Skip to main content
creditcard

Cybersecurity and Fraud Prevention

Here at the State Bank of Toulon we spend considerable time and effort ensuring that your data remains safe and secure.  Operational controls, monitoring, and cybersecurity are a large part of what we do on a daily basis, but what can you do to protect yourself.  By clicking on the boxes below you can find out what you can do to protect yourself from falling victim to the numerous scams and cyber-attacks we see every day.  The information below is gleaned from the FBI as well the FTC and the numerous experts in fraud prevention and cyber-defense they employ.

Lost or Stolen Debit Card

Oh No you've lost your debit card!! What should you do?!

Don't panic we have some simple steps you can follow to protect your accounts.

  1. Log in to the Brella app on your phone and put a block on your card.  The Brella app from Shazam is a tremendous resource for protecting your debit card.  You can find out more about it HERE.
  2. If you do not have the app, contact us here at the Bank.  We can put a temporary block on your card while you look for it, we can also look to make sure no transactions have been attempted since it was lost or stolen.
  3. If the Bank is closed, you can call Shazam directly and they will block your card.  The number for Shazam's Lost or Stolen card department is 1-800-383-8000.
  4. Once you have found your card you can call the Bank or use the Brella app to have it re-enabled.
  5. If your card was stolen the Bank will issue you a new Debit card with a new card number.  Even if stolen cards are recovered it is likely that whoever stole it copied all of the card information for use later.

Afterward you will want to keep a close eye on your accounts for a while to make sure you don't see any unknown or unusual transactions.  If you do spot something, call the bank immediately.  If it is outside of normal banking hours call the Shazam Fraud Management line at 1-866-508-2693 (we highly recommend you save this number in your phone).


Cybersecurity

Cybersecurity is one of the most important aspects of doing business in today's digital economy.  There are threats on almost every digital platform that you use, and it is critically important that you know how to protect yourself from these threats. 

The Cybersecurity & Infrastructure Security Agency (CISA) recommends every consumer follow four rules for better security online.

Implement multi-factor authentication on your accounts

Commonly called multi-factor authentication (mfa) or two-factor authentication (2fa) this can be thought of simply as something that you know (most commonly a password) and something that you possess (a fingerprint, an authentication app on your phone, or a Face ID).  A password simply isn't enough to keep you safe online.  By implementing a second layer of identification, like a confirmation text message or email, a code from an authentication app, a fingerprint or Face ID you are giving us at the bank or any other site you are logging into the confidence that it really is you.  Multi-factor authentication can make you significantly less likely to get hacked.  So, enable multi-factor authentication on your email, social media, online shopping, and financial services accounts.  And don't forget about gaming and streaming entertainment services as well, particularly if you have a payment card attached to the account!

Update your software

Bad actors will exploit flaws in systems that have not received updates.  Update the operating system on your mobile phones, tablets, and computers.  Also be sure to update your applications - especially the web browsers - on all your devices too.  In fact, you should leverage the automatic updates available for all of your devices, applications, and operating systems.

Think before you click

More than 90% of successful cyber-attacks start with a phishing email.  Phishing is a cybercrime in which a target or targets are contacted via email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.  The information is then used to access important accounts and can result in identity theft and financial loss.

Common features of phishing emails include:

  1. Too Good To Be True - Lucrative offers and eye-catching or attention-grabbing statements are designed to attract people’s attention immediately. For instance, many claim that you have won an iPhone, a lottery, or some other lavish prize. Just don't click on any suspicious emails. Remember that if it seems to good to be true, it probably is!
  2. Sense of Urgency - A favorite tactic amongst cybercriminals is to ask you to act fast because the super deals are only for a limited time. Some of them will even tell you that you have only a few minutes to respond. When you come across these kinds of emails, it's best to just ignore them. Sometimes, they will tell you that your account will be suspended unless you update your personal details immediately. Most reliable organizations give ample time before they terminate an account, and they never ask patrons to update personal details over the Internet. When in doubt, visit the source directly rather than clicking a link in an email.
  3. Hyperlinks - A link may not be all it appears to be. Hovering over a link shows you the actual URL where you will be directed upon clicking on it. It could be completely different, or it could be a popular website with a misspelling, for instance www.statebankoftuolon.com - the "o" and '"u" are transposed in Toulon.
  4. Unusual Sender - If you get an email from Microsoft the senders email address should not be @gmail.com.  If the email of the sender is not displayed, you can hover your mouse over the sender's name and the email with pop up.  Whether it looks like it's from someone you don't know or someone you do know, if anything seems out of the ordinary, unexpected, out of character or just suspicious in general don't click on it!

