Phishing: Be aware of scam
Exchange
Symbol | BNR | Buy | Sell |
---|---|---|---|
EUR | 4,9762 | 4,9100 | 5,0200 |
USD | 4,7170 | 4,6600 | 4,7800 |
GBP | 5,9713 | 5,8900 | 6,0500 |
CHF | 5,3244 | 5,2800 | 5,4000 |
SEK | 0,4290 | 0,3950 | 0,4490 |
100 JPY | 3,0277 | 2,9900 | 3,1500 |
* Current account exchange rates
Find out moreNatural person | 1 month* | 3 months |
---|---|---|
EUR | 0,60% | 1,00% |
RON | 5,75% | 6,75% |
Index | Last update | Rate |
---|---|---|
EURIBOR 12 LUNI | 20.11.2024 | 2.44800% |
EURIBOR 6 LUNI | 20.11.2024 | 2.74300% |
IRCC | 01.10.2024 | 5.99000% |
ROBOR 3 LUNI | 20.11.2024 | 5.59000% |
ROBOR 6 LUNI | 20.11.2024 | 5.63000% |
SARON 1MC+M1 | 20.11.2024 | 0.89460% |
SARON 3MC+M3 | 20.11.2024 | 0.05980% |
SARON 3MC+M6 | 20.11.2024 | 0.13080% |
Phishing attack using the logo of Credit Europe Bank (Romania) S.A.
A phishing attack using the logo of Credit Europe Bank (Romania) S.A. is in progress. The people who receive such e-mails - both clients and non-clients of the Bank, are prompted by the text of the e-mail to provide confidential data. For your safety, do not access the links in these emails and do not provide your security data or personal data via email, text messages or phone calls.
The email from the phishing attack looks like this:
From: "Ϲrеdit Eurοре Вank (Romania) S.A." (various email addresses not related to the bank)
Subject: Necessary Action for Your Account at Credit Europe Bank (Romania) S.A. – Update Required
Dear customer,
We are contacting you regarding an important update regarding your account at Credit Europe Bank (Romania) S.A.
Action Required by 11/24/2023.
Although we tried to contact you previously, we have not yet received the necessary information.
As a precaution, certain functionality of your account has been temporarily limited.
To restore full access and avoid any interruptions, please log in and provide the requested details within the next 24 hours:
Log in
Thank you for your prompt attention.
Regards,
Ϲrеdit Eurоре Вank (Romania) S.A.
Copyright © 2023 - Ϲrеdit Eurοре Ваnk (Romania) S.A.
Credit Europe Bank has never requested and will never request personal data from customers following verification or alert messages sent by email, which contain forms or links to other websites and in which customers are asked to fill in personal data or information such as would be access credentials in internet or mobile banking applications, card numbers and related data (PINs, cvv/cvc codes, etc.), account numbers and data of their holders, etc. The official information of the Bank's clients is always carried out in compliance with the rules of personal data protection.
Messages like the one above may appear to be initiated by Credit Europe Bank, but in reality they are carried out by persons who do not represent the Bank and are intended to obtain unauthorized information.
E-mail addresses are obtained by malicious persons (hackers) from the Internet or from other sources, without these persons knowing exactly which bank the holders of those e-mail addresses work with. By sending fraudulent messages in the name of a bank to the acquired email addresses, they hope to find clients of the respective bank, to whom the message may be applicable.
Fraud attempts can be identified by the following signs:
- confidential information is requested (username, password, PIN code, card series, email address, phone number, customer code, etc.)
- an urgent response must be sent
- e-mail messages include web addresses, similar to those owned by various legal organizations, but with slightly modified names
We remind you that the data requested by attackers (username, password, PIN code, card series, CVC, email address, phone number, customer code, etc.) are intended exclusively for users of banking services and must not be disclosed for any reason.
We also recommend that you be careful on which sites you enter your card data to make payments.
In order to prevent any fraud, we recommend that you do not listen to such phishing messages. If you are a customer of Credit Europe Bank and you have already replied to such a message, we recommend that you contact us urgently using the contact details on our bank's website, CEBLine available non-stop at tel.: 0801.000.000 ( callable number from the Telekom Romania network) or 0750.000.000 and 0724.100.000.
