inflearn logo

Financial Fraud (Hacking) Prevention and Response Methods for Individuals

Victims of various financial fraud incidents, such as voice phishing, malicious URLs, mobile scams, account and card misuse, internet banking fraud, and ARS authentication scams, are on the rise. Recently, hacking and fraud techniques have become more sophisticated, exploiting vulnerabilities in open banking, simple payment services (Pay), enhanced scam methods, hackers' use of leaked personal information, and the takeover of personal PCs and mobile devices. Financial authorities and various financial institutions do not specifically disclose the procedures of these incidents or the hacking methods used to financial consumers. Having received reports from those around me about the growing misunderstandings among people who have never experienced hacking, I recognized the seriousness of the situation and produced this educational material. I sincerely hope you gain an accurate understanding of hacking, comprehend the relevant laws and policies, and properly establish proactive prevention systems and strengthen response measures. (Under current law, you are responsible for any incidents that occur.)

3 learners are taking this course

Level Intermediate

Course period 6 months

Penetration Testing
Penetration Testing
System Hacking
System Hacking
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
Penetration Testing
Penetration Testing
System Hacking
System Hacking
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security

What you will gain after the course

  • Whether it is possible for me to steal someone else's assets using their personal information.

  • Whether it is possible to involve another person in a crime by finding vulnerable services and using simple fraudulent methods.

🛡️ Guide to Specialized Education for Preventing Online Financial Fraud

– Accessing links/QRs, account theft, vulnerable service payment damages… Why is compensation not possible? (No Audio)

📌 Recently, sophisticated financial fraud targeting individuals has been surging in online spaces. Damages that appear to be hacking just by clicking a link or QR code, or incidents where multiple payments occur using personal information entered once on a phishing site, have already become risks encountered in daily life. However, most financial consumers are not properly informed about why such damages are processed as 'non-compensable' or how the laws and regulations are actually applied.


⚠️ 1. Misconceptions about methods of financial fraud

🔗 ① Does money get withdrawn just by clicking a link or QR code?
In reality, it is almost impossible for money to be withdrawn from an account simply by accessing a link;
however, if actions such as installing malicious apps, allowing remote control, or entering information on phishing sites occur without the user's knowledge,
it can create a situation that makes it appear as if "money was withdrawn just by accessing it."

📥 ② Entering information once on a phishing site leads to multiple payments
Some simple payment services, such as Naver and Coupang, have structures where login and payment are possible with just an ID/PW,
and in such cases, the failure to activate two-factor authentication (2FA) is judged as 100% user negligence.

📱 ③ Others opening and misusing a mobile phone in my name
If someone else opens an additional USIM under the same name, the authentication text is sent to that number,
and the victim has virtually no way of knowing.



⚖️ 2. Is compensation difficult even if damage occurs? — The reality of the law

According to the Framework Act on Telecommunications and the Electronic Financial Transactions Act,
✔️ financial institutions have no obligation to compensate if the cause of personal information leakage lies with the consumer
✔️ there is no legal liability as long as basic requirements, such as providing abnormal transaction detection and authentication services, are met

Furthermore, even if reported to the police,
✔️ the structure makes it difficult to achieve actual damage relief due to differences in the application of laws


🧪 3. Why are PC and mobile malicious apps invisible?

📌 Some malicious apps are difficult for users to find because they hide their icons or disguise themselves as system apps.



🧭 4. Threat Scenarios Based on Actual Incidents

📌 Incident Cases #1–#3:
– Exploitation of SMS, apps, and simple payment linking after personal information theft
– Automatic payment, gift certificate, and point conversion methods after account login
– Potential for file theft from PCs also exists


🛡️ 5. Essential Personal-Level Protection Measures

🧰 ① Mandatory application of two-step verification (OTP, biometrics)
🧱 ② Check automatic payment and account linking of simple payment services
🔍 ③ Regularly check for additional USIM activations
📵 ④ Never click on links or QR codes from unknown sources
🛑 ⑤ Frequently check for apps not in installation history and 'Device Administrator' permission settings
💉 ⑥ Install reputable antivirus software and perform regular scans



🎓 6. Objectives of this Training

🌐 Accurately understand the gap between reality and legislation,
🔐 clearly explain the technical and institutional background of financial fraud methods,
🛡️ and provide practical response strategies for individuals to protect themselves.

Recommended for
these people

Who is this course right for?

  • Non-specialists who have experienced financial fraud but find it difficult to establish additional security measures on their own.

  • Inexperienced individuals who have not personally encountered financial fraud but are aware of actual hacking and find it difficult to know how to be cautious or make the right judgments.

Need to know before starting?

  • Understanding the Telecommunications Business Act

  • Understanding Electronic Commerce Law

Hello
This is jueygrace

233

Learners

19

Reviews

4.1

Rating

34

Courses

Security Consulting

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

$8.80