life as a fraudster: fraud university

Post on 16-Apr-2017

471 Views

Category:

Software

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

| Request a DemoShare on

Welcome to College, Kid.

Life As A Fraudster: Fraud University

| Request a DemoShare on

Decided on Your Major, Yet?

| Request a DemoShare on

Common Types of Fraudsters

Malware Writer Phisher/Spoofer Skimmer

Card Counterfeiter Underground Marketplace Seller

Mule/Shopper

| Request a DemoShare on

Hey, I Love Fishing! Last Weekend, I Caught a 12-Pound…

| Request a DemoShare on

Wrong Kind of Phishing, Kid. Yeesh! You Need Training.

| Request a DemoShare on

Let’s Review Our Online Curriculum.

| Request a DemoShare on

Fraudsters train on

nomenclature to understand

techniques

Online access to malware, skimmers, and more

Zero cost of entry for fraudsters

ACTUAL FRAUD COURSE ON DARKNET / CRYPTONET

| Request a DemoShare on

Great. Now, How Do I Make Money?

| Request a DemoShare on

Easy Kid. Next Is the Finance Unit in the Course.

| Request a DemoShare on

Multiple articles describing different techniques for turning fraud into cash

ACTUAL FRAUD COURSES ON DARKNET / CRYPTONET

| Request a DemoShare on

Sweet! Anything Else?

| Request a DemoShare on

Communications and Security Units Are Next.

| Request a DemoShare on

DARKNETS AND CRYPTONETS EVEN HAVE ONLINE ADS!

VPNs keep communications secret, hide financial

transactions, and more

Proxy servers mask IP address and hide true location

Online training and recruiting by criminal gangs

| Request a DemoShare on

Think I’m Ready for the Big Time. Something in Management?

| Request a DemoShare on

You Gotta Start at the Bottom and Work Your Way Up, Kid.

| Request a DemoShare on

Organized, professional criminal organizations

Executives Financiers

Trainers

Operators

Managers

Mules Shoppers Even Internships!

Coders

| Request a DemoShare on

If I’m Going to Be Entry Level, Phishing Sounds Like Fun…

| Request a DemoShare on

“[It’s] ridiculously easy to do. Anyone with a computer and $100 could start making money tomorrow.”

Dan DeFelippi(convicted of credit

card fraud and ID theft)

Suspicious From: address

Actual logo Trojan:

JS/Agent malware payload

Official-looking copyright

Real phone numbers, even TDD/TTY info!

| Request a DemoShare on

Ridiculously Easy? That’s My Kind of Work!

| Request a DemoShare on

You Can Make Some Decent Money, Too, Kid.

| Request a DemoShare on

$1,237

Average monthly wage in countries with highest card fraud

$579

$710

$189

$603

South Africa

Russia

Romania

Venezuela

Brazil

$575Indonesia

Average CNP fraudster spends $900 in 5 days

$5,400per month

| Request a DemoShare on

All That’s Left is the Advanced Placement Unit: Synthetic IDs.

| Request a DemoShare on

Sounds Hard.

| Request a DemoShare on

Not To Worry, Kid. Data Breaches Make It Easy.

| Request a DemoShare on

Stolen personal data... Enables new fraud types…

Account Takeover: banking, credit card, Amazon, airline miles, and more.

Open New Accounts: credit card, insurance policies (file false claims), and more.

Synthetic ID: order tickets with airlines miles, take out loans, and more.

Where you work

What you earn

SSN

Email address

Mobile phone number

000-00-0000

| Request a DemoShare on

1. Fraudster buys one of 113 million stolen Social Security Numbers (SSNs)

2. Combines SSN + fictitious names, emails and addresses, to open credit card accounts

3. Fraudster maxes out first “legitimate” credit card account, moves on to next

4. No real person affected, so no fraud reported,continues maxing out accounts

Synthetic Identity

| Request a DemoShare on

What About The Cops?

| Request a DemoShare on

Don’t Sweat It, Kid. They’ll Never Lay a Finger on You.

| Request a DemoShare on

76 countries have no extradition treaty with the United States

| Request a DemoShare on

Dude, I Ain’t Living In Moldova!

| Request a DemoShare on

Even if You Work Inside the U.S., Nothing’s Gonna Happen, Kid.

| Request a DemoShare on

CNP fraud not #1 priority

• $250,000 threshold PER INCIDENT before Feds get involved

• Counter-terrorism efforts take up most of cybercrime resources, manpower, and expertise

• Interagency/interstate conflicts make enforcement tough for local authorities

| Request a DemoShare on

However, Kount helps fight bad guys by providing data to build a case…

1. CrimeProve criminalintent

2. VictimShow you arevictim of creditcard fraud

3. EvidenceTie fraudsterto fraudulenttransaction

4. JurisdictionContact policewhere goodswere shipped

| Request a DemoShare on

So the Only Thing Left to Stop Me is the Merchant?

| Request a DemoShare on

Yep.

| Request a DemoShare on

HA HAHA! HAHA HA HAHA HA HAHA! HAHA HA HAHA HA!

HAHA HA HAHA!

| Request a DemoShare on

He Spent the Last Week Studying Fraud. Have You Spent the Last

Week Studying Fraud Prevention?

| Request a DemoShare on

Good One, Kid. You’ve Graduated.

Fight the Fraudsters with Kount Complete™

Share on Request Demo|

top related