Some Resourceful fraudsters are modifying faux POS terminals to provide the credentials of actual retailers. Then they conduct fraudulent return transactions to load gift cards or debit cards, then money out the stolen income at ATMs.Creating a cloned credit score card. Crooks use stolen facts to clone credit cards and make fraudulent purchases Tog