Wednesday, May 1, 2024

Hackers Stolen Thousands Of Dollars Using Zelle Cash Transferring App

Transferring and receiving money digitally in a matter of minutes sounds like the perfect scenario, but when it all goes wrong, it can leave you with nothing but an empty bank account. Peer to peer payments are on the rise and by 2021 the nation is set to transfer more than $240 billion via apps and online services.

However, the alarming news that Zelle, which is partnered with 60 of the country’s financial institutions, has been hacked and consumers have lost thousands of dollars after cybercriminals cracked and changed passwords to gain access to their bank accounts is worrisome.

How have thousands been stolen?

Zelle is marketed as an app which makes transferring cash to your friends and family fast, safe and reliable. Yet, this is not the experience which many individuals have experienced and individuals who have never signed up to Zelle are reporting that their cash has been stolen via the app.

Wells Fargo customer, Brad Miller, lost $2,500 after receiving a notification that his online banking password had been changed and that a new recipient had been added to his Zelle account – an account he didn’t create.

He then received confirmation that the money had been transferred to the named recipient and that there was nothing he could do to stop it. Thankfully, his bank refunded the cash to him, but not everyone is so lucky.

Why Is Zelle Vulnerable? 

With Zelle, transferring money from one person to another is as simple as typing in the recipient’s cell number or email address and pressing send. It may sound easy, but this is where a major vulnerability lies.

Accidentally typing in one digit or letter incorrectly can make all the difference as Loni Frankland’s daughter, Devin, discovered when she ended up sending her cash to a stranger in Georgia after mistakenly typing her landlord’s first and last name in the wrong way round.

The mother and daughter notified their bank instantly, but Frankland claims they were unable to help and as a result, Devin lost her cash.

What the experts say

Keith Barthold, an expert in Cybersecurity states that hackers are accessing consumer’s bank accounts by using their email addresses and cell phone numbers.

“It’s directly tied to your bank account, and if someone is in it, they’re able to very quickly and irreversibly transfer money from your account to another.”

Therefore, it’s vital that these apps are used with caution and should you notice anything suspicious with your finances or receive any unexpected emails or notifications from your bank, that you immediately take action in a bid to stop your cash from being stolen

A spokesperson from Early Warning the company behind the Zelle Network said, “I wanted to clarify that Zelle was not hacked. In the cases reported, online banking credentials appeared to have been compromised. In these cases, the consumer works with their banks to report unauthorized activity and begin an investigation.”

Action Required

Zelle has stated that financial institutions must verify that their customers have control of their email address and cell number through verification codes, therefore, it’s vital that checks are done to ensure that all banks are adhering to these rules and that this system is working effectively.

Additional checks for users also need to be introduced, such as two-factor authentication to give people the opportunity to double check that the information they’ve entered is correct and to confirm that they do wish to proceed with the payment.

The enrolment process for connecting to peer to peer transfer apps should be reviewed in finer detail too and as a user, you should ensure you should stay on their guard at all times and regularly review your finances.

As the above cases show, Zelle have left themselves open to attacks by hackers and similar apps as just as vulnerable. Thousands of the nation’s money has been callously taken, so, it’s important that the financial institutions closely linked to these apps carefully review their processes and security.

Individuals should take responsibility too and think wisely before using this technology and always double check the data they input when transferring money.

Website

Latest articles

Google Guide! How to Detect Browser Data Theft Using Windows Event Logs

In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from...

Millions of Malicious “Imageless” Docker Hub Repositories Drop Malware

In a startling revelation, nearly 20% of Docker Hub repositories have been identified as...

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment,...

How to Utilize Azure Logs to Identify Threats: Insights From Microsoft

Microsoft's Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide...

Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant...

Threat Actor Claims Selling of Dell Database with 49M User Records

A threat actor reportedly sells a database containing 49 million user records from Dell,...

Google Blocks 2.28M Malicious Apps Entering The Play Store

A safe and trusted Google Play experience is our top priority.We leverage our...

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles