What is affiliate fraud?
Affiliate fraud occurs when individuals or entities involved in affiliate marketing programs manipulate the system to generate earnings or commission, often through fraudulent clicks, fake account signups, or by generating artificial traffic using scripts or bots. Affiliate fraud not only leads to financial losses for merchants but can also skew their marketing data, making it challenging to accurately assess the effectiveness of their affiliate campaigns.
What is bust-out fraud?
Bust-out fraud is a sophisticated fraud strategy in which a group of criminals — often an organized crime ring — commits multiple acts of application fraud at the same time, using multiple stolen or synthetic identities.
Credit card application fraud is often the preferred method of bust-out fraud, as criminals will work in concert to build their credit over time, making their activities appear more legitimate to financial institutions. This enables them to increase their credit or even open additional lines of credit using the same credentials. Then, when the time is right, the criminals will max out all of their cards simultaneously and disappear.
What is card fraud?
Card fraud is a broad category that encompasses any form of card-present or card-not-present fraud. Examples on the card-present side include lost or stolen cards, cards not received, counterfeiting, and fake terminals. To see what card-not-present fraud is, please refer to the definition below.
What is card-not-present fraud?
Card-not-present (CNP) fraud is a form of fraud run specifically on transactions that take place without a credit card or cardholder being physically present. This type of transaction, known as a CNP transaction, tends to be more vulnerable than card-present transactions because fraudsters don’t need to steal a physical card, counterfeit one, or find their way around EMV chip technology to make a fraudulent transaction. In most cases, all fraudsters need to complete a transaction is the cardholder’s credentials, such as their name, billing address, account number, card value verification (CVV) number, or card expiration date.
What is CEO fraud?
CEO fraud is a targeted form of phishing where fraudsters pose as company executives to deceive employees into transferring funds to fraudulent accounts or sharing sensitive information. Often conducted via email or other digital communication tools — CEO fraud is closely related to business email compromise — this type of fraud leverages the authority of high-level executives to bypass internal controls and exploit employee trust.
What is check fraud?
Check fraud encompasses various illegal activities involving the use of checks to unlawfully obtain or withhold money. These can include forging a signature on a stolen check, altering the amount of a check, or creating counterfeit checks.
What is deepfake audio of video fraud?
Deepfake audio or video fraud uses advanced artificial intelligence technology to create hyper-realistic audio or video clips of individuals saying or doing things they never actually did. These deepfakes can be used to commit identity theft, impersonate high-profile individuals, or manipulate targets in social engineering scams.
What is faster payments fraud?
Faster payments fraud, also known as real-time payments fraud, refers to any fraudulent activity that exploits real-time electronic payment systems. Scammers manipulate these fast-transfer capabilities to trick victims into sending them money under false pretenses, such as fake emergencies or fraudulent investment opportunities. Once the funds are transferred, they are immediately (or almost immediately) available to the fraudster and difficult to recover due to the speed and finality of the transaction.
What are fraud farms?
Fraud farms are operations where groups of fraudsters work together to execute large-scale fraud operations, such as creating fake accounts, committing account takeovers, and submitting fraudulent transactions en masse. These operations often utilize advanced technology and organized strategies to mimic legitimate behaviors, making them exceedingly difficult to detect.
What is insurance fraud?
Insurance fraud encompasses a range of illegal activities committed by applicants, policyholders, third-party claimants, or service providers aimed at defrauding the insurance process. These activities can include exaggerating claims, falsifying medical documents, staging accidents, or underreporting income to reduce premiums. Insurance fraud can not only lead to higher premiums for honest policyholders, it can also strain the financial systems of insurance providers.
What is malware?
Malware, short for “malicious software,” refers to a program or file designed to harm or exploit a programmable device, service, or network. Criminals use malware for various nefarious purposes, such as extracting sensitive data, hijacking core computing systems, and spying on users’ activity without their knowledge. Common types of malware include viruses, worms, Trojan horses, ransomware, and spyware.
What is a merchant account takeover?
Merchant account takeover is a form of account takeover in which a fraudster gains unauthorized access to a merchant’s online account, typically used for processing payments. Once inside, they can divert funds, alter account details, or make unauthorized transactions, leading to lost revenue and customer disputes.
What is money laundering?
Money laundering is the process of disguising the origins of illegally obtained money, typically by means of transfers that involve foreign banks or legitimate businesses. The goal of money laundering is to make the money appear as though it came from a legitimate source, thereby integrating it into the financial system in a way that cannot be easily traced back to its original source.
This process typically happens in three stages:
1. Placement, where illicit money is introduced into the financial system
2. Layering, which is the complex process of obscuring the source of the money through multiple transactions and bookkeeping tricks
3. Integration, where the now “clean” money is reintegrated into the economy, appearing as legitimate business earnings
Money laundering is not just a financial crime, it’s often used to aid and abet other criminal activities, such as drug trafficking and terrorism, which is why regulatory authorities have mandated strict anti-money laundering (AML) and know your customer (KYC) practices.
What is payments fraud?
Payments fraud, also known as transaction fraud, is the unauthorized and deliberate use of a payment instrument, such as a credit card or digital wallet, to commit a financial crime. Fraudsters may steal payment information to make unauthorized purchases or create false merchant accounts to receive payments for non-existent goods or services. The scale of payments fraud is extensive, affecting countless individuals and businesses globally and contributing to increased operational costs and security measures within the financial sector.
What is pharming?
Pharming redirects internet users from legitimate websites to fraudulent ones without their knowledge. This is achieved by manipulating Domain Name System (DNS) settings or infecting computers with malware. The goal is to collect personal and/or financial information, which fraudsters can then use to commit identity theft or make unauthorized transactions. Unlike phishing, which relies on luring users to fake websites, pharming can take place without the user being aware, making it particularly insidious and difficult to detect.
What is phishing?
Phishing refers to when fraudsters impersonate legitimate institutions via email, text message, or other digital communication to trick individuals into providing sensitive information, such as passwords and card credentials. These messages often create a sense of urgency, prompting the recipient to act quickly to resolve a fabricated security alert or account issue.
What are remuneration attacks?
Remuneration attacks refer to the manipulation or interception of financial transactions related to employee compensation. Examples of remuneration attacks include altering account details on payroll systems to divert payments or using phishing techniques to obtain sensitive payroll information.
What is social engineering?
Social engineering encompasses any fraud or scam that uses psychological manipulation to convince people into performing certain actions or divulging confidential information. Social engineering techniques, such as phishing, exploit human characteristics of trust and curiosity with the aim of gaining unauthorized access to systems, obtaining sensitive data, or inducing individuals to commit security breaches.
What is a synthetic identity?
Synthetic identities are fake identities fraudsters create by combining actual, stolen credentials with fabricated personally identifiable information.
The most common method for generating a synthetic identity is to steal an actual individual’s credentials from government documentation and combine it with fabricated details, such as a false address and phone number. This approach is known as a partial or patchwork identity fabrication and is considered a form of identity theft. Though less common, fraudsters may also invent identities out of whole cloth — an approach known as total identity fabrication.
What is wire fraud?
Wire fraud is a broad category that includes any illegal activity that uses electronic communications or an interstate communications facility to defraud victims. Typically, wire fraud involves transferring funds electronically across state or international borders through wire transfers, electronic payments, or even traditional telephone lines. Wire fraud schemes can be highly sophisticated, using fake communications from legitimate businesses or fake identities, and often target a large number of victims to maximize potential gains.