Whether you are contacted by mail, phone or email, it is not Texans' practice to contact members unsolicited and ask for personal or financial information. If you are contacted by an entity claiming to be Texans who is requesting this type of information, do not respond and contact Texans immediately at 800.843.5295.
For information on the latest scams, read the postings below.
3/25/15: The National Credit Union Administration is alerting consumers that texts received from an agency phone number, 703.518.6301, asking for personal information are not coming from the NCUA. The text messages may warn of a debit card reaching its limit. Do not click on the links in the message, provide any information or attempt to conduct financial transactions through the text message or accompanying websites. View the NCUA's full release on this alert.
This is an attempted fraud scam known as "spoofing." Read more about this fraud technique. If you have received a text message like this and responded with any personal information, please contact our Fraud Department immediately at 972.348.2000.
3/17/15: The National Credit Union Administration has reported emails are being received that appear to be from the "National Credit Union," asking individuals to provide personal information (Social Security numbers, account numbers, etc.) and/or to transfer large amounts of money. These emails and accompanying website utilize a logo and design similar to the NCUA's actual site as well.
If you receive one of these emails or visit this site, do not provide any informtation or attempt to conduct any financial transactions—and call NCUA's Fraud Hotline at 800.827.9650. You should also contact the Internet Crime Complaint Center, a partnership between the FBI and the National White Collar Crime Center. Read the NCUA's official notice about this phishing scam.
You may be hearing about the OpenSSL patch in the news. SSL (secure socket layer) is a standard security technology for establishing an encrypted link between an end user’s PC or mobile device, and typically a website or application.
Texans Credit Union takes security issues very seriously. Our website and online banking vendors do not rely on server side OpenSSL for encryption, but is proactively reviewing their systems as a security best practice.
What changes to I need to make?
OpenSSL is used on all Apple devices and many Android devices. As a security best practice, we recommend that you apply the Apple and Android operating or security system updates to personal devices you use to access online and mobile banking once they are made available.
You may be hearing about the FREAK vulnerability in the news. FREAK is a vulnerability that intercepts HTTPS secure connections between an end user and servers, forcing the use of a less secure connection that can be easily decrypted.
Texans Credit Union takes security issues very seriously. Our online banking vendor has confirmed that they are not impacted by FREAK.
What changes to I need to make?
As a security best practice, we recommend that you apply the latest security patches to your personal devices including desktops, laptops and mobile devices.
We've received a report of a member receiving a phone call from a 650 area code (California) claiming to be someone from Texans Credit Union and asking the member if they'd like to apply for an auto or home loan. The person left a voicemail stating he/she worked for Texans Credit Union and was calling about our great loan rates, and he/she left a 972 call-back number so that an application could be taken over the phone. The voicemail was deleted before the full phone numbers could be retrieved.
If you receive a phone call from a number other than 972 or 214 asking you to apply for a loan with Texans Credit Union, be sure to verify the person's identity before giving out your own personal information.
We've received a report of phone calls from our main phone number, 972.348.2000, stating that the person answering has won a vacation trip from Texans Credit Union. The individual received the call only after calling 972.348.2000 to speak to our e-Branch about a Texans account. We are not aware if the call goes on to ask for personal information. If you receive this call, this is a fraudulent call. The technique being used to show it is coming from a trusted number is known as "caller ID spoofing."
Texans CU Members: If you have received this call and responded with any personal information, please contact our Fraud Department immediately at 972.348.2000.
Non-Texans CU Members: If you have received this call and responded with any personal information, please call your financial institution immediately to report it.
Learn more about caller ID spoofing, which is a violation of the Federal Communications Commission.
Especially during the holiday season, be careful when shopping online. A fraudster can create a very convincing copy of a reputable site. If you receive holiday shopping specials via email or social media, be wary of any links. They could be directing you to a site used to capture your personal and financial information, including credit and debit card numbers.
Instead, be sure you are shopping with a reputable online retailer and confirm the web address independently from the link that was provided. You can also hover your cursor over the link and the web address it’s taking you to will appear normally in the lower left corner of your browser – you can then confirm the link it’s taking you to is a reputable site.
