The world of finance can be a dangerous place, where cunning schemes lurk in the shadows, ready to pounce on unsuspecting victims. In the ever-evolving landscape of financial crime, the insidious ‘pig butchering’ scam has emerged as a significant threat, targeting both financial institutions and their clients. What is a ‘pig butchering’ scam? ‘Pig butchering’ scams are named after the practice of farmers fattening up their livestock before “butchering” them. This comparison describes the core of ‘pig butchering’ scams, where criminals entice victims to participate in investment schemes and cryptocurrency fraud. Originating in Southeast Asia and now rampant in the United States, these scams often start with online interactions via social media or dating applications. Scammers build trust with the victim, eventually gaining access to their online accounts. They "fatten the pig" by enticing more cryptocurrency investments and then make off with their ill-gotten gains. The repercussions are staggering, with reported losses exceeding $3.5 billion in 2023 alone according to an AP News article, and around 40,000 victims in the United States, including cases of losses as massive as $4 million. The real-life impact The story of “RB,” a San Francisco man who engaged with a scammer named "Janey Lee," serves as a stark warning. Through social media, Janey orchestrated an elaborate scheme, promising "RB” substantial returns in cryptocurrency investment. Seduced by false promises, “RB” emptied his life savings into the scam, only to be rescued by a Federal Bureau of Investigation (FBI) intervention, narrowly avoiding financial ruin.1 Malicious actors are improving their targeting skills, and often pursue executives and victims with a large sum of money, such as C-level officials from financial institutions. This past February, a $50 million pig slaughtering fraud incident caused the CEO of a local bank in Kansas to lose all his funds and the bank to collapse a few months later. FinCEN's vigilance and updates The Financial Crimes Enforcement Network (FinCEN) remains vigilant, issuing advisories to financial institutions to combat ‘pig butchering’ scams. Their latest advisory highlights evolving scam tactics, including aggressive promotions, using money mules for illegal fund transfers, and leveraging new financial products like decentralized finance (DeFi) platforms to obfuscate transactions. FinCEN also warns about red flags such as large and sudden investments from older customers, quick fund withdrawals after big deposits, and the frequent use of coins or mixers that hide transactions. Financial institutions are encouraged to: Report any suspicious activities by using specific terms like "pig butchering fraud advisory" in their reports to make analysis and response easier. File suspicious activity reports (SARs) using the key term “FIN-2023-PIGBUTCHERING.” Guide potential victims to report to the FBI’s IC3 or the Security and Exchange Commission (SEC’s) reporting system. A call to action for financial institutions The fight against ‘pig butchering’ scams requires proactive measures from financial institutions: Enhance fraud detection and anti-money laundering (AML) programs: Implement robust systems compliant with regulatory guidelines, conduct thorough customer enhanced due diligence, and leverage fraud detection software to spot anomalies and red flags., and leverage fraud detection software to spot anomalies and red flags. Leverage data analytics: Utilize data analytics tools to monitor customer behavior, identify irregular patterns, and swiftly detect potential ‘pig butchering’ activities. Employee training: Educate employees on scam risks, fraud detection techniques, and FinCEN red flags to empower them as the first line of defense., and FinCEN red flags to empower them as the first line of defense. Community education: Educate customers on recognizing and avoiding investment scams, promoting awareness, and safeguarding their assets. Navigating challenges with effective solutions ‘Pig butchering’ scams cause not only money losses but also personal troubles and reputational harm. Awareness, learning, and cooperation are essential in protecting from these complex financial fraudsters, securing the safety and confidence of your institutions and stakeholders. By combining the best data with our automated identification verification processes, you can protect your business and onboard new talents efficiently. Our industry-leading solutions employ device recognition, behavioral biometrics, machine learning, and global fraud databases to spot and block suspicious activity before it becomes a problem. Learn more 1San Francisco Chronical (2023). Crypto Texting Scam *This article includes content created by an AI language model and is intended to provide general information.
