BASSSecurity Tips
BASSSecurity Tips
BASSSecurity Tips
MCB Bank provides safe and secure banking channels to its customers but is also aware of many
externalities of the payment ecosystem which includes threats like card frauds, skimming, phishing,
vishing and others. All such risks keep evolving and pose a continuous threat to our customers. Though
electronic payments have become increasingly complex and advanced, Identity theft still remains at the
core, materializing into fraud risk. Identity theft occurs when someone steals personal and financial
information of another entity to commit a fraud or other criminal act for economic gain. Like other financial
crimes/ frauds, identity theft carries serious and pervasive threat for the financial institutions and its
customers alike.
“BE AWARE, STAY SAFE” is a public service initiative of MCB Bank, intended to educate Banking
Consumers and Pakistanis in general about new age fraud tactics, promote safe electronic banking and
prevent possible lapses. The initiative is aimed to raise awareness about how to keep oneself safe from
falling prey to a range of fraud types asking for your personal and financial information such as pin code,
CVV, OTP etc.
MCB Bank through this initiative is empowering the general public to fight new age fraud types. As a
leading national entity, we operate in every corner of Pakistan and are deeply concerned with the
changing landscape of new age fraud types and are constantly working towards enabling our customers
to be more aware about their environment and associated fraud risks.
not be based on guessable information such as your name, personal telephone number, birthday
or other personal information;
not be a dictionary word;
be kept confidential and not be divulged to anyone;
be memorized and not recorded anywhere e.g. sticky notes;
be changed regularly, or when there is any suspicion that it has been compromised or impaired;
not be same for different websites, applications or services, particularly when they relate to
different entities;
avoid using the same details that you use to access other services such as email, other Internet
sites/ISPs, ATM PIN, or Phone Banking TPIN;
for better security, it is highly recommended to adopt 8-16 alpha-numeric character set consisting
of both letters and numbers, lowercase and uppercase, e.g. IcneL9305.
not contain 3 or more consecutive identical characters, e.g. "aaa" or "111", etc.
not contain 4 or more consecutive identical characters as part of your Password, e.g. "1234" or
"abcd", etc.
Discard and report at help desk regarding any email that asks for your personal information such
as Full Name, DOB, Bank Account Number, CNIC, Card number, and CVV code. This seemingly
benign information can be misused for un-authorized access to your accounts;
Fake e-mails entice you to respond quickly; don’t become preys to them;
Always check for the email address despite of display name, display name can be easily
changed, email address can’t be!
Don’t open link in the email, if essentially required, browse google and get the actual link
Fake Link
fake link behind text will be shown when hovering your mouse over it
Verify attachments (scan with an antivirus) before opening because attachments may carry
viruses
Be aware of “Bcc:”
Criminals know that today it is much harder to break into networks, applications, and physical facilities. So
by default, the human being has now become the “weakest link” in security.
Social engineers (attackers) leverage trust, impersonate (pretend to be someone else), get knowledge of
internal processes, and sometimes threats, to capture unauthorized information or access. It is all about
taking advantage of others to gather information and infiltrate an organization.
Examples of Social Engineering
The attacker poses to be a legitimate user or superior manager: “This is the ROM/Vice President
and I need…” In this case, the administrator or an end user may feel threatened by the caller's
authority and may provide the information out of fear;
The attacker may gain the user's trust by posing as a technical staff member offering help to fix a
computer problem;
o “Hi, I’m Farrukh, from the service desk; please confirm your user name & password” “Hi, I
received your request to change your password, please tell me your previous password
so do I help you.”
You need to call our 24/7 helpline 111-000-MCB (622) from your system updated number in order to get
your email/mobile number updated.
Pretexting is the act of creating and using an invented scenario (the pretext) to persuade
someone to release information or perform an action and is typically done over the telephone.
Spear phishing targets specific groups of people or specific titles and designations such as
CEOs. One major spear phishing attack offered company CEOs useful legal information and
actually installed a virus on the user’s machine!
Vishing scams use phone calls instead of email - and VOIP phones are favored because they
are hard to trace and track.
SMSishing scams use SMS text messages instead of phone calls or email messages.
Shoulder surfing refers to using direct observation techniques such as looking over someone's
shoulder to get information. Shoulder surfing is particularly effective in crowded places.
Dumpster diving is the practice of searching through commercial or residential trash to find
useful items that have been discarded by their owners.
Spoofing attack is a situation in which a person or program illegally modifies the source address
or other information to avoid being traced. For example, Facebook is one of the most spoofed
websites in the world which has several security loopholes.