Use strong passwords, and a password manager

A strong password is at least 12 characters ideally it will be 15.  It is not a dictionary word.  It will contain upper- and lower-case letters along with numbers and special characters.  Once you develop a good password remember do not use the same password for everything.  Modern password managers such as KeyPass or Keeper can generate secure passwords for you and store them in a secure password vault.  Most importantly Do Not Share Your Passwords!

You can report phishing attempts and other cybercrime directly to the FBI at:        Internet Crime Complaint Center(IC3) | Home Page

Ransomware

Ransomware is a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. 

Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.  You can unknowingly download ransomware onto a computer by opening an email attachment, clicking an ad, following a link, or even visiting a website that's embedded with malware.

Once the code is loaded on a computer, it will lock access to the computer itself or data and files stored there. More menacing versions can encrypt files and folders on local drives, attached drives, and even networked computers.  Most of the time, you don’t know your computer has been infected. You usually discover it when you can no longer access your data or you see computer messages letting you know about the attack and demanding ransom payments.

Report Ransomware 

  • Report ransomware attacks to ic3.gov, the FBI’s Internet Crime Complaint Center (IC3).

Protect Yourself 

The best way to avoid being exposed to ransomware—or any type of malware—is to be a cautious and conscientious device user. Malware distributors have gotten increasingly savvy, and you need to be careful about what you download and click on. 

Other tips:

  • Keep operating systems, software, and applications current and up to date. 
  • Make sure anti-virus and anti-malware solutions are set to automatically update and run regular scans.
  • Back up data regularly and double-check that those backups were completed.
  • Secure your backups. Make sure they are not connected to the computers and networks they are backing up.
  • Create a continuity plan in case your business or organization is the victim of a ransomware attack.

If You're a Victim 

The FBI does not support paying a ransom in response to a ransomware attack. Paying a ransom doesn’t guarantee you or your organization will get any data back. It also encourages perpetrators to target more victims and offers an incentive for others to get involved in this type of illegal activity. 

If you are a victim of ransomware, file a report at ic3.gov.


Business and Investment Fraud

 

Business and Investment Fraud 

Investment or business fraud schemes will try to lure you in with the promise of low- or no-risk investments.  Scammers often ask for upfront cash in exchange for guaranteed future returns—but there is no such thing as a guaranteed return on investment. It's a scam.


Common Schemes 

Advance fee schemes ask you to invest upfront money for a larger return later, such as a loan, contract, or gift.

Nigerian Letter or 419 schemes ask someone to share in a percentage of millions of dollars that the author—a self-proclaimed government official—is trying to transfer illegally out of Nigeria.

Ponzi schemes use current investors' money to pay previous investors. They inevitably collapse.

Pyramid schemes ask you to bring in new investors to make a profit or recoup your investment.

Telemarketing fraud schemes try to steal your money over the phone, whether by telling you won a prize, are in legal trouble, or some other approach.

Protect Yourself 

Report Business and Investment Fraud


Visit ic3.gov, the FBI's Internet Crime Complaint Center (IC3), to report business and investment fraud.

If it sounds too good to be true, it is.

  • Do your homework and thoroughly research any investment opportunity independently of what any salesperson provides you.
  • Never rush into an investment opportunity. If you are rushed or told not to discuss it with others, you're being scammed.
  • There is no such thing as a guaranteed return.

 

Charity and Disaster Fraud

 

Charity and Disaster Fraud 

Charity fraud schemes seek donations for organizations that do little or no work—instead, the money goes to the fake charity’s creator.

While these scams can happen at any time, they are especially prevalent after high-profile disasters. Criminals often use tragedies to exploit you and others who want to help.

Charity fraud scams can come to you in many forms: emails, social media posts, crowdfunding platforms, cold calls, etc. Always use caution and do your research when you're looking to donate to charitable causes.

After a natural disaster or other emergency, unethical contractors and other scammers may commit insurance fraud, re-victimizing people whose homes or businesses have been damaged. Sometimes these fraudsters even pretend to be affiliated with the government, when they are not. If you need any post-disaster repairs, do your research before hiring any contractor.  

