{"id":14670,"date":"2017-10-04T17:01:44","date_gmt":"2017-10-04T22:01:44","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=14670"},"modified":"2019-01-03T15:52:18","modified_gmt":"2019-01-03T20:52:18","slug":"how-hackers-are-capitalizing-on-direct-deposit-accounts","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/how-hackers-are-capitalizing-on-direct-deposit-accounts\/","title":{"rendered":"How Hackers Are Capitalizing on Direct Deposit Accounts"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Direct deposit is a common practice in today\u2019s world, and it\u2019s how the majority of Americans prefer to be paid for their work. The National Federation of Independent Business (NFIB) estimates that nearly 60% of all employees use direct deposit to receive their pay check. On top of that, more than 90 percent of social security checks are paid via direct deposit. Unfortunately, hackers have begun figuring out how to use direct deposit to their advantage, by breaking into people\u2019s accounts and steal money. To help ensure that this doesn\u2019t happen to you, download <strong>dfndr security<\/strong> and take advantage of the <em>anti-theft feature<\/em>:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=hackers_capitalizing_direct_deposit_accounts\"><img loading=\"lazy\" decoding=\"async\" width=\"352\" height=\"57\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/11\/Prancheta-1.png\" alt=\"Get dfndr security now\" class=\"wp-image-19520\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/11\/Prancheta-1.png 352w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/11\/Prancheta-1-300x49.png 300w\" sizes=\"auto, (max-width: 352px) 100vw, 352px\" \/><\/a><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Anti-theft will lock down your phone in the event that it is stolen or lost. These attacks are certainly not something that anyone wants to deal with, especially given the fact that it has to do with one\u2019s personal finances and hard earned money!<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Read More: <\/strong><a href=\"https:\/\/www.psafe.com\/en\/blog\/using-anti-theft-phone-stolen\/\"><strong>Use dfndr\u2019s anti-theft Tools When Your Phone is Stolen<\/strong><\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>How Are They Doing It?<br>\n<\/strong>Hackers are pretty savvy, and that\u2019s the scary thing! They are now seeking those who have direct deposit set up for their paychecks, and they\u2019re creative about how they gain access. To start, they search social media sites and accounts to find out where random individuals work. Once they locate a corporate logo or some kind of inkling indicating where that person works, they use that information to hack their work email address. From there, they figure out who the given payroll provider is.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once hackers have this information, they slyly redirect any payroll or direct deposit emails to a junk folder so that the employee won\u2019t be tipped off about anything being amiss. Then, they request an account change with the payroll provider, swapping the information on the direct deposit set up to route the funds to an alternate account. From there on out, the hacker has easy access to the funds every time that a payment comes through.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Alternatively, hackers are targeting institutions such as the Social Security Administration (SSA), which makes it quite easy for hackers to redirect funds. Users have recently reported that their funds have been sent to hackers after they\u2019ve attained their social security numbers and then used that information to change the direct deposit account via phone or even online. Then, individuals are learning of the account information change after it\u2019s too late, once payday has already hit and they have to follow up with the SSA to get their money back and to attempt to secure their account. This is risky business, and the average loss per case of this occurring is $90,000. That means it\u2019s a lucrative venture for hackers, which motivates them to perform these malicious acts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Don\u2019t fall victim to the latest hacker scam going around. Be sure to protect your personal funds that you receive via direct deposit.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[1673,259,182,218,249,161],"class_list":["post-14670","post","type-post","status-publish","format-standard","hentry","category-security","tag-android-tips","tag-hackers","tag-malware","tag-privacy","tag-security","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/14670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=14670"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/14670\/revisions"}],"predecessor-version":[{"id":19753,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/14670\/revisions\/19753"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=14670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=14670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=14670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}