Members have reported receiving a phone call from 707.889.0968 and 627.146.2958 stating their debit cards have been deactivated or compromised and in order to reactivate the card or get a new card, they must enter their 16-digit card numbers, account numbers and/or social security numbers. This is a phishing scam attempt; please do not enter any information if you receive a call from either of these numbers or a similar call.
If you have received this call and responded with your card number, account number and/or social security number, please contact our Fraud Department immediately at 972.348.2000.
POODLE affects browsers using SSL (Secure Sockets Layer) 3.0, which is used to secure your online sessions for purchases and banking activities. Texans Credit Union takes security issues very seriously. Our online banking provider is disabling SSL 3.0. Please note: The POODLE vulnerability is a global problem. It is not exclusive to Texans Credit Union or our online banking provider.
Once SSL 3.0 is disabled for www.texanscu.org, you will be unable to access the website until TLS 1.0 or higher is supported by the browser you're using.
How can I protect myself against the POODLE vulnerability?
What changes do I need to make?
If you are using Firefox (v24+), Chrome (v30+), Safari (v6+) or Internet Explorer (v7+), you are already protected against this vulnerability as TLS 1.0 is enabled by default on these versions.
Internet Explorer 6: If by default, Internet Explorer 6 did not support TLS 1.0, use these instructions to enable this feature:
If you are unsure what version of Internet Explorer you are currently using, access About Internet Explorer:
You may be hearing about the Shellshock vulnerability in the news. Shellshock affects a program called Bash. The Bash program is used in Linux and MAC OS X operating systems and has a vulnerability that can be exploited by an attacker. The Shellshock vulnerability generally takes control of the server running Bash, and subsequently can introduce malicious code to launch additional attacks.
Texans Credit Union takes security issues very seriously. Our online banking provider has completed a thorough investigation and has conducted that the Shellshock vulnerability does not impact online banking. Please note: The Shellshock vulnerability is a global system. It is not exclusive to Texans Credit Union or our online banking provider.
How can I protect myself against threats like Shellshock?
We are aware of a card breach at Home Depot reported on September 2. According to the statement provided on the company's website, this breach impacts cards used at U.S. and Canadian stores from April 2014 forward. View the full security compromise update notice.
As a Texans member, your debit card is regularly monitored by our card processor for fraudulent transactions. If you notice any suspicious activity on your account, please contact our Fraud Department at 972.348.2000 immediately.
We're aware of a potential phishing campaign that may impact our online banking users. Emails are being sent randomly using a spoofed email address (firstname.lastname@example.org) - these emails are not legitimate communications. Attached to the email is a zip file containing a malicious executable file that looks like a PDF document, which when opened infects the user's computer with malware.
Sample fraudulent email:
Incoming Transactions Report
An incoming money transfer has been received by your financial institution and the funds deposited to account.
Initiated By: Fiserv Inc.
Initiated Date & Time: Fri, 15 Aug 2014 23:00:11 +0700
Batch ID: 976
Please view the attached file to review the transaction details.
How can I protect myself against phishing scams?
We encourage all members to employ security best practices to mitigate phishing and malware threats like this.
On July 28, a security alert was released discussing “Clickjacking” and “Emmental.” Please note: This possible security breach is a global problem that could impact any online banking site and any device. It is not exclusive to Texans Credit Union or our online banking provider.
Clickjacking is a type of phishing attack that begins by tricking users into clicking a malicious link. Once this malicious link has been visited, it allows a malicious user to overlay malicious clickable links over valid websites without the user’s knowledge to obtain confidential information.
Clickjacking capabilities include:
Is online banking safe?
Yes – our online banking provider has completed a thorough investigation and has concluded that the Clickjacking attack does not affect online banking, bill pay or mobile banking.
Emmental is a malware attack that redirects internet traffic to malicious servers. The attack is two-fold beginning by opening a malicious file; when the file is opened, it makes changes to a user’s computer. The attack then attempts to have the user install “secure token generator” malware on their Android or Apple mobile device when they next visit a valid banking site.
The “Secure Token Generator” malware when installed will then gain access to read text messages in an attempt to capture codes that are sent by some banking sites that are used as secondary security measures to protect against unauthorized access to banking information.
