If it seems as though scammers create new scams every day, you’re correct. Formjacking is a new take on a familiar con. Similar to a method that scammers have been participating in for years, formjacking can happen to you when the scammer is millions of miles away. Let’s explore how formjacking occurs on the web, steals your data, how consumers are at risk, and how you can protect yourself and your financial accounts.
What is Formjacking?
How Does Formjacking Work?
Inevitably, most people use payment information online often. You might shop online, access your bank or financial information, or even log in to pay a credit card. You likely use your credit card information to pay for food delivery orders and when using commercial websites. Once a hacker finds a vulnerability in a site or system, they attack. They insert malicious codes (via a computer virus, backdoor program, online worm, spyware, trojan horse, etc.) and then collect information.
Each time the hacked website collects payment and card details (or home or billing address, name, or phone number) the information and transmitted. Where does it go? To the server of the hacker(s) and that data is then stolen and used for identity theft or fake credit card purchases. Other times, hackers only collect the data and sell it to criminals on the dark web. The result for the consumer is unfortunate, either way. Consumers likely won’t even know their information was compromised until it is too late!
How to Protect Yourself from Formjacking Attacks
It takes more than common sense to avoid formjacking. This is because much of it is out of our individual control. People often call it a “silent” crime, as hackers don’t advertise their attacks. However, if you pay attention to blogs, like Social Catfish or the FBI, that report on breaches…. you can catch the hack fast and protect your accounts.
These are the 4 tips you should begin doing immediately!
- Don’t Use Shared Public Wifi: A hacker may access your device or computer through shared WiFi. They can hack into your system and locate and steal your information.
- Only Use Trusted Sites (Avoid Unknown Third Party Sales Sites): While even legitimate sites, such as credit card sites and shopping sites, experience major systemic breaches, these are some examples of better quality sites that have more protections and monitoring. Shop through those trusted sites first.
- Monitor Your Credit: Look at your credit reports and (also!) your monthly statements. Even though it may seem tedious, read your credit statements line for line. Some hackers set recurring payments on your accounts and you won’t know… unless you look! Other times, people’s entire credit is hacked through identity theft and their credit score destroyed by hackers. A credit report check is, therefore, a needed habit for consumers.
- Use 2 Factor Authentication: If someone hacks your device or accounts, two-factor authentication can keep them from getting all your information and accounts. Sign up for alerts when your credit or bank cards are used… or password changes made.
If someone gets ahold of your private information, how quickly would you know? Most consumers don’t realize right away. Worse, if a hack, breach, or formjacking incident was to occur… a scammer might be able to search your name in Google and find out answers to your account security questions.
They use this to hack into multiple accounts. Search your name first, followed by your phone number, username, photograph, and email address. See what information is public and follow your own web trail… then do the same for your family members or close friends.
Social Catfish is Here to Help You!
You should be in control of your private information. Social Catfish’s high proprietary algorithm lets you know what any stranger could find out. You can perform a reverse search on yourself by entering your name, email address, phone number, social media username, or image in the search bar below.