Main Office
270-247-1758
270-247-1758
Your account doesn’t have a burglar alarm, so we’re giving customers the alerts, tips and resources to keep their money safe. Take a moment to educate yourself, download our Scam Alert Service, and let no one take your money or peace of mind.
FNB Scam Alert
FNB is pleased to announce our partnership with the Office of the Kentucky Attorney General to better protect our customers from scams, frauds and con artists.
FNB Secure
Stay safe by staying informed about common fraud scams and valuable ways to protect yourself. Learn about staying secure when using the Internet.
Money Smart
Money Smart, offered by the FDIC, is a financial education program designed to help individuals develop and polish their financial skills. The Money Smart curriculum is free.
Stop.Think.Connect. is a national public cybersecurity awareness campaign aimed at increasing the awareness of cyber threats to help the American public stay safer and more secure online.
Go to the campaign from the Department of Homeland Security >
The American Bankers Association has published tips for protecting your ATM Card. Read how to use an ATM safely, especially at night and find out more about ATM Crime.
Social networking is a global revolution, enabling around a billion people worldwide to stay in touch with their friends, share experiences and photographs and exchange personal information.
Wi-Fi makes it easy to access information and do banking online but you should be aware of the risks you take when using free public Wi-Fi or even Wi-Fi at home.
What is it?
A fraudster intercepts and redirects Wire or Automatic Deposits from a financial institution or an organization they serve.
Who are the victims?
Victims are typically individuals within a financial, commercial, non-profit, and non-governmental entities with the ability to transfer funds or other valuable assets.
How does it work?
Fraudsters begin by conducting research on individuals using online sources of information, social media, including LinkedIn, and biographies included on a company’s website. Once individuals are identified, fraudsters will use targeted techniques such as fraudulent emails to gain access to corporate systems. The fraudster often researches organizations’ transaction processes before attacking.
Fraudsters will initiate an urgent and time-sensitive request, such as for a funds transfer. Fraudsters will take advantage of the nature of the employee wanting to give the best customer service.
The email could appear to be from a trusted vendor and instruct the receiver to make an urgent transfer to an account within the fraudster’s control (either directly or through a money mule). Fraudsters may initiate their transfer request when their target is on vacation or traveling to reduce the ability of the person receiving the fraudulent email to verify he request. Criminals are also using BEC schemes to compromise automated clearing house (ACH) transfers, gift card purchases, virtual currency payments, and even to obtain personally identifiable information for use in future scams.
What is it?
A fraudster poses as a potential employer, convincing victims to process financial transactions, or forward them money or personally identifiable information.
Who are the victims?
Anyone can be a victim, but job seekers, college students, the underemployed, stay-at-home parents, or retirees may be more susceptible to these scams.
How does it work?
Fraudsters will post ads on fake company websites, online forums, and social networks for high paying jobs that can be done from home and conduct phony interviews with the victims.
Following the interviews, fraudsters will request money for training or personally identifiable information for background checks or other aspects of the hiring process.
Criminals may use the victim’s financial information to initiate ACH credits or perform mobile deposits to the victim’s account. They then instruct the victim to forward the funds into an account they control, less a fee that is meant as payment. In other cases, the fraudster will pretend to overpay the victim with fake checks and request that the difference be returned with a wire transfer, or open accounts in the victim’s name using personally identifiable information stolen earlier in the scam. Victims of employment scams are typically held accountable for losses and damage to their credit scores.
What is it?
Criminals use a fake lottery win to convince victims to send funds or share personally identifiable information.
Who are the victims?
Anyone can be a victim, but the elderly and financially vulnerable may be more at risk.
How does it work?
Fraudsters contact victims through mass phishing techniques in the mail, on social media or via text message claiming they have won the lottery.
Victims are asked to forward a processing fee, or complete a form requiring exhaustive personal information, before receiving their winnings. Sometimes they even go to the lengths of calling and letting the victim know that they will be arriving with the winnings within days if they would just send them the processing fees.
When money is involved, criminals typically prefer payment through Western Union or MoneyGram, gift cards, or cash in the mail. If the victim does forward a fee, then the fraudster will make additional requests for funds — such as tax fees or administration fees. This will continue until the victim catches on or runs out of money. They may pose as domestic or international lottery officials.
What is it?
A fraud targeting emotionally vulnerable victims with companionship, with the goal of manipulating them into sending funds or account information or making transactions on the criminal’s behalf.
Who are the victims?
All demographics are targeted, but seniors, women, and widows are most often victimized.
How does it work?
The fraudster will contact the victim through social media networks, online forums, or dating sites. Fraudsters will pose as old friends from online. On-line dating sites can be a prime location for the fraudsters to surf for victims. The fraudster is typically located overseas but may portray themselves as an American (Military or business professional).
This fraud may take months to develop as the fraudster builds trust with the victim. Fraudster really preys on the compassion of the victim.
At some point the fraudster will initiate and escalate requests for money, claiming they need the funds for travel expenses to see the victim, emergency medical expenses, a business opportunity, or another fictitious purpose. The fraudster may also request online login details with a plan to gain access to the victim’s accounts, or alternatively, convince the victim to transfer fraudulent funds as an unsuspecting money mule (someone who transfers or moves illegally acquired money on behalf of someone else).
What is it?
A fraud targeting individuals with the promise of a loan in exchange for a fee.
Who are the victims?
Victims are often college students, underemployed, or facing a form of addiction, such as gambling or substance abuse.
How does it work?
Fraudsters contact victims through social networks such as Craigslist and Facebook, mass email or text message, and even by posting ads in newspapers and magazines.
These ads promise access to loans regardless of credit history or employment status.
Once the victim responds, the fraudster may request financial details from the victim such as account information or online/mobile login credentials. They then use this information to either initiate ACH credits or perform mobile deposits to the account with instructions for the victim to then return a portion of the funds as part of a processing fee. In another version of the scam, criminals request an urgent and upfront insurance or application fee, usually by wire transfer, then break off contact with the victim once the payment is made. Fraudsters may also pretend they are employees of a fictitious government department, claiming the victim has been selected to receive a grant contingent on an initial fee.
Having your financial accounts compromised or your identity stolen can be overwhelming. Use our helpful Identity Theft Checklist and work through the necessary steps to get things back to normal.
You are now leaving FNB Bank's website. Please be advised the site you are going to is not owned or controlled by FNB Bank. It may have a different privacy policy, cookie control and security standards. FNB Bank is not endorsing or guaranteeing the products, information or recommendations provided by the linked site. FNB Bank is not liable for any failure of products or services advertised on the site. To remain at FNB Bank's site, click "Stay On GrowWithFNB.com" or click “Continue To Another Website” to leave FNB Bank's website and proceed to the selected site. Thank you for visiting FNB Bank.