Protect Yourself 

The following tips can help you avoid these schemes:

  • Give to established charities or groups whose work you know and trust.
  • Be aware of organizations with copycat names or names similar to reputable organizations.
  • Be wary of new organizations that claim to aid victims of recent high-profile disasters.
  • Do your research. Use the Federal Trade Commission's resources to examine the track record of a charity.
  • Give using a check or credit card. If a charity or organization asks you to donate through cash, gift card, virtual currency, or wire transfer, it's probably a scam. Learn more about this trick from the FTC.
  • Practice good cyber hygiene:
    • Don't click links or open email attachments from someone you don't know.
    • Manually type out links instead of clicking on them. 
    • Don't provide any personal information in response to an email, robocall, or robotext.
    • Check the website's address—most legitimate charity organization websites use .org, not .com.
  • After a natural disaster or other emergency, carefully vet any contractors before hiring them to work on your home or business.

 

Elder Fraud Schemes

 

Common Elder Fraud Schemes 

Scammers targeting elder citizens may employ one or more of the following types of schemes:

  • Romance scam: Criminals pose as interested romantic partners on social media or dating websites to capitalize on their elderly victims’ desire to find companions.

  • Tech support scam: Criminals pose as technology support representatives and offer to fix non-existent computer issues. The scammers gain remote access to victims’ devices and sensitive information.

  • Grandparent scam: A type of confidence scam where criminals pose as a relative—usually a child or grandchild—claiming to be in immediate financial need.

  • Government impersonation scam: Criminals pose as government employees and threaten to arrest or prosecute victims unless they agree to provide funds or other payments.

  • Sweepstakes/charity/lottery scam: Criminals claim to work for legitimate charitable organizations to gain victims’ trust. Or they claim their targets have won a foreign lottery or sweepstake, which they can collect for a “fee.”

  • Home repair scam: Criminals appear in person and charge homeowners in advance for home improvement services that they never provide.

  • TV/radio scam: Criminals target potential victims using illegitimate advertisements about legitimate services, such as reverse mortgages or credit repair.

  • Family/caregiver scam: Relatives or acquaintances of the elderly victims take advantage of them or otherwise get their money.

Protect Yourself 

  • Recognize scam attempts and end all communication with the perpetrator.
  • Create a shared verbal family password or phrase that only you and your loved ones know.
  • Search online for the contact information (name, email, phone number, addresses) and the proposed offer. Other people have likely posted information online about individuals and businesses trying to run scams.
  • Resist the pressure to act quickly. Scammers create a sense of urgency to produce fear and lure victims into immediate action.
  • Call the police immediately if you feel there is a danger to yourself or a loved one.
  • Be cautious of unsolicited phone calls, mailings, and door-to-door services offers.
  • Never give or send any personally identifiable information, money, gold or other precious metals, jewelry, gift cards, checks, or wire information to unverified people or businesses.
  • Make sure all computer anti-virus and security software and malware protections are up to date. Use reputable anti-virus software and firewalls.
  • Disconnect from the internet and shut down your device if you see a pop-up message or locked screen. Pop-ups are regularly used by perpetrators to spread malicious software. Enable pop-up blockers to avoid accidentally clicking on a pop-up.
  • Be careful what you download. Never open an email attachment from someone you don't know, and be wary of email attachments forwarded to you.
  • Take precautions to protect your identity if a criminal gains access to your device or account. Immediately contact your financial institutions to place protections on your accounts, and monitor your accounts and personal information for suspicious activity.

How to Report 

If you believe you or someone you know may have been a victim of elder fraud, file a complaint at the FBI’s Internet Crime Complaint Center at ic3.gov.

When reporting a scam—regardless of dollar amount—include as many of the following details as possible:

  • Names of the scammer and/or company
  • Dates of contact
  • Methods of communication
  • Phone numbers, email addresses, mailing addresses, and websites used by the perpetrator
  • Methods of payment
  • Where you sent funds, including wire transfers and prepaid cards (provide financial institution names, account names, and account numbers)
  • Descriptions of your interactions with the scammer and the instructions you were given

Whenever possible, you should keep original documentation, emails, faxes, and logs of communications.

Cryptocurrency Investment Fraud

Cryptocurrency investment fraud, which the media commonly describes as "pig butchering," is one of the most prevalent and damaging fraud schemes today.

Scammers, through various means of manipulation, convince victims to deposit more and more money into financial “investments” using cryptocurrency. In truth, these investments are fake; all victim money is under the control of—and ultimately stolen by—criminal actors, usually overseas. As a result, victims typically lose all money they invested.  

