Loading...

Surveillance, staging and the fraud lifecycle

Published: August 1, 2015 by Guest Contributor

Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe account activity to understand the ebbs and flows of normal cash movement – peering into private financial records – verifying the optimal time to strike for the most financial gain.

Surveillance and fraud staging are the seemingly benign and often-transparent account activities that fraudsters undertake after an account has been compromised but before that compromise has been detected or money is moved. Activities include viewing balances, changing settings to more effectively cover tracks, and setting up account linkages to stage eventual fraudulent transfers.

The unfortunate thing is that the actual theft is often the final event in a series of several fraudulent surveillance and staging activities that were not detected in time. It is the activity that occurs before theft that can severely undermine consumer trust and can devastate a brand’s reputation.

Read more about surveillance, staging and the fraud lifecycle in this complimentary whitepaper.

Related Posts

Dormant fraud is an especially insidious form of account takeover fraud that often goes undetected until it’s too late. Learn how to protect your organization.

Published: December 5, 2024 by Devon Smith

With cyber threats intensifying and data breaches rising, understanding how to respond to incidents is more important than ever....

Published: November 20, 2024 by Julie Lee

Bot attacks are plaguing financial institutions. The risks are significant, weakening both security and financial stability.

Published: October 22, 2024 by Alex Lvoff