Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/29/2020
02:00 PM
Uri Rivner
Uri Rivner
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
Google+
RSS
E-Mail vvv
50%
50%

7 Fraud Predictions in the Wake of the Coronavirus

It's theme and variations in the fraud world, and fraudsters love -- and thrive -- during chaos and confusion

An unprecedented global virus outbreak is just what the cyberfraudster ordered. Confusion, chaos, and abrupt changes in digital user behavior can help the sharp-minded cybercriminal exploit the current crisis to prey on unsuspecting victims. 

So, what should we expect in the coming weeks and months? Here are our seven biggest predictions.

1. Stimulus Fraud 
American taxpayers who fall under the stimulus income threshold but have not filed their taxes for 2018-2019 won't get a direct deposit unless they file a return. This will trigger a race between taxpayers trying to file returns, and criminals who will beat them to it and provide a bank account that they control for stealing stimulus deposits. Fraudsters will also try to obtain past tax filings from the tax authorities or online accounting services so they can be used as a baseline for fraudulent returns with altered bank account details, Fraudsters will also attempt to impersonate small businesses to apply for stimulus loans using similar methods.

2. Corona Tracker Rogue Apps
Cyber space is teeming with coronavirus scams. Some fraudsters will try to get passwords to email accounts and other sites; others will try to get ransomware onto the user's mobile or PC. The most dangerous scams, though, will be those that manage to trick users into downloading rogue apps. They'll look like the real McCoy, promising tools like alerting you when a coronavirus carrier is in your immediate vicinity or providing CDC-approved virus contagion maps. But in reality, they're after your mobile banking app and mobile e-commerce purchases.

3. It's Mule Time
Account Takeover (ATO) fraud typically requires cashing out the victim's account through a mule – a collaborator with a bank account in the victim's country. Mule recruitment was at an all-time high in 2008-2009 following the big recession, when people eagerly replied to any work-from-home offer, often not realizing it was coming from a crime ring. With the latest jobs report showing that there could be more Americans unemployed right now than at any time in US history, mule recruitment should be even easier – and will fuel the dark economy.

4. Fraudulent Credit Card Accounts to Surge
With many people experiencing a drop in income, those who can get their hands on new credit lines are expected to do so – but the only way open for them is through their credit card website. This means an overall increase in online credit card applications. Fraudsters are likely to try to leverage the trend, hiding in the general noise and reduced ability to investigate suspect cases. It will take some time to recognize the steepness in losses because the criminals will first have to get their hands on the physical cards, then use them online. To complicate that, there will also be an increase in credit defaults, which are hard to distinguish from fraudulent account openings.

5. Online Loan Application Fraud
Lenders are tightening their credit controls to make sure the applicant still has an income. To offset the drop in new acquisitions, they may relax some fraud controls, letting more people in, including more fraudsters. In any case, account openings for online loans are a lucrative target: They require little setup beyond acquiring a list of stolen identity records and some other precautions around device and email analysis. Once the money is handed out, it's easy to grab it and run. 

6. Social Engineering… From 'Your Bank' 
"Hey, we're your bank, and wanted to reach out! The branch is closed, so we're the friendly helpdesk. We've noticed some issues in your account, and would like to help you sort it out. Can you please install this utility to help us run some tests remotely?" You know the rest of this story.

7. Deep Social Engineering Hits US
The Brits call it Authorized Push Payments. The Dutch are seeing it as their top emerging trend. But the US has yet to see this clever voice scam that tricks unsuspecting users into logging into their online bank account and simply moving all their money to a new, safe bank account, opened due to a fraud incident. These scams are extremely effective and defeat all controls such as authentication, device, and location analysis. The only remedy is to look at cognitive traits such as signs of hesitation, duress, and being guided.

There's a narrow window of opportunity in which online fraud warfare will become even more one-sided than in normal times. Knowing what to expect from online fraudsters is the first step toward stopping them.

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Uri Rivner, Co-Founder and Head of Cyber Strategy at BioCatch is recognized globally as an industry expert on cybercrime and advanced threats. He is a regular speaker in the leading security and cyber conferences, and writes a cyber-security blog read by thousands of ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/30/2020 | 3:11:50 PM
Re: Bank account
This is advice that needs to be heeded. Same goes for if you receive a call that you are suspicious of, go to the actual website find the phone number and call them. 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/30/2020 | 2:07:23 PM
Re: Good days
Agreed and they never fail to miss an opportunity. Its somewhat sad really.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/29/2020 | 8:00:41 PM
Bank account
But the US has yet to see this clever voice scam that tricks unsuspecting users into logging into their online bank account Never access your bank via a link, always go to their site directly.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/29/2020 | 7:56:18 PM
Mule
With the latest jobs report showing that there could be more Americans unemployed right now than at any time in US history, mule recruitment should be even easier I keep getting those types of emails for long time, did not see any increase yet.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/29/2020 | 7:52:30 PM
Covid-19
Cyber space is teeming with coronavirus scams. Some fraudsters will try to get passwords to email accounts and other sites; others will try to get ransomware onto the user's mobile or PC. Lists of miss infuriation about this pandemic, so better to use well known apps.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/29/2020 | 7:49:50 PM
Fraud
American taxpayers who fall under the stimulus income threshold but have not filed their taxes for 2018-2019 won't get a direct deposit unless they file a return. Good opportunity for fraud. People are confused and that creates vulnerabilities.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/29/2020 | 7:46:23 PM
Good days
Confusion, chaos, and abrupt changes in digital user behavior can help the sharp-minded cybercriminal exploit the current crisis to prey on unsuspecting victims. Really good days for hackers to attack vulnerable people.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
GDPR Enforcement Loosens Amid Pandemic
Seth Rosenblatt, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4306
PUBLISHED: 2020-05-29
IBM Planning Analytics Local 2.0.0 through 2.0.9 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 17...
CVE-2020-4352
PUBLISHED: 2020-05-29
IBM MQ on HPE NonStop 8.0.4 and 8.1.0 is vulnerable to a privilege escalation attack when running in restricted mode. IBM X-Force ID: 178427.
CVE-2020-4490
PUBLISHED: 2020-05-29
IBM Business Automation Workflow 18 and 19, and IBM Business Process Manager 8.0, 8.5, and 8.6 could allow a remote attacker to bypass security restrictions, caused by a reverse tabnabbing flaw. An attacker could exploit this vulnerability and redirect a vitcim to a phishing site. IBM X-Force ID: 18...
CVE-2020-5572
PUBLISHED: 2020-05-29
Android App 'Mailwise for Android' 1.0.0 to 1.0.1 allows an attacker to obtain credential information registered in the product via unspecified vectors.
CVE-2020-5573
PUBLISHED: 2020-05-29
Android App 'kintone mobile for Android' 1.0.0 to 2.5 allows an attacker to obtain credential information registered in the product via unspecified vectors.