Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:00 PM
Uri Rivner
Uri Rivner
Connect Directly
E-Mail vvv

7 Fraud Predictions in the Wake of the Coronavirus

It's theme and variations in the fraud world, and fraudsters love -- and thrive -- during chaos and confusion

An unprecedented global virus outbreak is just what the cyberfraudster ordered. Confusion, chaos, and abrupt changes in digital user behavior can help the sharp-minded cybercriminal exploit the current crisis to prey on unsuspecting victims. 

So, what should we expect in the coming weeks and months? Here are our seven biggest predictions.

1. Stimulus Fraud 
American taxpayers who fall under the stimulus income threshold but have not filed their taxes for 2018-2019 won't get a direct deposit unless they file a return. This will trigger a race between taxpayers trying to file returns, and criminals who will beat them to it and provide a bank account that they control for stealing stimulus deposits. Fraudsters will also try to obtain past tax filings from the tax authorities or online accounting services so they can be used as a baseline for fraudulent returns with altered bank account details, Fraudsters will also attempt to impersonate small businesses to apply for stimulus loans using similar methods.

2. Corona Tracker Rogue Apps
Cyber space is teeming with coronavirus scams. Some fraudsters will try to get passwords to email accounts and other sites; others will try to get ransomware onto the user's mobile or PC. The most dangerous scams, though, will be those that manage to trick users into downloading rogue apps. They'll look like the real McCoy, promising tools like alerting you when a coronavirus carrier is in your immediate vicinity or providing CDC-approved virus contagion maps. But in reality, they're after your mobile banking app and mobile e-commerce purchases.

3. It's Mule Time
Account Takeover (ATO) fraud typically requires cashing out the victim's account through a mule – a collaborator with a bank account in the victim's country. Mule recruitment was at an all-time high in 2008-2009 following the big recession, when people eagerly replied to any work-from-home offer, often not realizing it was coming from a crime ring. With the latest jobs report showing that there could be more Americans unemployed right now than at any time in US history, mule recruitment should be even easier – and will fuel the dark economy.

4. Fraudulent Credit Card Accounts to Surge
With many people experiencing a drop in income, those who can get their hands on new credit lines are expected to do so – but the only way open for them is through their credit card website. This means an overall increase in online credit card applications. Fraudsters are likely to try to leverage the trend, hiding in the general noise and reduced ability to investigate suspect cases. It will take some time to recognize the steepness in losses because the criminals will first have to get their hands on the physical cards, then use them online. To complicate that, there will also be an increase in credit defaults, which are hard to distinguish from fraudulent account openings.

5. Online Loan Application Fraud
Lenders are tightening their credit controls to make sure the applicant still has an income. To offset the drop in new acquisitions, they may relax some fraud controls, letting more people in, including more fraudsters. In any case, account openings for online loans are a lucrative target: They require little setup beyond acquiring a list of stolen identity records and some other precautions around device and email analysis. Once the money is handed out, it's easy to grab it and run. 

6. Social Engineering… From 'Your Bank' 
"Hey, we're your bank, and wanted to reach out! The branch is closed, so we're the friendly helpdesk. We've noticed some issues in your account, and would like to help you sort it out. Can you please install this utility to help us run some tests remotely?" You know the rest of this story.

7. Deep Social Engineering Hits US
The Brits call it Authorized Push Payments. The Dutch are seeing it as their top emerging trend. But the US has yet to see this clever voice scam that tricks unsuspecting users into logging into their online bank account and simply moving all their money to a new, safe bank account, opened due to a fraud incident. These scams are extremely effective and defeat all controls such as authentication, device, and location analysis. The only remedy is to look at cognitive traits such as signs of hesitation, duress, and being guided.

There's a narrow window of opportunity in which online fraud warfare will become even more one-sided than in normal times. Knowing what to expect from online fraudsters is the first step toward stopping them.

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Uri Rivner, Co-Founder and Head of Cyber Strategy at BioCatch is recognized globally as an industry expert on cybercrime and advanced threats. He is a regular speaker in the leading security and cyber conferences, and writes a cyber-security blog read by thousands of ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-20
A vulnerability of Helpcom could allow an unauthenticated attacker to execute arbitrary command. This vulnerability exists due to insufficient authentication validation.
PUBLISHED: 2021-04-20
vscode-restructuredtext before 146.0.0 contains an incorrect access control vulnerability, where a crafted project folder could execute arbitrary binaries via crafted workspace configuration.
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** The AdTran Personal Phone Manager software is vulnerable to an authenticated stored cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed....
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** The AdTran Personal Phone Manager software is vulnerable to multiple reflected cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed. Only...
PUBLISHED: 2021-04-20
** UNSUPPORTED WHEN ASSIGNED ** AdTran Personal Phone Manager 10.8.1 software is vulnerable to an issue that allows for exfiltration of data over DNS. This could allow for exposed AdTran Personal Phone Manager web servers to be used as DNS redirectors to tunnel arbitrary data over DNS. NOTE: The aff...