Spam refers to any unwanted email or SMS message you receive. Most spam is simply
correspondence which you didn’t request for, mostly advertising and marketing materials. It is
annoying, but they are no real security threats as long as you do not respond or click on any links
provided in unsolicited emails.
ATM Scams are a common social engineering technique. One simple trick is to manipulate the
ATM machine to malfunction and capture your card. A nearby stranger says to you, “the same
thing just happened to me. Here, let me help.” In the process, the stranger tricks you into sharing
your ATM PIN. After you leave, he will retrieve your “stuck” card and empty your account.
Know how to detect phishing attempts and beware of suspicious email attachments;
Ask questions and do not trust strangers;
Criminals are targeting social networking sites such as Facebook™, Twitter, MySpace and Bebo
to steal personal information - so be careful with what you share online;
Don't publish details that can identify you. They include birthdates, phone numbers, addresses
and full names;
Limit your profile. Consider restricting your profile to friends and family only;
Make sure you know & trust the person before accepting friend request on social networking
sites;
Shred personal information and do not leave it easily accessible on your desk / printer, this may
be used to steal your account information;
Make sure you understand the privacy policy of each site as some may sell users' email
addresses, leaving you susceptible to phishing and spam;
Do not let strangers come near you while at the ATM keypad while entering your ATM PIN;
Don't be caught by the spammers' favorite tricks, such as the use of subject headings like
"Remember me?" that try to trick you into thinking you should know the sender;
Be cautious when opening emails and email attachments, especially when receiving emails from
strangers;
Simply delete emails from unknown senders or dubious sources because your reply or click on
any link in the email message from an unknown source, you are confirming to the unknown
sender that your email address is a valid one;
The terms malware and spyware refer to any piece of software installed on your computer without
your permission. Malware refers to software that causes damage to your computer;
Spyware gathers information from your computer without your knowledge;
Adware installs software that displays advertisements on your computer;
Trojans specifically refer to software that, once installed, secretly installs another piece of
software;
Once installed, the software collects information or interrupts traffic to web sites and other critical
services.
Most of the time, customers install malware or adware by accident when they click on a link they find in an
email message or web page. Malware or spyware may also be unknowingly installed with software from
an unreliable source. Such malware or spyware may even be installed together with dubious anti-virus
software.
Real protection from malware and spyware require both technology and knowledge on what to look out
for when you use the Internet.
Man-In-The-Browser Attack
Please be highly aware of a recent online threat known as a Man-In-The-Browser (MITB) attack,
where an attacker takes control over a customer's connection and transmits counterfeit screens
to the customer in attempt to capture and manipulate customer data;
A frequent MITB attack scenario involves the attacker taking control over a customer's login
session. The attacker transmits screens similar to the online banking screens requesting the
customer to wait while their details are being verified.
During this, the attacker would initiate a request for adding payee or updating personal
information while the customer's account is being compromised.
An SMS containing a One-Time Password (OTP) is sent to the customer's mobile phone as part
of the process. More counterfeit screens are transmitted to the customer to prompt the customer
to key in the OTP in order for the attacker to proceed with payee addition and/or personal
information update;
Stay vigilant, and do not proceed if you notice an unusual screen or message during your online
banking login session.
Do not act on an SMS containing an OTP that you have not requested for, review your existing
payee list for any unauthorized additions.
Viruses are small software applications designed to cause damage to the information on your computer.
They may also try to gather sensitive information which can allow others to gain access to your accounts.
Like viruses passed between humans, computer viruses usually spread from customer to customer.
Some viruses are malicious, designed to corrupt files and cause problems. Some may attempt to access
your email or contacts and try to replicate your email identity, while others may look for sensitive
information stored on your computer.
Most viruses are spread through emails or shared files. When a customer clicks on a link, thinking that
they’re opening a photograph or website, the virus gets activated and goes to work right away, causing
trouble.
Your best defense against computer viruses is to keep your anti-virus software updated regularly.
Smartphones make up an integral part of our lives these days. With mobile payments and banking
becoming increasingly popular, it's important to apply the same security measures to your mobile phone
as you would to your computer. In the wrong hands, your mobile phone could give the wrong person
access to your accounts and ultimately your money. Keeping your phone updated and secure is the first
step towards real mobile security.
In case of any personal fraud related issues like user-id locked, loss of security credentials, fraud or
identity theft, please contact by emailing us at [email protected] or calling us at +92-21-111-000-622 or
+92 0800 62272.
Call center standard verification process is followed for re-authentication of internet banking users.
For any complaints, please contact MCB Bank helpline (111-000-622) or your branch.
_______________________________________