More And More Social Engineering Fraud Mode, BRI Explains How To Anticipate It
PT Bank Rakyat Indonesia (Persero) Tbk or BRI continues to educate its customers (photo: twitter @BANKBRI_ID)

أنشرها:

JAKARTA - PT Bank Rakyat Indonesia (Persero) Tbk or BRI continues to educate its customers to increase their vigilance and avoid all types of fraudulent modes/bank crimes.

As a form of effort to fight social engineering and educate customers, BRI shares various modes of banking crime, especially social engineering along with anticipatory measures to deal with them. The modes of fraud/social engineering (speed) are as follows:

1. Fake Marriage Invitation In The Form Of APK Files

This fraud mode occurs through a request to click on an APK-format wedding invitation file via the WhatsApp chat application (WA). Through the (unofficial) fraudulent application, it makes the victim consciously give permission to allow the application to access SMS and other applications on mobile phones. Crime can also occur because of personal and confidential banking transaction data (OTP code) sent via SMS. As a result, banking transactions can run successfully.

2. Fake Ads on Social Media

This mode is in the form of fake accounts on social media in the name of BRI. The account shares advertisements with such characteristics, unusual and non-blue tick account names; visual views are not credible ranging from poor image quality, unprofessional writing, and suspicious bio links; and if clicking the listed link it will be directed to register and fill in confidential banking data such as card numbers, PIN, OTP, etc.

3. Link Tariff Change Mode

Like the mode of fraud with APK-formed files, this type of fraud also uses the WhatsApp (WA) platform. The difference is, the files sent are in the form of announcements/notifications for customers to make changes in tariffs. Usually, the announcement contains threats that make customers restless / scared.

4. Photo files in the form of a fake APK

Fake files are similar to the mode of wedding invitations, but this time they are in the form of an image or image in the form of an APK file. Usually, the perpetrator claims to be a package delivery courier and seems to provide information that the package can be seen after clicking the file with the APK format but looks like the photo file.

Related to this, BRI Corporate Secretary Agustya Hendy Bernadi revealed that BRI will always provide education on various anticipatory steps to combat soceng.

"BRI as a bank that is very concerned about the security of transactions, its customers always urge and educate their customers to avoid becoming victims of this crime mode. Through this campaign, it is hoped that public awareness and vigilance will increase, especially in recognizing Soceng's modes and practices," he said.

The ways to anticipate these various modes include:

1. Be alert when there is a message from an unknown number including APK-formed links/files.

2. Identify files accompanied by announcements/notifications in the form of threats and make you panic, restless, or afraid.

3. Not just click the link/file sent.

4. If it has been clicked and installed the file, quickly turn off the cellular data connection and WIFI on the device.

5. Clear the data and cache of the application.

6. Uninstall the application.

7. Change usernames, PINs and mobile banking passwords including personal emails.

8. It is safer to reset cellphones to factory mode or factory mode.

9. Contact BRI at 1500017 to report indications of fraud modes that occurred.


The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)