How can I protect myself against threats like Clickjacking and Emmental?
We encourage all members to employ security best practices, including:
On June 20, a security alert announced two recently-discovered vulnerabilities called Sypeng and Dyreza.
Please note: This possible security breach is a global problem that could impact any online banking site and any Android device. It is not exclusive to Texans Credit Union or our online banking provider.
Svpeng is a malware for Android devices. Svpeng searches for specific mobile banking apps on your device, then locks the device and demands money to unlock it. In the United States, Svpeng breaks into a mobile device through a social engineering campaign using text messages. Svpeng capabilities include:
Dyreza is a malware that redirects traffic to malicious servers. Dyreza is spread through spam email messages such as "Your FED TAX payment ID [random number]" and "RE: Invoice #[random number].” These messages contain a “.zip” file often hosted on legitimate domains to minimize suspicion. Opening this file infects the computer with the malware. Dyrezea views unencrypted web traffic in the Internet Explorer, Chrome and Firefox browsers and captures your credentials by sending you to malicious servers, while you think you are securely connected to your financial institution’s legitimate website.
Is my iPhone vulnerable to Svpeng and Dyreza? iPhones and Android devices use different operating systems. Svpeng specifically targets the Android operating system. Dyreza does not target mobile devices; it exploits Internet Explorer, Chrome and Firefox browsers.
Is online banking safe? Yes – our online banking provider has completed a thorough investigation and has concluded that the Dyreza vulnerability does not affect online banking, bill pay or mobile banking.
How can I protect myself against threats like Svpeng and Dyreza? We encourage all members uphold security best practices including the following:
We are aware of the card compromise that PF Chang's Bistro reported on June 9. According to the statement provided on the company's website, they are working with the Secret Service and card processors to determine what specifically was compromised. They are currently reporting only card numbers have been compromised, no personal data. View the full security compromise update notice and FAQs.
As a Texans member, your debit card is regularly monitored by our card processor for fraudulent transactions, with an especially close monitoring team currently assigned to the cards used at PF Chang's Bistro during the compromise period. If you notice any suspicious activity on your account, please contact our Fraud Department at 972.348.2000 immediately.
On April 26, 2014, Microsoft revealed a vulnerability, called Zero-day Vulnerability, in all versions of Internet Explorer that is being used in "limited, targeted attacks." All versions of Internet Explorer from 6 through 11 are listed as vulnerable. Texans has determined that the vulnerability does not affect online banking, bill pay or mobile banking.
If you do use Internet Explorer, we recommend you use another browser for the time being. If you are interested in learning more, please read Microsoft's Security Advisory.
How is this vulnerability exploited?
An attack could be triggered by luring visitors to a specially crafted web page (much like a phishing attack). In other words, a user needs to visit a malicious page to be attacked.
The attack leverages a previously unknown "use after free" vulnerability -- data corruption that occurs after memory has been released -- and bypasses both Windows DEP (data execution prevention) and ASLR (address space layout randomization) protections.
Is there a patch for this vulnerability?
Microsoft has not yet published a patch for this vulnerability but some antivirus companies, such as Symantec, already have signatures to protect against this new threat. Microsoft also states that versions of the Enhanced Mitigation Experience Toolkit (EMET) 4.1 and above - a free Microsoft tool - can mitigate this vulnerability in Internet Explorer. This toolkit can be downloaded at http://www.microsoft.com/en-us/download/details.aspx?id=41138.
Genuine cashier's checks issued by a financial institution are good funds. However, counterfeit checks often look as good as real ones. Counterfeit cashier's checks have become a common method of committing fraud.
Each scam involving a fraudulent cashier's check may be different, but some of the more common scenarios are:
Scams can also be conducted with personal checks. For example, a fraudulent check may appear to be written on the account of a real person or company or be written on an account that contains insufficient funds to cover the check. Other scams involve fraudulent postal service money orders or fraudulent money orders that appear to have been issued by a financial institution.
The result of these scams is that the fraudulent check will be returned unpaid. The financial institution will then deduct the amount of the check from your account or otherwise seek repayment from you, and you will lose either the goods that you sold, the money that you sent to the third party, or both.