Saraswat Bank - Safe Banking

A Satark Banking Initiative

Types Of Attacks

Know what to do on noticing anything suspicious. Please note that the information provided here is generic in nature and for informational purposes only.

Phishing

Phishing is a type of attack which attempts to steal sensitive information like user login credentials, credit card number, etc. either through an email or through a pop-up window or a fake website. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication. The emails may ask the recipient to click a link and provide confidential information like account number, username.. Know More...

Vishing and SMShing

Vishing is a grouping of “voice” and “phishing”. Vishing is like another Social Engineering attack phishing - the major difference being mode of attack. While phishing involves use of emails to trick a target into providing target’s personal details; vishing involves voice or telephone services. A typical vishing call involves an imposter, posing as an official from bank or another organization... Know More...

SIM Swap Attack

As most of the account details is connected to your registered mobile number, attacker tries to gain access to the SIM card or obtain duplicate SIM card for carrying out transactions on such duplicate SIM. Using SIM swap technique, the attacker gathers personal information by practices such as phishing, vishing, smishing, and more... Know More...

Money Mule

Money Mule is a term used to describe victim who is duped by fraudsters into laundering stolen/illegal money via victim’s bank account. Know More...

Juice Jacking

Juice jacking is a type of attack involving a charging port from where data is stolen from the connected device; there are crawlers that can search a phone for personally identifiable information (PII), account credentials, banking-related or credit card data. These crawlers can copy all information to attackers’ own devices. Know More...

ATM Card Skimming

In this type of attack, the attacker targets ATM machines and places skimming devices which are used to steal data from ATM / Debit / Credit cards. Know More...

Scam through QR (Quick Response) Code

A QR code (Quick Response Code) consists of several black squares and dots which represent certain digital information. When a smart device scans this code, it translates that information into something that can be easily understood by the device. Know More...

Scam through Search Engines

If an individual uses search engine for obtaining contact details of bank, financial institutions, etc., he/she may end up contacting unknown / unverified contact numbers displayed on the search engine. These contact details could be camouflaged by fraudsters to attract their victims towards them. Know More...