THE CITIZENS NATIONAL BANK OF QUITMAN
"YOUR FRIENDLY HOMETOWN COMMUNITY BANK"
Holiday Phishing Scams
Citizens National Bank of Quitman is not offering free credit checks of any kind. If you see a pop up on the log in screen stating you are eligible for a free credit check, do not enter any usernames or passwords. Run a virus check on your computer and disable all pop-ups. Taking these measures greatly reduce the risk that cyber criminals will be able to access your information. Banking and Information Technology companies are warning about increased phishing and malware attacks in the weeks leading up to Christmas. With the increase in online shopping, there are more reported attempts at gaining customer's personal banking and other account information.
To report lost or stolen Debit cards, please call 866-546-8273. During normal business hours, call 229-263-7575.
Malware Targeting Online Banking Customers
Use caution when opening ANY email attachments from unknown senders. Financial security firms are reporting cases of attackers sending spam emails containing a Word document attachment that when opened, installs a code called Dridex that scans the user's computer for any activity related to online banking and attempts to capture personal information such as user IDs, passwords, and bank account information. These emails often appear to be legitimate messages of financial importance.
**Online Banking Support for Internet Explorer 8 and 9 Has Ended**
Effective Thursday June 26, 2014, our online banking will no longer be supporting Internet Explorer 8 and 9. Please upgrade your browser to Internet Explorer 10 or higher or you may access our website with Google Chrome or Mozilla Firefox.
THE BANK IS NOT PERFORMING MAINTENANCE. DO NOT PROVIDE THE INFORMATION DESCRIBED BELOW.
Our support teams have seen increased activity with a malware screen takeover that is targeting token users. This particular malware variant will prompt a user to input account and/or token data, which then results in another screen prompt indicating that the user will be unable to access the account for 24-hours while maintenance is performed. This allows the fraudster to take over the session and commit fraud while the user is detained on the fake “maintenance” screen. A similar variant of the malware has been identified where the end user receives a pop up asking for several pieces of personal information including a phone number. The customer inputs the data and then receives a phone call immediately from a caller claiming to be a bank employee letting them know the system will be down for 24-hours which then allows the fraudster to access the account while on the phone with the user.