Fraudsters’ slick olive oil switch
Read Time: 13 mins
Written By:
Donn LeVie, Jr., CFE
Duke Franklin had lost his Social Security card, so he applied for a replacement on the Social Security Administration (SSA) website. He clicked on the first link that came up in his search and followed the instructions to fill out the required forms to apply for a new card. The site asked for some personal information and a $150 fee. He was told to send his birth certificate and other personal items to a specified address. The site said the SSA would mail his new card within a few days to a few weeks. After waiting more than two months, he called the phone number listed on the website but it was "out of service." He realized he'd been scammed.
Duke was a victim of a new government services website scam reported by the FBI on its Internet Crime Complaint (IC3) website on April 7. (See Criminals Host Fake Government Services Web Sites to Acquire Personally Identifiable Information and to Collect Fraudulent Fees.)
From the numerous complaints the IC3 received from May 2012 through March 2015, it determined that criminals were setting up fake government services websites (such as the SSA and the Internal Revenue Service) to trick potential victims into revealing their personally identifiable information (PII) and pay fraudulent fees.
The PII that criminals usually request includes a victim's name, address, email address, Social Security number and date of birth, among other things. The victims are willing to give up this information because they're fairly confident they're dealing with actual government service agencies.
When data-grabbing criminals compromise PII in any fraudulent activity, they can use it for many illegal purposes, including creating fake driver licenses, passports, documents to obtain loans or filing for fake federal income tax refunds on behalf of victims. Or they can sell or trade the stolen data in underground forums to other cybercriminals who can use it for similar purposes.
The FBI says that the scam typically evolves in this way:
As in the opening case, the victim never receives the requested documents and can never reach anybody to help.
The FBI gives this advice when attempting to contact a government agency online:
And, of course, victims should file a complaint with the FBI's Internet Crime Complaint Center.
On August 27, the FBI reported that fraudsters are directing the sophisticated email account compromise (EAC) scam to individuals in the general public and at professional business firms, including financial and lending institutions, real estate companies and law firms. (The business email compromise scam, which I'll report on in the January/February issue of the column, obviously targets businesses rather than individuals.)
The FBI reported that between April 1 and June 30, "21 complaints related to the EAC scam were filed with the IC3, with reported losses of almost $700,000. The FBI has identified approximately $14 million in attempted losses associated with open FBI EAC investigations."
The scam's purpose is to use a victim's stolen or spoofed email address to contact his or her financial institution and make an unauthorized request to wire funds to the fraudster's account outside of the U.S. or to a money mule in the U.S., who'll then transfer the funds to the fraudster's account.
The scammers compromise email accounts of potential victims via computer intrusion and social engineering techniques. Typically, a fraudster will gain access to a victim's real email account address when doing reconnaissance work. The fraudster adds, changes or deletes a character to create a spoofed email account that resembles the victim's real account.
The spoofed email fools a financial institution employee who unwittingly wires the money to the fraudster. According to the FBI victims reporting the scam are indicating that "criminal actors are starting to follow up on wire transfer requests by calling to confirm the transactions or to comply with wire transfer protocols, thus making the transaction appear more legitimate."
The FBI reports these examples of the EAC scam:
Financial/brokerage services
Real estate
Legal
If you believe you've been a victim of the EAC scam, the FBI advises these steps:
The FBI recommends these tips to help protect yourself from this scam:
I hope you'll share this information with your family, friends and clients and include it in your outreach programs. We must step up our efforts to educate the public about these problems.
As you can see, cybercriminals take advantage of any opportunity to develop schemes to trick consumers and rob them of their resources. Even though they have the upper hand, an educated community will help curb the damage.
Please contact me if you have any identity theft issues you'd like me to research and possibly include in future columns or if you have any questions related to this column or any cybersecurity and identity theft issues. I don't have all the answers, but I'll do my best to help. Stay tuned!
Robert E. Holtfreter, Ph.D., CFE, CICA, CBA, is distinguished professor of accounting and research at Central Washington University in Ellensburg, Washington. He's also on the ACFE Advisory Council and the ACFE Editorial Advisory Committee. His email address is: doctorh007@gmail.com.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 13 mins
Written By:
Donn LeVie, Jr., CFE
Read Time: 13 mins
Written By:
Emily Primeaux, CFE
Read Time: 6 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 13 mins
Written By:
Donn LeVie, Jr., CFE
Read Time: 13 mins
Written By:
Emily Primeaux, CFE
Read Time: 6 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE