to account detail changes.