
Finding fraud in bankruptcy cases
Read Time: 12 mins
Written By:
Roger W. Stone, CFE
Suzie Johnson recently received a mailed bill that said she had to start paying back her COVID-19 Economic Injury Disaster Loan (EIDL). Suzie was befuddled because she knew nothing about the EIDL program and never applied for one of its loans. She talked to her federal representative, and he advised her to contact the Small Business Administration (SBA) agency to report the problem, which told her that someone had stolen her identity and used it to apply for the loan. SBA then canceled the fraudulent loan, and Suzie’s problem was resolved. This fictitious case is representative of the recent SBA EIDL and PPP loan scam.
If you’ve received a bill for an SBA Paycheck Protection Program (PPP) or EIDL loan you never applied for, an identity thief probably has stolen your personally identifiable information (PII) to get the government loan in your name.
Here’s what to do to report the scam and initiate the SBA review process to help you resolve any credit problems:
Step 1. Report the identity theft to the Federal Trade Commission (FTC) at IdentityTheft.gov.
Step 2. Visit the SBA’s website.
Step 3. If the identity theft involved a PPP loan and you know the private lender that issued the loan, also contact that lender.
(See “What to do if you’re billed for an SBA EIDL or PPP loan you don’t owe,” by Rosario Méndez, FTC, Sept. 26, 2023.)
Here’s a warning to all organizations that offer customers all-in-one apps. (Think of apps for your bank or airline on your phone.) Fraudsters are continuing to attack a crucial “9.8 vulnerability” in unpatched “NetScaler Gateways,” according to an SC Media article. The NetScaler Gateway system appliance, sold to organizations, allows customers to access any app via the cloud from any device through a single URL, according to Citrix Systems, Inc. It consolidates “remote access infrastructure” to provide customers a single sign-on across all applications whether in a data center, in the cloud or if the apps are delivered as SaaS (software as a service), which allows users to connect to and use cloud-based apps over the internet. (Common SaaS examples are email, calendaring and office tools, such as Microsoft Office 365.) (See “Attacks on NetScaler Gateways aim for user credentials,” by Steve Zurier, SC Media, Oct. 10, 2023; “NetScaler Gateway,” by Hema Malina, Citrix staff and Subbendu Majumder, NetScaler, Aug. 18, 2023; and “What is SaaS?” Azure, Microsoft.)
The 9.8 level (out of 10) is part of the Common Vulnerabilities and Exposures (CVE) list, which the nonprofit MITRE corporation launched in 1999 to identify and categorize vulnerabilities in software and firmware. CVE is sponsored by the U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Computer Emergency Readiness Team (US-CERT). (See “What is a CVE? Common Vulnerabilities and Exposures Explained,” by Abi Tyas Tunggal, UpGuard, April 6, 2023.)
During an attack, a fraudster inserts a malicious script, or “bug,” into the HTML content of the authentication web page to steal user credentials. Technically speaking, they do this by using the bug as a “zero day” to drop a “web shell” on a device that a customer is using. A zero-day attack happens when hackers or other malicious actors take advantage of a software or network vulnerability that’s unknown to developers. In other words, the developers have known about the vulnerability for zero days. Of course, it’s no longer considered a zero-day attack after it’s discovered.
According to “What are Web Shells?” on the Geeks for Geeks website, “A web shell is a malicious program [or script] that is used to access a web server remotely during cyberattacks … [and] is always used in conjunction with some other technique during the post-exploitation stage.” After a fraudster identifies vulnerabilities in a network’s systems or software, they upload a web shell on the victim’s network, which allows them to perform discovery on the victim’s “active directory” (AD) so they can create, delete, modify, download and steal files. An AD provides the methods to store information about user accounts, including passwords, telephone numbers and other PII, and allows authorized users on the same network to access this information.
Fraudsters can use stolen PII and other information to commit more fraud or sell it to other malicious actors for fraudulent purposes, including ransomware.
Irfan Asrar, director of threat research at Qualys, and Joseph Carson, chief security scientist and advisory chief information security officer at software company Delinea, provide advice in an SC Media article to protect PII and other valuable information:
According to the FTC, fraudsters, who are masquerading as officials representing the Medicaid Children’s Health Insurance Program (CHIP), are calling potential victims and asking them for their PII or demanding that they pay to renew their family coverage. Medicaid and CHIP are joint federal/state programs. Each state is responsible for governing all aspects of the administration and operation of its Medicaid and CHIP programs.
The FTC offers advice to protect families from this scam:
If you spot a CHIP scam, report it to the FTC at ReportFraud.ftc.gov. (Also, see “Children’s Health Insurance Program: Spot the scam,” by Marissa Hopkins, FTC, Sept. 22, 2023.)
Please use information about these scams in your outreach programs and among your family members, friends and co-workers.
As part of my outreach program, please contact me if you have any questions on identity theft or cyber-related issues that you need help with or if you’d like me to research a scam and possibly include details in future columns or as feature articles.
I don’t have all the answers, but I’ll do my best to help. I might not get back to you immediately, but I’ll reply. Stay tuned!
Robert E. Holtfreter, Ph.D., CFE, is a distinguished professor of accounting and research at Central Washington University. He’s a member of the Accounting Council for the Gerson Lehrman Group, a research consulting organization, and a member of the White Collar Crime Research Consortium Advisory Council. He’s also the vice president of the ACFE’s Pacific Northwest Chapter and serves on the ACFE Advisory Council and the Editorial Advisory Committee, and he was recently selected to serve on the ACFE’s inaugural CFE Exam Content Development Committee. Holtfreter was the recipient of the Hubbard Award for the best Fraud Magazine feature article in 2016. Contact him at doctorh007@gmail.com.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 12 mins
Written By:
Roger W. Stone, CFE
Read Time: 10 mins
Written By:
Tom Caulfield, CFE, CIG, CIGI
Sheryl Steckler, CIG, CICI
Read Time: 2 mins
Written By:
Emily Primeaux, CFE
Read Time: 12 mins
Written By:
Roger W. Stone, CFE
Read Time: 10 mins
Written By:
Tom Caulfield, CFE, CIG, CIGI
Sheryl Steckler, CIG, CICI
Read Time: 2 mins
Written By:
Emily Primeaux, CFE