Some Imaginative fraudsters are modifying bogus POS terminals to hold the qualifications of genuine retailers. Then they perform fraudulent return transactions to load reward cards or debit cards, then dollars out the stolen money at ATMs.Developing a cloned credit score card. Crooks use stolen details to clone credit rating cards and make fraudule