Watch Out for "Ghost Tapping" Scams

With Halloween right around the corner, things are getting a little spooky out there! But honestly, real-life boogeymen are way scarier than anything the afterlife can throw at me.

The Rise of "Ghost Tapping" Scams

The other day, I was reminded that I no longer have to insert my card to pay. I can just tap the corner of it on the touchpad. With the rise in credit card skimmers, that seems like the safer way to go, right? Well, apparently not.

Scammers are now using the tap-to-pay feature on credit cards to scam unsuspecting people, and it’s appropriately being called “ghost tapping.”

What the BBB Is Warning About

The Better Business Bureau (BBB) is warning that fraudsters use wireless devices to secretly charge tap-enabled cards and mobile wallets. They often find victims in crowded places, distracting them just long enough to get within range to use the tap feature on their credit cards.

Some even pose as vendors or charity workers, using the tap feature to charge more than agreed upon. The BBB reported two cases where victims were charged $537 and $1,100 for what was supposed to be a simple chocolate bar fundraiser but both ended up being scams.

WKDQ-FM logo
Get our free mobile app

How to Protect Yourself

• Use RFID-blocking wallets or sleeves to shield your cards from wireless skimming.
• Always check the payment screen before tapping.
• Avoid using tap-to-pay in crowded or unfamiliar places. When in doubt, insert or swipe instead.

What to Do If You’re a Victim

• Report the fraud to your bank or card issuer immediately.
• Report suspicious activity to the Better Business Bureau at BBB.org/ScamTracker
and to local authorities.

Canva
Canva
loading...

What Is Ghost Hacking or Ghost Touching?

According to an article by City National Bank, another frightful hacking scheme that’s on the rise is called ghost touching, also known as ghost hacking.

An unsuspecting person sets their phone down on a table where a scammer has hidden an electronic device. The scammer then sends malicious electromagnetic signals to the phone, allowing them to remotely access it. Once connected, the hacker can take control, browse files, and look for anything valuable.

Since most people lay their phones face down, they often don’t even notice it’s being accessed.

How to Protect Against Ghost Hacking

• If you lay your phone down, make sure it’s face up.
• If your phone starts acting erratically, pick it up right away, the range on these devices is only a few inches.
• Always use strong security measures like a hard-to-guess PIN or biometrics.
• Keep your phone updated.

LOOK: The biggest scams today and how you can protect yourself from them

Using data from the BBB Scam Tracker Annual Risk Report, Stacker identified the most common and costly types of scams in 2022.

More From WKDQ-FM