Learn more about cryptocurrency investment fraud and the process scammers use to find potential victims. If you believe you've been a victim of this scam, stop sending money to the scammers and file a report at ic3.gov.


The Process 

1. The Selection of the Victim

Scammers use a variety of methods to initially lure and contact victims. Here are some of the most common methods: 

  • Social Media: Scammers use social media to reach out to victims directly—by messaging them—or indirectly through deceitful job advertisements or investment opportunities that can be found on all main social media platforms.

  • Texting: Scammers text victims pretending they misdialed a number, sending a photo of themselves, or saying they work for a company that is hiring for job opportunities. 

  • Dating Sites: Scammers create thousands of fake dating profiles on all common dating sites and match with victims to establish a romantic relationship based on trust. 

Bottom Line: If you met someone through a method described above, and that person pitched an investment opportunity that involved cryptocurrency—beware: this is likely cryptocurrency investment fraud.

Report Cryptocurrency Investment Fraud


Visit ic3.gov, the FBI's Internet Crime Complaint Center (IC3), to report cryptocurrency investment fraud scams.

Red Flag: Once the victim agrees to continue communicating, it's common for the scammer to ask to move their messaging to another platform, including WhatsApp or Telegram—e.g., "Hey, do you have WhatsApp, let’s talk there." They may use a different phone number from the one the victim may have been contacted from initially.

For variants involving a professional relationship only, scammers may invite victims to join chat groups, where there are often many others in the same chatroom—most of whom are scammers impersonating "happy" clients.

2. The Building of Trust

Once initial communication has been established, scammers seek to deceive victims about who they are (their "persona") and what they want (their "desires") to forge trust with the victim. Tactics vary, but below are common characteristics of cryptocurrency investment fraud scammer personas: 

  • Excessive flattery 
  • Empathizing with, and often suffering from, similar life events as the victim (e.g., if a victim is going through a divorce, then the scammer may be going through a divorce, too).
  • Suffering from a hardship that requires help from the victim. 
  • Sharing pictures, often selfies, of themselves.
  • Offering to meet in person but making those meetings contingent upon the victim accomplishing a task (e.g., we can meet once you raise enough money).
  • Offering to meet in person, but always finding an excuse at the last minute for why they can’t.
  • Expressing a strong romantic interest in the victim.
  • Agreeing to some video conference calls but preferring instead to speak over text.

3. The Pitch 

Once trust is established with victims, criminals introduce the topic of investing. It's common for scammers to say they themselves—or people in their family or close network—are experts in such investments. They may promise they can bring the victim in on "the ground floor." Types of investments can vary, however common ones include binary trading, liquidity mining, and gold futures.  

4. The Initial Investment

Once the scammer convinces the victim to participate in their scheme, the scammer will instruct the victim how to invest the money, as follows: 

  • Open a cryptocurrency account at a reputable exchange.
  • Transfer money from a traditional bank account to the new cryptocurrency account.
  • Convert the money—now hosted on the cryptocurrency exchange—to the cryptocurrency type the scammer specifies, e.g., Bitcoin, Ether, Tether.
  • Open an account on the "investment platform" provided by the scammer or an individual or group that the scammer directed the victim to.
  • Deposit the cryptocurrency to the investment platform either directly or through a private wallet. 

Investment Platforms: Note that these "platforms" exist in the form of what appear to be traditional websites, either accessible via the web or through a specific browser only accessible via cryptocurrency applications. Common factors include: 

  • Registration using an email address or phone number.
  • Two-factor authentication (e.g., a phone number + an email address) to log in.
  • A website name that closely mimics—or "spoofs"—a legitimate site. 
  • A professional-looking site design that shows the portfolio in an appealing manner.
  • A customer support portal used to communicate about investments and withdrawals.

Did You Know?

Scammers may use deepfake technology and/or hire real people to engage with you on the phone. Even if they're real people you're speaking to, they could be part of a scam.

Cryptocurrency job scams begin when scammers, masquerading as employees of legitimate companies, recruit victims and require them to deposit their own money in order to complete the job.

Red Flag: Were you introduced to the investment scheme by someone in person? If it was someone you know, it could be that they, too, are unwitting victims, and you should warn them immediately. If it was a stranger, and they pitched the idea not long after meeting you, it is entirely possible they are part of a criminal network supporting these schemes.

