A thief can commit card fraud in several ways, including:
- Card cloning/skimming: Attaching a skimmer device to a point-of-sale terminal, ATM, or fuel pump to covertly copy card details and PINs. The stolen data is then used to create cloned cards for unauthorized purchases or withdrawals.
- Physical theft: Stealing wallets or cards directly, enabling immediate use of the card to make purchases or withdraw cash. Family or acquaintances can also engage in fraud by using cards without permission.
- Phishing and social engineering: Tricking individuals into divulging card numbers, PINs, or other confidential information via fake messages or calls, which criminals use for unauthorized transactions.
- Application fraud: Using stolen or fake documents to open credit accounts in someone else's name and maxing out spending, leaving the real owner liable.
- Card-not-present fraud: Using stolen card details to make online purchases where the physical card is not required, often involving high-value goods or gift cards resold for cash.
- Hidden malware or fake keypads on ATMs to record PINs and card data when victims transact at the machines.
- Dumpster diving or mail theft to gather sensitive financial information from discarded statements or cards.
These are common ways thieves exploit payment cards to commit fraud.