Phishing - what does it mean
Phishing is usually done through email, ads, or by sites that look similar to sites you already use. For example, someone who is phishing might send you an email that looks like it's from your bank so that you'll give them information about your bank account.
It's important to remember that we'll never send you text messages or emails that ask you to confirm, update or disclose personal or banking information. You can reduce your risk of being scammed by paying close attention to messages or emails.
Common types of phishing
-
Phishing related to cards enrollment in Apple Pay or Google Pay applications
In this case, the fraudsters send to the cards’ users an e-mail that simulates, in a very truthful way that it would come from the issuing bank of their card. By this email the cards’ users are informed either that they have to update their data or that their accounts have been blocked due to the application of new security measures, the users being invited to access a link to solve the situation.
Thus, the user is directed to a fake page, which mimics the website of the issuing bank, in which he is asked for the security elements of the card and other information (e.g. security codes sent via SMS to customers) that allow them to enroll cards in the application Apple Pay / Google Pay (wallet), installed on fraudsters' phones.Generally, at this stage of the card enrollment procedure, the issuing bank sends the correspondent security code in a generic SMS message. It is extremely important that users read these SMS very carefully in order to identify those fraudulent cases and not to transmit to third parties the security codes received via SMS, respectively not to enter them in the fake pages. Once the security code is entered on the fake page, it is sent in real time to the attackers, who complete the card enrollment procedure and gain full access to the available funds related to that card, which they use immediately.
This pattern of fraud was also encountered in the case of marketplace platforms, in the sense that the attackers requested the above information under the pretext of paying for products sold through marketplace platforms, the result being the same, the enrollment of cards in electronic wallets controlled that are by attackers.
-
Phishing for activating new internet / mobile-banking applications and the activation of tokens used for authentication / authorization
This type of fraud is a version derived from the above version, with the difference that the attackers do not seek to enroll the card on wallet applications, but to gain access to the internet banking or mobile banking application of the payment service user, by activating the tokens used for authentication/ authorization (software type) on their phone. However, the mode of operation is almost similar.
In this case, too, it is extremely important that users read carefully these SMS messages that contain security codes to identify those fraudulent cases and not to enter unsolicited security codes in various applications.
-
Friendly fraud and card-on file transactions
Card-on-file operations involve the enrollment of the card in a merchant's system, by entering the data on the card at the time of the first payment transaction, the subsequent payment transactions being automatic based on the mandate offered to the merchant during the card's enrollment. Such transactions are usually made to merchants that offer games / applications / monthly subscription services to streaming services / etc., generally being initiated by customer or the family members of the payment service user, but they can also be fraudulent transactions such as because of frauding of the accounts held with such traders.
Generally, in the first stage of the card enrollment procedure, the issuing bank sends the respective security code in a generic SMS message. It is extremely important that users read these SMS very carefully in order to identify those fraudulent cases and not to transmit to third parties the security codes received via SMS, respectively not to enter them in the fake pages.
Please note:
- Credit Europe Bank does not carry out any transactions in Bitcoin or other cryptocurrencies (e.g. for opening accounts or in¬ternational payments) and we do not offer (private) numbered bank accounts or payment services in connection with online auctions (e.g. Ebay).
- Please be very careful with e-mails on the subject of Corona and do not click on a link or log into your customer account using a button at the end of the e-mail.
- Please do not download any attachments. They could be malware.
- In general, act cautiously with e-mails from unknown senders.
- Check that the email address and the sender name match.
- Check if the email is authenticated.
- Please do not feel threated to click a link or open an attachment. Both can carry harmful content.
- Even in e-mails from senders who appear to be familiar to you, watch out for spelling errors and formulations that appear unnatural, as well as for foreign special characters. These are often phishing attempts.
- Check your account statements regularly and inform your account-holding bank immediately in the event of irregularities.
- Block your online banking access or your credit card immediately if something appears suspicious to you.
- When contacted by an unsolicited third party, it's better to be over-cautious. Contact the organization directly using a phone number from their website (not the email or message) before you reply
- Only use reputable official sources when looking for information. Use the information pages of well-known authorities and institutions.