Warning - Beware of "phishing" attempts followed by "vishing" (telephone phishing) with "spoofing" (identity theft)!
Fraudsters do not hesitate to pose as employees of BIL or legitimate institutions (while usurping the bank's or institution's telephone number) in order to collect your data/identifiers and use them for fraudulent purposes.
Remember that BIL will never ask you for your data/identifiers.
A BIL employee will not ask a delivery person to collect bank cards from your home address!
Warning - Beware of tempting offers!
This festive season, be extra vigilant when faced with tempting offers on the Internet. Take the time to find out information about the seller and read their reviews before making any payment.
The results that search engines offer may send you to a fraudulent website designed to scam you.
Recently, a phishing link even managed to get listed as the top result, even though it was actually an advertisement:
To avoid any problems:
Please share this information with your friends and family!
Phishing is the practice of sending an email or SMS (smishing) with the intent of stealing personal information.
The fraudster sends you a message that looks as if it comes from a trustworthy body such as a bank, telephone provider, postal service, etc. You are asked to click on a link that redirects you to a fraudulent site (that looks like the original) where you will enter your data.
Fraud number 2 is based on fake Microsoft support and uses a telephone call to try and manipulate you (vishing).
You receive a call from someone pretending to be a Microsoft employee telling you that malware has been identified on your PC or that a Windows upgrade needs to be carried out urgently. On other occasions, your screen will suddenly turn blue and a warning message will ask you to contact a support number.
In both cases, the technical support person who replies will appear extremely sympathetic and do everything to help you. They will enlist your help to install an application that enables them to take control of your PC in order to fix the (fake) problem.
You then have to pay a few euros and the fraudster uses the opportunity to access your bank details and/or install malware.
This involves the fraudster observing your PIN over your shoulder when you are withdrawing money from an ATM.
The fraudster then proceeds to distract you (getting very agitated, pointing out that you’ve dropped some money, for example) and discretely steals your card and makes you believe that it has been swallowed by the machine.
The fraudster will hack an email account to find any past invoices. If the email account belongs to a company, the hacker will simply take a real invoice and change the IBAN number.
The person receiving the bill is not suspicious as they know the sender and think they’re paying a legitimate bill from a supplier, or for a holiday reservation or mobile phone service, etc.
Investment fraud consists of offering a financial investment that guarantees extremely lucrative returns. You are sucked in by advertising on social media or via email and visit commercial sites that look very real but are in fact fakes. They may be cryptocurrency exchanges, trading sites etc.
Don’t be taken in by offers that are too good to be true, as they are probably fake!