5. The “Growing” Investment 

Once the victim starts to "invest," returns shown on the investment platform will appear to be extremely lucrative, encouraging the victim to invest more and more. It is common in the early stages for the scammers to allow victims to withdraw not only the original deposit but the earnings as well. This is meant to trick victims—a means to reassure them that the platform is legitimate. Scammers use various means to “sweeten the pot,” or encourage further investing. Examples include:

  • "Matching"—Providing their own funds to the victim’s portfolio to help the victim reach an (arbitrary) investment goal.
  • "Scarcity"—Stating that returns or investment opportunities are only available in a short time period.

6. Taxes, Fees, and the End of the Scheme  

Once the victim is ready to withdrawal all their earnings, they will find their account frozen and an arbitrary requirement will arise, usually in the form of paying "taxes" or "fees" to unlock their funds.

This is a trap: it is simply another method used by the scammers to try and convince victims to invest even more money.

It can be a particularly devastating point in the scheme, as victims will often pay more money to unlock their funds than any amount they previously deposited. At this point, there is usually nothing the victim can do: the scammers will never unlock the funds and it's likely they have already withdrawn those funds into criminally controlled cryptocurrency wallets inaccessible to the victim. In the end, the victim loses all the money they deposited into the scheme.  


What is the FBI doing about this type of fraud? 

The FBI is investigating fraudulent cryptocurrency investment platforms and companies. The FBI may attempt to contact you via email and phone call to provide crucial information regarding this matter if you have been identified as a potential victim of a cryptocurrency investment fraud. Should you not answer, we will leave a voicemail and provide instructions on how to verify our identity.

The FBI will never ask for money, move communications to private messaging apps, or request bank account details or personal identifying information.


What do you do if you're a victim? 

If you feel that you are a victim of a cryptocurrency investment fraud, stop sending any money to the suspected criminals, file a report at FBI's Internet Crime Complaint Center at ic3.gov. Please do not notify the suspected criminals of the FBI’s involvement, which may compromise law enforcement's ability to investigate. 

When filing a report at ic3.gov, if possible, please include the following: 

  • Information regarding how the scammer initially contacted you and how they identified themselves. Include identifying information such as name, phone number, address, as well as email addresses and usernames of the scammer.
  • Financial transaction information such as the date, type of payment, amount, account numbers involved (to include cryptocurrency wallet), the name and address of the receiving financial institution, and receiving cryptocurrency addresses. 

If you believe you or someone you know may be a victim of a cryptocurrency investment scam, immediately submit a report to ic3.gov or contact your local FBI field office and provide as much transaction information as possible.

For more information, see the following FBI Public Service Announcement: Increase in Companies Falsely Claiming an Ability to Recover Funds Lost in Cryptocurrency Investment Schemes (August 11, 2023, Alert Number 08112023). Be wary of anyone claiming they can recover your funds, as this may be another scam.

Information to Report to the FBI

When submitting a report to ic3.gov, the most important information you can provide are transaction details. Transaction details include cryptocurrency addresses, amount and type of cryptocurrency, date and time, and transaction ID (hash). These unique identifiers vary in length and look like long strings of random letters and numbers. Please see examples of important transaction details in the table below. If you are unsure whether transaction information you have is relevant, please include it.

  • Transaction Detail: Cryptocurrency Addresses
    • Example: 0x58566904f57eac4E9EDd81BbC2f877865ECd35985 
  • Transaction Detail: Amount and Cryptocurrency Type
    • Example: 1.02345 ether
  • Transaction Detail: Dates/Times
    • Example: 1 January 2023, 12:01 AM EST
  • Transaction Detail: Transaction ID (hash)
    • Example: 0xfa485de419011ceefdd3cd00a4ff64e52bf9a0dfa528e4fff8bb4c9c 

What if I do not have transaction information?
If you do not have transaction information, please still submit a report to ic3.gov and provide as much information as you have. 

What other information should I provide?
Provide any other information you may have about the scam, to include: 

  • Where and how you first encountered the scammer. 
  • Your communications with the scammer (for example, emails or texts) and associated identifiers such as names, email addresses, and phone numbers. 
  • Any domain names, website addresses, or applications the scammer instructed you to use. 
  • Any two-factor authentication or "one time passcode" information. 
  • Any cryptocurrency exchanges you used to send or receive funds. 
  • The timeline of the scam. 

Have a Question For Us?

all fields required