Can anyone take a loan for me?

Banking institutions over the years of their activity have developed an extensive security camera. Their role is not only to thoroughly verify the financial situation of the client, but also to prevent fraud by various types of fraudsters. Despite this, can anyone take a loan for me?

You can hear a lot about safety during online transactions. Security issues when shopping online, as well as when taking out loans and credits have long been widely discussed to sensitize the public about how sensitive personal data is.

Unfortunately, fraudsters in the clash with many citizens are still more cunning and smarter. Using not only human naivety, but also fluff, succumbing to routine and rush, you can regularly hear about cases of identity theft.


What is identity theft?

stolen identity

With proper understanding of how human weaknesses usually work, dishonest people can gain possession of data that can be used to extort a dangerously wide range of services. In terms of identity theft, we are talking about entering someone’s personal data with illegal methods.

It can take different forms.

  1. Theft of an ID card or other identity document by any method It can be the theft of a wallet or misappropriation of a lost document found on a counter in a shop.
  2. Scan an ID card to create a fake copy. Fraudsters can usually do this by extortion. In the network, this occurs during fictitious job advertisements, during which you are asked to send your CV electronically along with an ID card scan.In a non-virtual world, proof can be scanned illegally, for example, when a document falls into the wrong hands when depositing it at a service point (eg, rental).
  3. Phishing personal data outside the internet. Although cheaters are finding it increasingly difficult to find methods by which it will be possible to extort someone’s data in a non-virtual world, it is still worth paying attention to some popular practices.One of them is suspicious surveys, during which the interviewer may ask for too much information.
  4. Phishing personal data online. A popular method that has grown on a scale during the development of internet services. Personal data can be tricked by, for example, creating a fake online store that requires you to provide a range of confidential personal information.
    Another, often discussed method, is asking the consumer to make a verification transfer in the amount of $ 0.01 by eg the said false employer or the seller on the announcement website. Although theoretically this is intended to symbolically confirm the credibility of the consumer, the other party does so in order to steal data. Then, they can be used to, for example, extort a loan.


Can anyone take a loan for me?

Can anyone take a loan for me?

At the end of the fourth paragraph in the above paragraph, phishing scam is mentioned. Although banks are trying to develop more effective and better methods of securing against such practices, you can still hear about taking loans.

So if you ask “can someone take a loan for me?”, Unfortunately, you have to answer – yes, it is possible. Now that we know the methods of fraudsters, let’s briefly discuss how to get a loan out of your stolen identity.


Credit fraud methods

Credit fraud methods

Phishing can be done, for example, by using a stolen identity card and applying for a popular online cash loan service. Then, when ordering the service of delivering a contract by courier, some scammers count on the solicitation and inaccuracy of an employee of the courier company. He may not sufficiently see if the client is using his identity. As a result, a loan can be extorted.

Another method, which was briefly described earlier, is to extort the so-called verification transfer when placing a fictitious job advertisement. Asking for a verification transfer of $ 0.01, the fraudster submits an application on behalf of the consumer to set up an account in the bank. In this way, the original verification transfer becomes a transfer to activate the account. Thanks to this, you can create an account needed to obtain a loan or loan.


Know if someone took a loan for me or how to protect yourself against it

Know if someone took a loan for me or how to protect yourself against it

The specter of falling victim to scammers extorting services from unconscious people certainly sounds scary to many. To avoid this problematic phenomenon, the explanation of which can cause a lot of trouble, it is worth knowing the most effective security measures.

The most popular are services offered by the Credit Information Bureau (BIK). This register collects thousands of confidential data on the creditworthiness of Poles, their current and overdue obligations, as well as inquiries about granting credit and loans.


Generate a free BIK report or activate the alert service

scam alert

It is thanks to monitoring the last mentioned issue that it is worth to visit BIK in order to check what the current status of consumer obligations looks like. By creating a user account, you can generate a free report on the status of all current liabilities. It will be available for the next 60 days (2 months), after which activation for the next months will be payable.

An alternative method to use the BIK database is to purchase the alert service. Initially, you can use it as part of a 60-day trial period. Then, its operation is paid – 79 dollars per year. By paying this relatively small amount, you gain access to a service informing via SMS about each attempt to incur obligations (credit or loan) on the consumer’s data. Thanks to this, you can sleep more peacefully, although it is worth remembering about non-bank services.

Some payday loans and loans are not visible in BIK. This is due to the lack of cooperation of this register with some companies providing non-bank obligations. In such a situation, if we want to be 100% sure in the absence of visibility in the fraudulent registries of our obligations, it is worth checking the data in other registries. For example, it may be one of the registers of Economic Information Bureaus (BIG), KRD, ERIF or BIG InfoMonitor.

Leave a Reply

Your email address will not be published. Required fields are marked *