Virtual Kidnapping
Nethone (acquired by Mangopay)
Know Your Users? to reject only fraudsters
Nethone’s Fraud Intelligence (FI) delivers first-hand Darknet insights about the digital fraud risks your platforms face. Our fraud intelligence team proactively seeks out all fraud schemes that might harm your business.
By subscribing to this newsletter, you can keep up-to-date with the latest news in the world of the dark web and learn how to safeguard your business using advanced anti-fraud measures.?
In the July edition of the Fraud Intelligence Report, we discuss topics like virtual kidnapping, fraud reports, with a big caution on ATO fraud and the recent fraud technics and countermeasures that will strengthen your business.
From emerging scams to new trends in fraud, we keep you informed:
AI in fraud
Virtual Kidnapping
Cybercriminals are increasingly using AI voice cloning tools and chatbots like ChatGPT to perform virtual kidnapping scams, according to a report by Trend Micro. These malicious actors exploit AI technology to impersonate real people and manipulate victims into paying large ransoms by creating deepfake audio files that mimic the voices of their targets. By leveraging social engineering tactics and AI-powered tools, cybercriminals can generate fake distress calls and manipulate emotions to create a convincing illusion of a kidnapping. Additionally, AI-powered chatbots like ChatGPT are used to automate and scale the processes involved in virtual kidnapping attacks, making them more profitable and widespread.?
Read more
How can analysts keep up with the technology behind deepfakes for better verification?
This article focuses on the technology behind deepfakes and how analysts can enhance verification techniques to detect them. It discusses the risks associated with deepfakes and provides insights into tools and approaches analysts can utilise for better verification.
Read more
ATO fraud
Learn Account Takeover Basics with Mateusz Chrobok
The article comprehensively analyses account takeover fraud (ATO) and its increasing threat to individuals and businesses in our digital world. The paper defines ATO and describes how attackers gain access to user accounts, the consequences of ATO attacks, and practical preventive measures to mitigate this risk. The article also covers five common tactics fraudsters use to execute ATO attacks and highlights the need for mobile app security to prevent such attacks.?
Read more
You can also enjoy your morning coffee with the 5-minute video to learn more about ATO with Nethone’s Head of Fraud Intelligence, Mateusz Chrobok
Watch and learn
Unmasking PIG-BUTCHERING SCAMS and protecting your financial future
According to a report by Trend Micro, a new kind of cryptocurrency investment scam called the pig-butchering scam is on the rise and causing concern among security experts and law enforcement agencies. The report highlights that crypto-investment scams have seen a significant increase in victims and total losses, reaching $2.57 billion in 2022. The article explores the nature of these scams, how they are carried out, and the tactics used by scammers.
Read more
Reports
Internet Organised Crime
The Internet Organised Crime Assessment (IOCTA) 2023 is a report by Europol that examines the cybercrime landscape and how it has evolved over the past two years. The report reveals that cybercrime poses an increasing threat to the European Union, with complex crimes such as cyber-attacks, online child sexual exploitation, and online frauds becoming more common across diverse typologies. Perpetrators of these crimes are becoming more agile in exploiting new situations created by geopolitical and technological changes.
Read more
领英推荐
Agents of abuse
According to a report by Trend Micro, cybercriminals are exploiting residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, leading to significant financial losses for various industries such as e-commerce, social media, fintech, and travel. Bots, responsible for 52% of all online traffic, can lead to e-commerce fraud and account takeovers. To counter misuse, CAPTCHA services and IP reputation feeds are in place. However, cybercriminals use residential proxies to hide IP addresses and bypass security measures. This allows them to engage in fraudulent activities like gift card scams, chargeback fraud, and click fraud.
Fraud technics
The Weak Link: Recent Supply Chain Attacks Examined
This article focuses on the examination of recent supply chain attacks. It discusses the importance of supply chain security and highlights some notable supply chain attacks. The article explores the tactics and techniques used by threat actors in these attacks and the potential impact on targeted organisations.
Read more
Cybercriminals evolve anti-detect tooling for mobile OS-based fraud
The article highlights the evolving tactics of cybercriminals in perpetrating mobile OS-based fraud. It specifically focuses on the use of anti-detect tooling, which allows cybercriminals to evade detection by anti-fraud systems. The article highlights the importance of continuously monitoring and analysing these tactics to stay ahead of cybercriminals and protect against mobile OS-based fraud.
Read more
How web isolation is evolving to solve SSE challenges
The blog post discusses the challenges faced in securely implementing server-side events (SSE). It explains the concept of web isolation and how it can help address concerns related to SSE security.
Read more
Fraud Prevention
How Dark Web research can aid in combating cybercrime leveraging an Infinite Game
The article highlights the evolving tactics of cybercriminals in perpetrating mobile OS-based fraud. It specifically focuses on the use of antidetect tooling, which allows cybercriminals to evade detection by anti-fraud systems. The article highlights the importance of continuously monitoring and analyzing these tactics to stay ahead of cybercriminals and protect against mobile OS-based fraud.
Read more
Why Post-Login Security is Key to Preventing Financial Fraud
This article emphasises the importance of post-login security measures in preventing financial fraud in the fintech industry. It discusses the types of financial fraud, current security measures implemented by organisations, and the limitations of these measures.?
Read more
Detecting Credential Theft to Prevent Data Breaches
The article discusses the importance of detecting and preventing credential theft to mitigate data breaches. It explores various methods cybercriminals use to steal credentials and provides recommendations for organisations to improve their detection capabilities.
Read more
If you are interested in first-hand and real-time Darknet insights to help you spot if you are on a fraudster’s radar, go to nethone.com
We can spot the threats. ??