Main Office
270-247-1758
270-247-1758
Your account doesn’t have a burglar alarm, so we’re giving customers the alerts, tips and resources to keep their money safe. Take a moment to educate yourself, download our Scam Alert Service, and let no one take your money or peace of mind.
FNB Scam Alert
FNB is pleased to announce our partnership with the Office of the Kentucky Attorney General to better protect our customers from scams, frauds and con artists.
FNB Secure
Stay safe by staying informed about common fraud scams and valuable ways to protect yourself. Learn about staying secure when using the Internet.
Money Smart
Money Smart, offered by the FDIC, is a financial education program designed to help individuals develop and polish their financial skills. The Money Smart curriculum is free.
Stop.Think.Connect. is a national public cybersecurity awareness campaign aimed at increasing the awareness of cyber threats to help the American public stay safer and more secure online.
Go to the campaign from the Department of Homeland Security >
The American Bankers Association has published tips for protecting your ATM Card. Read how to use an ATM safely, especially at night and find out more about ATM Crime.
Social networking is a global revolution, enabling around a billion people worldwide to stay in touch with their friends, share experiences and photographs and exchange personal information.
Wi-Fi makes it easy to access information and do banking online but you should be aware of the risks you take when using free public Wi-Fi or even Wi-Fi at home.
Have you ever applied for a personal loan or mortgage and then soon received unsolicited offers via phone or mail from other lenders? This is an example of how trigger leads work.
Once a lender “hard pulls” your credit during the loan application process, any of the National Credit Bureaus (Transunion, Experian, Equifax), can legally sell that information to other vendors/competing lenders. This typically occurs very quickly after a credit inquiry has occurred, often within 24 hours. This type of information is bought by mortgage lenders, insurance companies, car dealers, etc.
Once other lenders see the original loan inquiry, that applicant can start getting calls, emails, and snail mail offers. There is a theory that trigger leads allow consumers to know about credit options and compare cost and terms. On the flip side, they can also open borrowers up to solicitors who may be annoying or even possibly deceptive. It is always important for a consumer to be sure of who they are actually interacting with on the phone or over digital mediums.
Register at OptOutPrescreen.com
DMA Choice
What is it?
A fraudster intercepts and redirects Wire or Automatic Deposits from a financial institution or an organization they serve.
Who are the victims?
Victims are typically individuals within a financial, commercial, non-profit, and non-governmental entities with the ability to transfer funds or other valuable assets.
How does it work?
Fraudsters begin by conducting research on individuals using online sources of information, social media, including LinkedIn, and biographies included on a company’s website. Once individuals are identified, fraudsters will use targeted techniques such as fraudulent emails to gain access to corporate systems. The fraudster often researches organizations’ transaction processes before attacking.
Fraudsters will initiate an urgent and time-sensitive request, such as for a funds transfer. Fraudsters will take advantage of the nature of the employee wanting to give the best customer service.
The email could appear to be from a trusted vendor and instruct the receiver to make an urgent transfer to an account within the fraudster’s control (either directly or through a money mule). Fraudsters may initiate their transfer request when their target is on vacation or traveling to reduce the ability of the person receiving the fraudulent email to verify he request. Criminals are also using BEC schemes to compromise automated clearing house (ACH) transfers, gift card purchases, virtual currency payments, and even to obtain personally identifiable information for use in future scams.
What is it?
A fraudster poses as a potential employer, convincing victims to process financial transactions, or forward them money or personally identifiable information.
Who are the victims?
Anyone can be a victim, but job seekers, college students, the underemployed, stay-at-home parents, or retirees may be more susceptible to these scams.
How does it work?
Fraudsters will post ads on fake company websites, online forums, and social networks for high paying jobs that can be done from home and conduct phony interviews with the victims.
Following the interviews, fraudsters will request money for training or personally identifiable information for background checks or other aspects of the hiring process.
Criminals may use the victim’s financial information to initiate ACH credits or perform mobile deposits to the victim’s account. They then instruct the victim to forward the funds into an account they control, less a fee that is meant as payment. In other cases, the fraudster will pretend to overpay the victim with fake checks and request that the difference be returned with a wire transfer, or open accounts in the victim’s name using personally identifiable information stolen earlier in the scam. Victims of employment scams are typically held accountable for losses and damage to their credit scores.
