A terminal takeover occurs when a scammer physically gain control of your HICAPS terminal, often by distracting your staff. They rekey a transaction or use a stolen card number to make fraudulent purchases. They could also enter a stolen card's details and artifically inflate the transaction amount before demanding a refund onto a different card.
To identify if a transaction was manually entered, look for an indicator such as (m) on the receipt, showing the card details were "hand-keyed".
In the above example, the '(m)' displayed after the last 4 digits of card shows that the transaction was 'hand-keyed'. When refunding, make sure to always refund to the same card.
The below codes indicate the card payment method:
Terminal theft involves criminals stealing your HICAPS Terminal and replacing it with a compromised one. This could expose your business to chargebacks or unauthorised refunds processed to the theef's account. that looks the same.
How can I prevent terminal theft?
Refund scams occur when a customer asks for a refund to a card different from the one used for the origincal transaction. Refund must always be processed back to the original payment card.
How to prevent refund scams?
Learn more:
If you need further guidance on securing your HICAPS terminal refer to the HICAPS Trinity User Guide
We work closely with industry and regulatory bodies to keep you informed and protected. Here are some helpful resources:
Stay informed and protect your business with these free security toolkits: