Thereâs more to the $25 million deepfake story than what you see in the headlines. I pulled the original story to get the full scoop. Here are the steps the scammer took: 1. The scammers sent a phishing email to up to three finance employees in mid-January, saying a âsecret transactionâ had to be done. 2. One of the finance employees fell for the phishing email. This led to the scammers inviting the finance employee to a video conference. The video conference included what appeared to be the company CFO, other staff, and some unknown outsiders. This was the deep fake technology at work, mimicking employees' faces and voices. 3. On the group video conference, the scammers asked the finance employee to do a self-introduction but never interacted with them. This limited the likelihood of getting caught. Instead, the scammers just gave orders from a script and moved on to the next phase of the attack. 4. The scammers followed up with the victim via instant messaging, emails, and one-on-one video calls using deep fakes. 5. The finance employee then made 15 transfers totaling $25.6 million USD. As you can see, deep fakes were a key tool for the attacker, but persistence was critical here too. The scammers did not let up and did all that they could to apply pressure on the individual to transfer the funds. So, what do businesses do about mitigating this type of attack in the age of deep fakes? - Always report suspicious phishing emails to your security team. In this context, the other phished employees could have been an early warning that something weird was happening. - Trust your gut. The finance employee reported a âmoment of doubtâ but ultimately went forward with the transfer after the video call and persistence. If something doesnât feel right, slow down and verify. - Lean into out-of-band authentication for verification. Use a known good method of contact with the individual to verify the legitimacy of a transaction. - Explore technology driven identify verification platforms for high dollar wire transfers. This can help reduce the chance of human error. And one of the best pieces of advice I saw was from Nate Lee yesterday, who called out building a culture where your employees are empowered to verify transaction requests. Nate said the following âThe CEO/CFO and everyone with power to transfer money needs to be aligned on and communicate the above. You want to ensure the person doing the transfer doesn't feel that by asking for additional validation that they're pushing back against or acting in a way that signals they don't trust the leader.â Stay safe (and real) out there. ------------------------------ ð Interested in leveling up your security knowledge? Sign up for my weekly newsletter using the blog link at the top of this post.
Fraud Prevention Insights
Explore top LinkedIn content from expert professionals.
-
-
Welcome to ðð¡ð ððð²ð¦ðð§ðð¬ ðððððð¦ð² by Checkout.com â Episode 6 ð ðð¡ð ðð²ð©ðð¬ ð¨ð ð ð«ðð®ð ð¢ð§ ððð²ð¦ðð§ðð¬: ⺠Fraud in payments is a growing challenge for merchants, issuers, and payment processors. Fraudulent transactions not only cause financial losses but also damage a merchantâs reputation ⺠To combat fraud effectively, businesses must leverage fraud detection tools, authentication techniques, and dispute management strategies to stay ahead of bad actors while maintaining a seamless customer experience â ðð¡ð ðð²ð©ðð¬ ð¨ð ð ð«ðð®ð & ðð±ðð¦ð©ð¥ðð¬ ⺠3-ððð«ðð² ð ð«ðð®ð â This occurs when a fraudster uses stolen card details to make purchases. ⺠ð ð«ð¢ðð§ðð¥ð² ð ð«ðð®ð â A cardholder disputes a legitimate transaction, either by mistake or to reverse a purchase. ⺠ðð¨ð¨ð ð ðð¢ðð¡ ððð²ð¦ðð§ð ðð¢ð¬ð©ð®ððð¬ â The customer disputes a payment due to issues with product quality or fulfillment. Fraud prevention strategies must be tailored to identify, assess, and respond to these types of fraud in real time. â ðð¡ð ðð«ð¨ððð¬ð¬: ðð®ððð¢ð§ð ðð¨ð°ð§ ð¨ð§ ððð«ð ð ð«ðð®ð 1ï¸â£ ð ð«ðð®ð ððððððð¢ð¨ð§ ðð§ð ð¢ð§ðð¬ â These tools analyze transaction data (e.g., IP addresses, device data...) to assess fraud risks. 2ï¸â£ 3ð ðððð®ð«ð ðð®ðð¡ðð§ðð¢ðððð¢ð¨ð§ â Adds an extra layer of protection by requiring customer verification for high-risk transactions. 3ï¸â£ ðððð¡ð¢ð§ð ðððð«ð§ð¢ð§ð & ðð â Predicts fraud patterns based on historical transactions and behavioral analytics. 4ï¸â£ ðð¨ð¤ðð§ð¢ð³ððð¢ð¨ð§ â Converts sensitive payment data into tokens, reducing the risk of stolen card details being misused. 5ï¸â£ ðð¡ðð«ð ððððð¤ ðð«ðð¯ðð§ðð¢ð¨ð§Â â Strategies like real-time alerts and clear billing descriptors â ðð¡ð ðððð: ððð² ðððð ðð¨ð¢ð§ðð¬ ðð¨ ðððð®ðð ð ð«ðð®ð Fraud detection relies on rich transaction data to identify suspicious activity and block fraudulent payments: ⺠Customer Name â Verifies the cardholderâs identity and checks for patterns of fraudulent behavior (e.g., fake names...). ⺠IP Address â Flags transactions from high-risk regions or locations inconsistent with the customerâs normal behavior. ⺠Billing Address â Used for Address Verification System (AVS) checks to confirm that the billing address matches the cardholderâs bank records. ⺠Delivery Address â Helps detect fraudulent transactions by assessing mismatched shipping details. ⺠Email Address â Identifies fraud patterns, such as disposable email addresses or emails associated with prior chargebacks. Providing complete and accurate data in payment requests enhances fraud detection and reduces false declines, improving both security and conversion rates. ââ Source: Checkout.com x Connecting the dots in payments... ⺠Sign up to ðð¡ð ððð²ð¦ðð§ðð¬ ðð«ðð°ð¬ : https://lnkd.in/g5cDhnjC ⺠Connecting the dots in payments... and Marcel van Oost
-
ð¨ Wake-Up Call: The Alarming Rise of Sophisticated Cryptocurrency Scams ð¨ I just got off the phone with another victim who fell for a classic #pigbutchering scam. This one hurtâa six-figure loss that left the victim devastated. But what really got my attention? The level of sophistication these cybercriminals are now operating with. Hereâs how they did it: ðª The Setup: They roped the victim in with a seemingly legitimate training class, building trust and setting the stage for the scam. ð¬ Transition to Private Messaging: Next, they moved the conversation to WhatsApp and Telegramâaway from prying eyes and into their carefully controlled environment. ð± The Fake Trading App: The victim was then instructed to download a fake trading app. This app made it look like the victim was making money hand over fist, all while the scammers had full control. ð° The Money Transfer: Hereâs the kicker. When the victim went to the bank to wire the money, they were told not to mention that it was for a cryptocurrency investment. The scammers spun a tale about how it would negatively impact the bankâs deposits and tax implications. This is where the bad guys are really stepping up their game. Take a look at the photo I attachedâtheyâre getting better at this. ð The Loss: After the wire transfer, the victim was left with nothing but a fake app and a huge financial loss. The money was gone, and the scammers had vanished. This isnât just a storyâitâs a wake-up call. These criminals are getting smarter, but so can we. Here are 5 Tips to Avoid Falling Victim: ð 1. Beware of Unsolicited Investment Offers: If someone promises you guaranteed returns out of the blue, run the other way. Scams like these prey on hope and desperation. ð 2. Verify Before Trusting: Always do your homework. Research the platform, check reviews, and if something feels off, trust your gut. A quick check can save you from a world of pain. ð 3. Be Transparent with Your Bank: If youâre being told to keep secrets from your bank, thatâs a giant red flag. Transparency with your financial institution is your best defense. ð 4. Resist High-Pressure Tactics: Scammers love to rush you. Theyâll create a false sense of urgency to get you to act without thinking. Slow down, take your time, and make informed decisions. ð 5. Stay Informed and Educated: The more you know, the harder you are to scam. Keep yourself updated on the latest fraud tactics and share that knowledge with others. #Cybercriminals are evolving, but by adopting a @CyberSecure Mindset, you can stay one step ahead. Protect your hard-earned money and your peace of mind. For more on how to develop a #CyberSecure Mindset, visit www.cybersecuremindset.com. #CyberSecurity #CryptocurrencyScams #CyberSecureMindset #OnlineSafety #ScamAwareness #StayVigilant #DigitalDefense
-
Letâs take a moment to address a serious issue that affects many customers: credit card scams. With the rise of digital transactions, itâs more important than ever to stay vigilant and informed. As a technology leader at Chase, I wanted to share a few tips to help you safeguard your financial information: 1. Monitor Your Accounts: Regularly check your bank and credit card statements for any unauthorized transactions. Report any suspicious activity immediately. 2. Utilize Chase's Credit Journey ID Monitoring: Take advantage of our Credit Journey service, which provides free credit monitoring and alerts calling out changes to your credit report. Anyone can use this free tool can help you spot potential fraud early. You donât have to be a Chase customer. 3. Beware of Phishing Scams: Be cautious of unsolicited emails, texts or phone calls asking for personal information. Always verify the source before sharing any sensitive data. 4. Use Strong Passwords: Create complex passwords for your online accounts and change them regularly. Consider using a password manager to keep track of them securely. 5. Enable Two-Factor Authentication: Adding an extra layer of security can significantly reduce the risk of fraud. Whenever possible, enable two-factor authentication on your financial accounts. 6. Stay Informed: Educate yourself about the latest scams and tactics used by fraudsters. Knowledge is one of the best defenses against becoming a victim. At Chase, we are committed to keeping your information safe and secure. Our advanced security measures help protect your accounts, but your vigilance is crucial. Together, we can combat credit card fraud and keep our communities safe. Check out this recent post to learn more about steps you can take if you suspect your identity has been stolen. Stay alert and protect your financial well-being! #FraudPrevention #SecurityFirst #CreditJourney
-
The Identity Theft Resource Center recently reported a 312% spike in victim notices, now reaching 1.7 billion for 2024. AI is transforming identity theft from something attackers did manually to full-scale industrialized operations. Look at what happened in Hong Kong: a clerk wired HK$200M to threat actors during a video call where every participant but one was an AI-generated deepfake. Only the victim was real. Hereâs what you need to know ð 1. Traditional authentication wonât stop these attacks. Get MFA on everything, prioritize high-value accounts. 2. Static identity checks aren't enoughâswitch to continuous validation. Ongoing monitoring of access patterns is essential after users log in. 3. Incident response plans have to address synthetic identity threats. Focus your response on critical assets. 4. Some organizations are using agentic AI to analyze identity settings in real time, catching out-of-place activity that basic rules miss. Passing a compliance audit doesnât mean youâre protected against these attacks. The old âauthenticate onceâ mindset needs to move to a model where verification is continuous and context-aware. If your organization is seeing similar threats, how are you adapting to push back against AI-driven identity attacks? #Cybersecurity #InfoSec #ThreatIntelligence
-
Fraudulent activities pose a significant threat to many businesses, making it crucial to detect and prevent them to protect both the company's reputation and bottom line. In a blog post by the engineering team from Booking.com, they share their innovative approach to combating fraud using graph technology. The rationale behind leveraging graph technology for fraud detection is straightforward: often, there are hidden links between various actors, identifiers, and transactions. For example, if an email address has been previously associated with fraudulent activity, it provides valuable context for future detection. This interconnected nature makes graph-based features highly effective for identifying fraud. The team at Booking built a graph using historical data, such as reservation requests. In this graph, nodes represent transaction identifiers like account numbers and credit card details, while edges connect identifiers that have been observed together before. When assessing fraud risk, they query the graph database to build a local graph centered around the request identifier, which helps to evaluate the likelihood of fraudulent behavior. One aspect that stands out is the dynamic visual representation of how the graph evolves with customer interactions, making it easier to understand the benefits of graph technology in fraud detection. It serves as a nice introduction to the potential of graph technology in combating fraudulent activities. #machinelearning #graph #datascience #analytics #fraud #detection â â â Check out the "Snacks Weekly on Data Science" podcast and subscribe, where I explain in more detail the concepts discussed in this and future posts:   -- Spotify: https://lnkd.in/gKgaMvbh   -- Apple Podcast: https://lnkd.in/gj6aPBBY   -- Youtube: https://lnkd.in/gcwPeBmR https://lnkd.in/gQAwSz7D
-
A few weeks ago, I shared how Iâd almost gotten scammed. And your support touched my heart.â¤ï¸ To say thank you, hereâs a quick list of 7 tips to protect yourself against scammers! //1 Where does their first message come from? Email is still the most traditional path for serious offers, alongside VO platforms.  Serious proposals are less likely to come through: - A text - Telegram - WhatsApp - Social media Of course, scammers do use email and real offers can come through other platforms. So think of this as one checkpoint to consider amidst other factors. //2 Do a mini background check. If they claim theyâre from a company, look into it: â Head to the website and look for them on the team page. â Search the company on LinkedIn and look for them under employees. If you canât find them, reach out to the company or to a higher-up on LinkedIn to verify. //3 Check the email domain. Often, there will be small differences in a scammerâs email domain. For instance, take apple. Their domain is @apple .com. The domain of someone scamming as Apple might look like: - ap-ple .com - apple_support .com - apple. .com //4 Check the body of the message. Often, youâll find: - Typos - Misspellings - Odd phrasing - A less professional tone - Line breaks that donât make sense //5 Ask for a deposit up-front. If itâs for a larger project, ask for a deposit up-front. If theyâre a scammer, theyâll either not respond or say no. But most true professionals will understand, respect, and consider your request. //6 Donât open a new bank account. No professional job offer will ask you to: - Send them money - Create a new bank account that requires a deposit to open If they ask for this, odds are theyâre a scam. Any professional should be able to use PayPal, Venmo, Zelle, or ACH deposits for any of the major banks. //7 Trust your gut If it feels off, trust that feeling. Do your due diligence. And if it feels like the pieces just arenât coming together, donât waste more of your time. Just block and move on. And if you feel like it, post about it in VO communities to help others avoid it in the future. (â¤ï¸ð Iâm so grateful that others posted about the scammers pretending to be TransPerfect so I could avoid the scam myself!) __ Of course, none of these are foolproof, and scammers get trickier every day. But it at least gives you a starting point for vetting suspicious jobs! â Anything youâd add to the list? #scams #voiceover #bestpractices #transperfect
-
Investor Alert: Beware of Social Media 'Investment Group' Imposter Scams FINRA has seen a recent significant rise in investor complaints due to fraudulent "investment groups" promoted across social media. #Scammers pose as registered investment advisers, advertising "stock investment groups" on platforms like Instagram, later shifting to encrypted group chats on WhatsApp to pitch investments. Since November, FINRA has received numerous investor complaints, alleging losses totaling millions of dollars. Sadly, this might be just the beginning. These imposters falsely portray themselves as registered professionals, often fraudulently claiming ties to well-known public figures and respected figures in the investment industry. Scammers lure in investors by initially promoting investment in actively traded stocks, and then steer them into low-priced, low-volume U.S.- or Hong Kong-listed stocks, potentially causing significant losses. They coerce victims into opening accounts at specific broker-dealers and manipulate the price of securities, leaving investors unable to sell, eventually causing the value to plummet. To guard against these scams, be cautious of unsolicited investment messages and conduct thorough research into investment professionals before committing. Utilize FINRA BrokerCheck (brokercheck[.]finra[.]org) to verify credentials, and refrain from investing without independent evaluation. It's crucial to remain vigilant against these and similar fraudulent activities. #financialadvisors and #RIAs, if you're reading this, consider passing along these best practices to your clients to help ensure their financial security. If you believe you've been targeted by a stock manipulation scheme, submit a regulatory tip to FINRA. #InvestorProtection #FinancialSecurity https://lnkd.in/eWreqyqm
-
What banks often miss is exactly where criminals strike. I had a case that perfectly illustrates the gaps. A criminal opened a new business banking account. They deposited large checks that were legitimate and made out to what appeared to be the same business. But hereâs the truth: ð© The checks were stolen from the real business. ð© The fake business had a similar name to the real one. ð© It had a real EIN and a virtual address in another state. ð© The LLC was set up the same day as the bank account. ð© The criminal claimed they were generating $1M+ in revenue... within 24 hours of formation. ð© The business was registered in one state but claimed to operate in another where it wasn't registered. ð© And the biggest red flag? All deposited checks were withdrawn the same day. What did the bank miss? The inconsistencies. The urgency of withdrawals. The lack of operational history. The false legitimacy veneer crafted using public tools like EIN registration and virtual mailboxes. Meanwhile, the real business? They suffered delayed payments, lost vendor trust, and had to explain why checks that vendors mailed never reached their account. Their reputation was damagedâand the bank unknowingly helped do it. Fraud isnât always loud. Sometimes, itâs built with real documents and fake intentions. If you're in banking, train your teams to look past surface-level legitimacy. ð Investigate deeper. ð Look at account behavior. ð Verify businesses beyond whatâs on paper. The next fake LLC is already being filed. The question is: Will your bank catch it, or help fund it? You can't stop what you don't know. #FraudHero #fraudprevention #fraud #bankfraud