What is it?
Criminals use a fake lottery win to convince victims to send funds or share personally identifiable information.
Who are the victims?
Anyone can be a victim, but the elderly and financially vulnerable may be more at risk.
How does it work?
Fraudsters contact victims through mass phishing techniques in the mail, on social media or via text message claiming they have won the lottery.
Victims are asked to forward a processing fee, or complete a form requiring exhaustive personal information, before receiving their winnings. Sometimes they even go to the lengths of calling and letting the victim know that they will be arriving with the winnings within days if they would just send them the processing fees.
When money is involved, criminals typically prefer payment through Western Union or MoneyGram, gift cards, or cash in the mail. If the victim does forward a fee, then the fraudster will make additional requests for funds — such as tax fees or administration fees. This will continue until the victim catches on or runs out of money. They may pose as domestic or international lottery officials.
What is it?
A fraud targeting emotionally vulnerable victims with companionship, with the goal of manipulating them into sending funds or account information or making transactions on the criminal’s behalf.
Who are the victims?
All demographics are targeted, but seniors, women, and widows are most often victimized.
How does it work?
The fraudster will contact the victim through social media networks, online forums, or dating sites. Fraudsters will pose as old friends from online. On-line dating sites can be a prime location for the fraudsters to surf for victims. The fraudster is typically located overseas but may portray themselves as an American (Military or business professional).
This fraud may take months to develop as the fraudster builds trust with the victim. Fraudster really preys on the compassion of the victim.
At some point the fraudster will initiate and escalate requests for money, claiming they need the funds for travel expenses to see the victim, emergency medical expenses, a business opportunity, or another fictitious purpose. The fraudster may also request online login details with a plan to gain access to the victim’s accounts, or alternatively, convince the victim to transfer fraudulent funds as an unsuspecting money mule (someone who transfers or moves illegally acquired money on behalf of someone else).
What is it?
A fraud targeting individuals with the promise of a loan in exchange for a fee.
Who are the victims?
Victims are often college students, underemployed, or facing a form of addiction, such as gambling or substance abuse.
How does it work?
Fraudsters contact victims through social networks such as Craigslist and Facebook, mass email or text message, and even by posting ads in newspapers and magazines.
These ads promise access to loans regardless of credit history or employment status.
Once the victim responds, the fraudster may request financial details from the victim such as account information or online/mobile login credentials. They then use this information to either initiate ACH credits or perform mobile deposits to the account with instructions for the victim to then return a portion of the funds as part of a processing fee. In another version of the scam, criminals request an urgent and upfront insurance or application fee, usually by wire transfer, then break off contact with the victim once the payment is made. Fraudsters may also pretend they are employees of a fictitious government department, claiming the victim has been selected to receive a grant contingent on an initial fee.
What is it?
Someone might ask you to pay for something by putting money on a gift card, like a Google Play or iTunes card, and then giving them the numbers on the back of the card. If they ask you to do this, they’re trying to scam you. No real business or government agency will ever insist you pay them with a gift card. Anyone who demands to be paid with a gift card is a scammer.
Who are the victims?
Anyone can be a victim, but the elderly may be more at risk.
How does it work?
Gift cards are for gifts, not for payments. As soon as someone tells you to pay them with a gift card, that’s a scam. Gift cards are popular with scammers because they’re easy for people to find and buy. They also have fewer protections for buyers compared to some other payment options. They’re more like cash: once you use a gift card, the money on it is gone.
If someone calls and asks that you pay them with gift cards, that’s a scammer calling. And once they have the gift card number and the PIN, they have your money.
Scammers may tell you different stories to get you to pay them with gift cards, but this is what usually happens:
Having your financial accounts compromised or your identity stolen can be overwhelming. Use our helpful Identity Theft Checklist and work through the necessary steps to get things back to normal.
You are now leaving FNB Bank's website. Please be advised the site you are going to is not owned or controlled by FNB Bank. It may have a different privacy policy, cookie control and security standards. FNB Bank is not endorsing or guaranteeing the products, information or recommendations provided by the linked site. FNB Bank is not liable for any failure of products or services advertised on the site. To remain at FNB Bank's site, click "Stay On GrowWithFNB.com" or click “Continue To Another Website” to leave FNB Bank's website and proceed to the selected site. Thank you for visiting FNB Bank.