Loading...

Surveillance, staging and the fraud lifecycle

August 1, 2015 by Maria Scalone

Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe account activity to understand the ebbs and flows of normal cash movement – peering into private financial records – verifying the optimal time to strike for the most financial gain.

Surveillance and fraud staging are the seemingly benign and often-transparent account activities that fraudsters undertake after an account has been compromised but before that compromise has been detected or money is moved. Activities include viewing balances, changing settings to more effectively cover tracks, and setting up account linkages to stage eventual fraudulent transfers.

The unfortunate thing is that the actual theft is often the final event in a series of several fraudulent surveillance and staging activities that were not detected in time. It is the activity that occurs before theft that can severely undermine consumer trust and can devastate a brand’s reputation.

Read more about surveillance, staging and the fraud lifecycle in this complimentary whitepaper.

Related Posts

Third-party fraud involves an identifiable victim that is willing to collaborate in the investigation and resolution.

November 9, 2023 by Chris Ryan

Account takeover fraud can be costly, but is preventable with the right account takeover fraud prevention solution.

November 9, 2023 by Alison Hillendahl

Financial elder abuse fraud occurs when someone illegally uses a senior’s money or other property. Previngting it requires a robust fraud solution.

September 15, 2022 by Alison Hillendahl