Supply chain solutions

Business Partnerships

Smart Services

Safety Warnings

Octet Türkiye

As Octet, while we prioritize the security of your data, a truly secure system for our users is only achievable if users also conduct secure transactions and are well-informed about the risks outlined below.

Malware-based Frauds

Malware is a broad term encompassing any malicious software crafted to disrupt or exploit programmable devices, services, or networks. Cybercriminals frequently employ malware to coerce victims into divulging data for financial gain. This data can vary from financial records to health information, emails, and passwords. Customers of financial institutions are prime targets for malware, particularly with the emergence of advancing technologies.

Malware Types

Internet information thieves employ various methods to capture the private information of customers. The most commonly used of these methods are as follows:
1. Trojan Software (Trojan)
Trojan software is named after the “Trojan Horse”. A Trojan horse is a type of virus that disguises itself by attaching to a computer program, allowing the program to appear to function normally while it secretly causes harm. Trojan horses are primarily utilized to capture private information, such as passwords and usernames, used on the computers they infect. The Trojan horse, often challenging to detect, usually infects systems through email. Furthermore, it can be hidden in various locations, including compact discs (CDs), digital versatile discs (DVDs), files within email attachments (.jpg, .gif, .txt, .doc, .xls, etc.), and application files with the “.exe” extension, even within computer games.
2. Keyloggers and Screenloggers
Keyloggers are programs capable of instantly copying and recording keyboard strokes on a computer, thereby providing hackers access to this information through email. Such programs have the capability to record everything typed on the keyboard. The records obtained are stored in the system as a text file with the extension “.txt”. Due to their nature, they can intercept all types of passwords and private correspondence of the victims. Screenloggers are programs that capture screenshots and transmit them to the attacker through email. Thanks to the captured snapshots, it is easy to see what is being displayed on the screen at any given moment or where passwords are entered. Keyloggers and screenloggers function as two complementary components in fraudulent activities.
3. Pop-Up Displays
Access authorizations are compromised through deceptive prompts asking users to input their user code and password on screens masquerading as notifications of malfunctions, development updates, access issues, or assistance offers. In this type of scam, the user is presented with a pop-up message claiming that certain programs cannot run due to a detected malfunction in their machine. The same message offers the user a free utility, urging them to “install it now.”
4. Spam E-mails
These emails, often referred to as spam messages, may contain malware or redirect users to sites that distribute malware.

5. Technological Equipment

Malicious actors capture private information using malware and other technological methods. The target of this method is personal information used for financial transactions and passwords set by the individual themselves. Having obtained this information, the fraudster also needs to obtain the OTP of the single-use SMS sent to the customer’s phone. Pursuant to current legal regulations, payment service providers are implementing various measures to prevent this risk.
Mobile Security
Make sure that you have installed the latest security patches provided by the manufacturer on your computer and mobile devices, including tablets and cell phones. Avoid installing operating systems or system software that are not provided or approved by the original manufacturer on these devices. If security software, such as anti-virus software, is available for the devices you use, ensure to utilize it and verify that it remains active and up-to-date at all times.
Keep Your Connection Secure

When using Octet apps, always make sure you have a secure connection with us. To check whether you have established a secure connection, check the address in the address bar of your web browser and confirm that it starts with https://. Additionally, ensure that there is a lock icon at either the left or right end of your address bar, indicating that your connection is encrypted. Modern browsers will display a warning either before you open our page or in the address bar if there is an error in the encryption of your connection. If you encounter such a warning while using our systems, do not enter any information on your screen and promptly contact us at destek@octet.com.tr or by phone at +90 850 360 1511.

Protect Your Data
Do not disclose your passwords, credit card information, e-mails sent by Octet to your email address, and authentication codes sent to your mobile phone to anyone, including Octet staff, whether internal or external, for any reason. If a situation arises where you believe it necessary to share information within the company, your organization should contact Octet and undertake the necessary steps to open a separate user account for the other individual within your company, in accordance with the Octet Terms of Use and User Agreement.
Don’t Fall for a Phishing Email!

Octet will never send e-mails to your e-mail address asking for your personal information or password! If you receive such an e-mail, please contact us at destek@octet.com.tr or +90 850 360 360 1511 without entering any information.

Use a Strong Password
Do not keep your passwords open on your computer, cell phone, electronic mailbox or e-mail address for any reason. The safest approach is to memorize your passwords or keep them in a secure password management application designed for this purpose.
Internet Security
Exercise extra caution when connecting your devices to the internet via wireless networks in public areas. When connecting to the internet in these areas, ensure that you establish a secure connection to websites where you enter personal data or passwords, and verify that the security software on your device is active.
Stay up to date
Access to Octet’s systems is exclusively through your web browser using our web applications. Please use web browsers with the up-to-date version when accessing our applications.
Keep Your Account Secure
If you intend to leave your computer after using Octet applications, make sure you log out using the option in the user menu located at the top right corner.
Protect Your Passwords
Do not keep your passwords open on your computer, cell phone, electronic mailbox or e-mail address for any reason. The safest approach is to memorize your passwords or keep them in a secure password management application designed for this purpose.
Stay Vigilant against Suspicious Calls

Stay vigilant against people claiming to be calling you from Octet and asking for information. Confirm that the caller ID belongs to Octet. Only the relevant representative contacts our customers by Octet. If you do not recognize the caller and are in doubt, end the call and contact your customer representative to report the situation. If you cannot reach your customer representative, please contact us at destek@octet.com.tr e-mail address or +90 850 360 1511.

When creating your passwords;

  • Create long passwords instead of short passwords. Passwords of at least 8 characters are recommended.
  • Make sure your passwords contain at least one lowercase letter, uppercase letter, number and special symbol. When creating passwords, avoid common user habits such as capitalizing only the first letter and ending with exclamation points or periods.
  • Do not repeat the same character or number more than twice in your passwords.
  • Do not use consecutive series of digits (such as “123”), alphabetic series (such as “abc”) or series based on keyboard layout (such as “qwerty”) in your passwords.
  • Do not use your name, date of birth or pet’s name in your passwords, as they can be found by your social media account or by others.
  • Change your passwords at most every three months. Show ultimate attention that the passwords you change have fewer characters in common with the previous ones. For example, do not use the same password for a long time by adding the year and month you changed your password to the end of your password.
  • Do not use the same password in more than one system. Set a different password for each system that holds your confidential data.

If you believe that your passwords or personal information have been compromised by unauthorized persons, please contact us at destek@octet.com.tr or +90 850 360 1511.
We recommend you to read the document titled “Fraud Detection and Prevention Methods” prepared by the Banks Association of Türkiye, which we believe will contribute to your safe use of financial systems.