OUCU Alert
All branches will be closed Monday, February 17, in observance of the federal holiday.
Open Your Wallet
Routing Number: 272479663
Swift Code: MSUCUS44
 
Open Your Wallet
×

Your Wallet

It looks like your wallet is currently empty.
You may be interested in...

Totally Gold Checking
Totally Gold Checking
SmartLine Home Equity Loan
SmartLine Home Equity Loan
Icon ImageIcon Image

Security Center

Spoofing
Spoofing attempts to manipulate recipients into providing sensitive information to unauthorized parties by impersonating another person or entity. Spoofing may be in the form of email, text message, or phone call by someone claiming to be a trusted organization such as MSUFCU.
 
Icon Image
Spoofing
Spoofing attempts to manipulate recipients into providing sensitive information to unauthorized parties by impersonating another person or entity. Spoofing may be in the form of email, text message, or phone call by someone claiming to be a trusted organization such as MSUFCU.
 
Phone and Visa Scams
Automated phone calls posing as trusted businesses or organizations state that the recipient's card has been deactivated. To reactivate the card, they need to enter a full debit or credit card number as well as other card information.
 
Icon Image
Phone and Visa Scams
Automated phone calls posing as trusted businesses or organizations state that the recipient's card has been deactivated. To reactivate the card, they need to enter a full debit or credit card number as well as other card information.
 
Romance Scams
Scammers will set up phony profiles on social media, or dating websites often with fake photographs and identities, and develop online friendships with other users. Once the scammers have gained the trust of their new online friend, they will request money for a variety of seemingly urgent situations.
 
Icon Image
Romance Scams
Scammers will set up phony profiles on social media, or dating websites often with fake photographs and identities, and develop online friendships with other users. Once the scammers have gained the trust of their new online friend, they will request money for a variety of seemingly urgent situations.
 
Credential Stuffing
Credential Stuffing is a type of cyberattack where stolen account usernames, passwords, email addresses, etc. are pushed, or "stuffed," into a website or web application in large volumes to attempt to gain unauthorized access to user accounts. This attempt can often be defeated by using a unique username and password for each website or application.
 
Icon Image
Credential Stuffing
Credential Stuffing is a type of cyberattack where stolen account usernames, passwords, email addresses, etc. are pushed, or "stuffed," into a website or web application in large volumes to attempt to gain unauthorized access to user accounts. This attempt can often be defeated by using a unique username and password for each website or application.
 
Card Cracking
Card cracking occurs when a scammer asks you for your checking account information or debit card and PIN. Then, scammers deposit fake checks, or counterfeit bills, and immediately withdraws the money, giving some of the cash to you.

Selling your ATM or Visa Debit Card and PIN is a crime. If a PIN is knowingly compromised, the account holder (not the "card buyer") is responsible for any wrongdoing in the account.
 
Icon Image
Card Cracking
Card cracking occurs when a scammer asks you for your checking account information or debit card and PIN. Then, scammers deposit fake checks, or counterfeit bills, and immediately withdraws the money, giving some of the cash to you.

Selling your ATM or Visa Debit Card and PIN is a crime. If a PIN is knowingly compromised, the account holder (not the "card buyer") is responsible for any wrongdoing in the account.
 
Check Payment and
Money Transfer Scams
A buyer may be interested in purchasing an item you are selling and offers to overpay you with a cashier's check or wire. The buyer then requests that you return the remaining funds to them via wire transfer, MoneyGram, or Western Union. The payment sent to you via check or wire is fraudulent; no funds exist to cover the payment or the money you returned to the payee via your personal check.
 
Icon Image
Check Payment and
Money Transfer Scams
A buyer may be interested in purchasing an item you are selling and offers to overpay you with a cashier's check or wire. The buyer then requests that you return the remaining funds to them via wire transfer, MoneyGram, or Western Union. The payment sent to you via check or wire is fraudulent; no funds exist to cover the payment or the money you returned to the payee via your personal check.
 
Employment Scams
Scammers will post employment offers on Facebook and other platforms to bait you for personal information. If you contact the scam artist about the job, they will offer to set up direct deposit for you, requiring you provide them with your account number and other personal information.
 
Icon Image
Employment Scams
Scammers will post employment offers on Facebook and other platforms to bait you for personal information. If you contact the scam artist about the job, they will offer to set up direct deposit for you, requiring you provide them with your account number and other personal information.
 
Text Message Scams
Text message scams, or "smishing," is when a scam artist poses as a financial institution, government agency, or business stating that the recipient's account has been closed or locked out, and to have it reinstated or unlocked they must provide their personal or financial information. This type of message is fraudulent.
 
Icon Image
Text Message Scams
Text message scams, or "smishing," is when a scam artist poses as a financial institution, government agency, or business stating that the recipient's account has been closed or locked out, and to have it reinstated or unlocked they must provide their personal or financial information. This type of message is fraudulent.
 
ATM Scams
Equipment like hidden cameras, card scanners and skimmers can be illegally added to ATMs. These devices allow a thief to video record your PIN and scan your card number. The false scanner may also be set up to "capture" your card so that it is not returned. Once you have left the ATM, the thief returns and collects your card.
 
Icon Image
ATM Scams
Equipment like hidden cameras, card scanners and skimmers can be illegally added to ATMs. These devices allow a thief to video record your PIN and scan your card number. The false scanner may also be set up to "capture" your card so that it is not returned. Once you have left the ATM, the thief returns and collects your card.