{"id":24419,"date":"2022-05-13T09:07:08","date_gmt":"2022-05-13T13:07:08","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/wells-fargo-phishing-identity-theft\/24419\/"},"modified":"2022-05-13T16:49:14","modified_gmt":"2022-05-13T15:49:14","slug":"wells-fargo-phishing-identity-theft","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/wells-fargo-phishing-identity-theft\/24419\/","title":{"rendered":"Bank phishing and identity theft"},"content":{"rendered":"<p>Scammers often pose as well-known companies: <a href=\"https:\/\/www.kaspersky.com\/blog\/netflix-phishing\/42927\/\" target=\"_blank\" rel=\"noopener nofollow\">video streaming services<\/a>, job hunting websites, <a href=\"https:\/\/www.kaspersky.com\/blog\/amazon-related-phishing-scam\/37801\/\" target=\"_blank\" rel=\"noopener nofollow\">internet stores<\/a> and so on. This time, phishers are targeting customers of Wells Fargo, one of the four largest US banks, providing services in more than 40 countries. Counting on the bank\u2019s trustworthiness, the cybercriminals don\u2019t limit themselves to stealing bank card details, but go after e-mail accounts and selfies of users holding their ID documents, too.<\/p>\n<h2>Phishing attack on Wells Fargo customers<\/h2>\n<p>As ever, an attack starts with a phishing e-mail designed to alarm the recipient. It informs the user that their Wells Fargo bank account has been blocked, allegedly due to an unverified e-mail address or a mistake in their home address. To regain access, the message asks the recipient to follow the link and verify their identity within 24 hours of receiving the notification. Otherwise, it will no longer be possible to transfer or withdraw money, the letter warns.<\/p>\n<p>The e-mail looks quite convincing: a neat logo element, business-style text, and almost no errors. Even the sender\u2019s name and address are very similar to those of the bank\u2019s customer service. However, the address does have a very unusual domain in the non-existent zone wellsfargo-com (instead of the usual .com). But it takes a sharp eye to spot it.<\/p>\n<div id=\"attachment_44330\" style=\"width: 970px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141258\/wells-fargo-phishing-identity-theft-screen-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44330\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141258\/wells-fargo-phishing-identity-theft-screen-1.jpg\" alt=\"Phishing e-mail seemingly from Wells Fargo\" width=\"960\" height=\"740\" class=\"size-full wp-image-24420\"><\/a><p id=\"caption-attachment-44330\" class=\"wp-caption-text\">Phishing e-mail seemingly from Wells Fargo<\/p><\/div>\n<p>The link in the e-mail points to a third-party site, and from there, via a redirect, to a fake Wells Fargo account login page. Here the phishers made less of an effort: the design does not match that of the official page, and the URL has nothing to do with the bank at all, but for some reason references either the Bruce Springsteen song <a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Ties_That_Bind_(Bruce_Springsteen_song)\" target=\"_blank\" rel=\"nofollow noopener\">The Ties That Bind<\/a> or the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ties_That_Bind_(TV_series)\" target=\"_blank\" rel=\"nofollow noopener\">TV series of the same name<\/a>!<\/p>\n<p>On the very first page, the victim is prompted to enter their Wells Fargo account username and password. But that\u2019s only the beginning \u2014 two more \u201cverification\u201d stages lie ahead.<\/p>\n<div id=\"attachment_44331\" style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141308\/wells-fargo-phishing-identity-theft-screen-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44331\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141308\/wells-fargo-phishing-identity-theft-screen-2.jpg\" alt=\"Phishing site imitating Wells Fargo\" width=\"1000\" height=\"680\" class=\"size-full wp-image-24422\"><\/a><p id=\"caption-attachment-44331\" class=\"wp-caption-text\">Phishing site imitating Wells Fargo<\/p><\/div>\n<p>Having signed in, the victim lands on the next page \u2014 where there are a lot more fields to fill out. Here the scammers brazenly ask for an e-mail address with password (!), a phone number with postal address, the user\u2019s date of birth and social security number (SSN); and, of course, payment details: aside from a bank card number and expiration date, they also ask to fill in the CVV code on the back, plus PIN.<\/p>\n<div id=\"attachment_44332\" style=\"width: 1210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141317\/wells-fargo-phishing-identity-theft-screen-3.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44332\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141317\/wells-fargo-phishing-identity-theft-screen-3.jpg\" alt=\"Form for entering personal data on the phishing site\" width=\"1200\" height=\"1360\" class=\"size-full wp-image-24424\"><\/a><p id=\"caption-attachment-44332\" class=\"wp-caption-text\">Form for entering personal data on the phishing site<\/p><\/div>\n<p>Next comes the most interesting bit: the user is prompted to upload a selfie in which they\u2019re holding up an ID document. This page displays no fewer than three Wells Fargo logos, probably to add credibility. However, some typos somewhat spoil the impression.<\/p>\n<p>[wells-fargo-phishing-screen-4.png]<br>\n[Alt\/title\/caption: <\/p><div id=\"attachment_44333\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141328\/wells-fargo-phishing-identity-theft-screen-4.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44333\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141328\/wells-fargo-phishing-identity-theft-screen-4.jpg\" alt=\"The victim is asked to upload a photo with an ID document\" width=\"800\" height=\"650\" class=\"size-full wp-image-24445\"><\/a><p id=\"caption-attachment-44333\" class=\"wp-caption-text\">The victim is asked to upload a photo with an ID document<\/p><\/div>\n<p>Having extracted all vital data from the victim, the scammers report that the account has been successfully restored and redirect said victim to the real Wells Fargo website. This maneuver is designed to make them believe they have been on the legitimate resource all the time.