This type of fraud happens when a fraudster takes control of your device and uses this control to make payments from your bank account without your knowledge or authorisation. This will usually happen after the fraudsters have sent you a link, asked you to visit a website or download a piece of software, which helps them to remotely access your device. By reading through this guide, you’ll learn the tactics fraudsters use and know what you need to do to stop yourself and your business falling victim.

How it happens

Fraudsters use several tactics to steal your money using Remote Access Takeover. They’ll usually call pretending to be your bank, the Police, or another government agency and claim to be calling about a payment or problem on your account. They may know information about you and your business and use this information to appear credible.

Fraudsters may go to great lengths to research their targets and may gather information about you over a long period of time using things like Companies House, social media, your public website and even malware (malicious software). They’ve also been known to place several seemingly innocent calls, whilst trying to find out more about you and your business with every call. To help you spot the signs of this fraud, we’ve included three main tactics used by fraudsters below:

Number spoofing

This is where fraudsters change the caller ID (the number they’re calling from), to clone or nearly clone an official number that may belong to your bank. The number may appear exactly the same or might be different by just one digit. Alternatively, they may call you from a withheld number.

Links, websites and software

By clicking on unexpected links, visiting web addresses provided by the fraudsters or following their instructions to download software – you may provide remote access of your device. Fraudsters use this access to trick you into logging onto Online Banking, view your device and control it.

Authorisation codes

No-one, including your bank, will ask you to enter or generate online banking authorisation codes or ask you to read the codes aloud. If you’re being asked for these codes, you are speaking with a fraudster and they’ll use the codes to make a fraudulent payment from your account.

How to protect yourself

Follow the advice below to help protect yourself and your business against Remote Access Takeover fraud:

  • Never give out your Online Banking usernames, passwords, authorisation codes, or any One Time Passcodes (OTPs).
  • Remember numbers can be spoofed and never rely on the caller ID to know who’s calling.
  • For unexpected calls, don’t be afraid to return the call using an independently verified number, such as one from the caller’s official website. Use a different phone or call a known contact first to be sure the line is ‘clear’.
  • Be wary of suspicious emails and text messages. Especially those which contain links and ask for information. Always validate these requests with the company directly, using the contact guidance above.
  • Never click on any links, visit web addresses, or download software because of a phone call you weren’t expecting.
  • Your security device, or secure key, is personal to you. If someone calls and asks you to use this device, end the call and contact your bank immediately.
  • HSBC will never; ask you to participate in an ongoing investigation, advise you how to answer questions or ask you to send your money to a safe account.
  • Make sure you have a company procedure for staff to escalate concerns and ensure everyone in your business is aware of Remote Access Takeover fraud.

How to report it

If you believe you have been a victim of this type of fraud, please report it to us or your bank.

You should also report it to Action Fraud on 0300 123 2040 or via the Action Fraud website. If you are in Scotland, please report to Police Scotland directly by calling 101.

Further Resources

Infographic – Tips on staying safe from Takeover Fraud

Take 5 – Stop, Challenge and Protect

NCSC – National Cyber Security Centre advice and guidance on a range of cyber topics