<\/p>\n<div id=\"attachment_44334\" style=\"width: 1210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141338\/wells-fargo-phishing-identity-theft-screen-5.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-44334\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13141338\/wells-fargo-phishing-identity-theft-screen-5.jpg\" alt=\"Account \" recovery and redirection to the official wells fargo site width=\"1200\" height=\"1320\" class=\"size-full wp-image-24428\"><\/a><p id=\"caption-attachment-44334\" class=\"wp-caption-text\">Account \u201crecovery\u201d and redirection to the official Wells Fargo site<\/p><\/div>\n<h2>What the stolen data can be used for<\/h2>\n<p>Typically, this kind of phishing is used to build up a massive database for subsequent sale on the <a href=\"https:\/\/www.kaspersky.com\/blog\/deep-web-dark-web-darknet-surface-web-difference\/38623\/\" target=\"_blank\" rel=\"noopener nofollow\">dark web<\/a>. The merchandise is valuable: armed with such a treasure trove of personal data, criminals can siphon off money from the victim\u2019s card. But it doesn\u2019t stop there: with a dataset like this they can also enrich themselves in other ways at the victim\u2019s expense \u2014 for example, by opening a bank or crypto exchange account to launder stolen funds, obtain a credit card, and so on. With an ID-card selfie and <a href=\"https:\/\/www.gobankingrates.com\/retirement\/social-security\/what-hackers-can-do-with-ssn\/\" target=\"_blank\" rel=\"nofollow noopener\">SSN<\/a>, attackers have every chance of passing the KYC (Know Your Customer) security check required for such transactions.<\/p>\n<p>As such, after entering the data, probably nothing will happen at first; only later will trouble arise. This may pose an additional danger: by the time the cybercriminals start using the stolen data, the user may no longer remember having entered their personal data somewhere, making it much harder for them to give bank representatives or police officers a proper explanation.<\/p>\n<h2>How to avoid falling victim to bank phishing<\/h2>\n<p>Here are some tips on how to avoid becoming a victim of phishing schemes that involve bank accounts.<\/p>\n<ul>\n<li>Look carefully at unexpected e-mails about account suspensions, suspicious charges, odd purchases or generous giveaways: they are nearly always fake. We\u2019ve explained recently why such e-mails are most likely a scam and <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-online-scam\/32932\/\" target=\"_blank\" rel=\"noopener nofollow\">how to spot fraud<\/a>.<\/li>\n<li>Do not follow links in e-mails to bank websites. It\u2019s better to enter the URL of the official site manually, or find it on Google, Bing or another reliable search engine.<\/li>\n<li>Remember that, as a rule, full personal information plus a selfie with an ID document are not required to recover a bank account. And you certainly don\u2019t have to enter the CVV code from the back of your card, let alone your PIN! If you are asked for this, be very wary and contact the bank for confirmation by calling the phone number printed on your card.<\/li>\n<li>If you are a Wells Fargo customer and get a phishing e-mail, report it to your bank immediately so they can take measures to protect other users. See <a href=\"https:\/\/www.wellsfargo.com\/privacy-security\/fraud\/report\/phish\/\" target=\"_blank\" rel=\"nofollow noopener\">here<\/a> for contact details.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.co.uk\/plus?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a>\u00a0that warns you about scams and phishing attempts and keeps your valuable data safe from cybercriminals.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.<\/p>\n","protected":false},"author":2598,"featured_media":24430,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[2412,176,80,315,76,3372],"class_list":{"0":"post-24419","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-advice","9":"tag-documents","10":"tag-fraud","11":"tag-identity-theft","12":"tag-phishing","13":"tag-wells-fargo"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/wells-fargo-phishing-identity-theft\/24419\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/wells-fargo-phishing-identity-theft\/24151\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/wells-fargo-phishing-identity-theft\/19634\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/wells-fargo-phishing-identity-theft\/26473\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/wells-fargo-phishing-identity-theft\/24789\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/wells-fargo-phishing-identity-theft\/27162\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/wells-fargo-phishing-identity-theft\/33167\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/wells-fargo-phishing-identity-theft\/10683\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/wells-fargo-phishing-identity-theft\/44327\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/wells-fargo-phishing-identity-theft\/18893\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/wells-fargo-phishing-identity-theft\/19421\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/wells-fargo-phishing-identity-theft\/28555\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/wells-fargo-phishing-identity-theft\/25023\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/wells-fargo-phishing-identity-theft\/30516\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/wells-fargo-phishing-identity-theft\/30265\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/24419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=24419"}],"version-history":[{"count":11,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/24419\/revisions"}],"predecessor-version":[{"id":24447,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/24419\/revisions\/24447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/24430"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=24419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=24419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=24419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}