In a recent episode of the Used Car Dealer Podcast, host Zach Klempf, sat down with Jim Maguire, Experian’s senior director of product marketing for automotive, to discuss the prevalence of fraud in the automotive industry. During their conversation, Jim highlighted the findings in Experian’s 2023 Identity and Fraud Report, giving listeners a deeper understanding into the evolving dynamics of fraud, with data and insights on the current landscape and what actionable strategies dealers can take to prevent it. The episode is now available across all major podcast platforms, click the link below to watch: YouTube For more information on the Used Car Dealer Podcast, visit - https://www.sellyautomotive.com/podcast Facebook - @SellyAutomotive Twitter - @SellyAutomotive LinkedIn - @SellyAutomotive
Experian’s Chris Ryan and Bobbie Paul recently re-joined David Mattei from Aite to discuss how emerging fraud trends and changes in consumer behavior will have long-term impacts on businesses. Chris, Bobbie, and David have combined experience of more than 60 years in the world of fraud prevention. In this discussion, they bring that experience to bear as they review how businesses should revise their long-term fraud strategy in response to COVID-19 and the subsequent economic shifts, including: The requirements to authenticate a digital customer Businesses’ technology challenges Differentiating between first party and third party fraud The importance of businesses’ technology investment How to build a roadmap for the next 90 days and beyond Experian · Make Your Fraud Plan Recession-Ready: Your 90 Day and Beyond Plan
Sometimes, the best offense is a good defense. That’s certainly true when it comes to detecting synthetic identities, which by their very nature become harder to find the longer they’ve been around. To launch an offense against synthetic identity fraud, you need to defend yourself from it at the top of your new customer funnel. Once fraudsters embed their fake identity into your portfolio, they become nearly impossible to detect. The Challenge Synthetic identity fraud is the fastest-growing type of financial crime in the United States. The cost to businesses is hard to determine because it’s not always caught or reported, but the amounts are staggering. According to the Aite Group, it was estimated to total at least $820 million in 2017 and grow to $1.2 billion by 2020. This type of theft begins when individual thieves and large-scale crime rings use a combination of compromised personal information—like unused social security numbers—and fabricated data to stitch together increasingly sophisticated personas. These well-crafted synthetic identities are hard to differentiate from the real deal. They often pass Know Your Customer, Customer Identification Program and other onboarding checks both in person and online. This puts the burden on you to develop new defense strategies or pay the price. Additionally, increasing pressure to grow deposits and expand loan portfolios may coincide with the relaxation of new customer criteria, allowing even more fraudsters to slip through the cracks. Because fraudsters nurture their fake identities by making payments on time and don’t exhibit other risk factors as their credit limits increase, detecting synthetic identities becomes nearly impossible, as does defending against them. How This Impacts Your Bottom Line Synthetic identity theft is sometimes viewed as a victimless crime, since no single individual has their entire identity compromised. But it’s not victimless. When undetected fraudsters finally max out their credit lines before vanishing, the financial institution is usually stuck footing the bill. These same fraudsters know that many financial institutions will automatically settle fraud claims below a specific threshold. They capitalize on this by disputing transactions just below it, keeping the goods or services they purchased without paying. Fraudsters can double-dip on a single identity bust-out by claiming identity theft to have charges removed or by using fake checks to pay off balances before maxing out the credit again and defaulting. The cost of not detecting synthetic identities doesn’t stop at the initial loss. It flows outward like ripples, including: Damage to your reputation as a trusted organization Fines for noncompliance with Know Your Customer Account opening and maintenance costs that are not recouped as they would be with a legitimate customer Mistakenly classifying fraudsters as bad debt write offs Monetary loss from fraudsters’ unpaid balances Rising collections costs as you try to track down people who don’t exist Less advantageous rates for customers in the future as your margins grow thinner These losses add up, continuing to impact your bottom line over and over again. Defensive Strategies So what can you do? Tools like eCBSV that will assist with detecting synthetic identities are coming but they’re not here yet. And once they’re in place, they won’t be an instant fix. Implementing an overly cautious fraud detection strategy on your own will cause a high number of false positives, meaning you miss out on revenue from genuine customers. Your best defense requires finding a partner to help you implement a multi-layered fraud detection strategy throughout the customer lifecycle. Detecting synthetic identities entails looking at more than a single factor (like length of credit history). You need to aggregate multiple data sets and connect multiple customer characteristics to effectively defend against synthetic identity fraud. Experian’s synthetic identity prevention tools include Synthetic Identity High Risk Score to incorporate the history and past relationships between individuals to detect anomalies. Additionally, our digital device intelligence tools perform link analyses to connect identities that seem otherwise separate. We help our partners pinpoint false identities not associated with an actual person and decrease charge offs, protecting your bottom line and helping you let good customers in while keeping false personas out. Find out how to get your synthetic identity defense in place today.
Experian has been named one of the 10 participants, and only credit bureau, in the initial rollout of the SSA's new eCBSV service.
Experian® is honored to be an MRC Technology Award nominee. But we can’t win the MRC People’s Choice Award without your help! The annual MRC Technology Awards recognize the most elite solution providers making significant contributions in the fraud, payments and risk industries. CrossCore® is the first smart, open, plug-and-play platform for fraud and identity services. We know, and our clients agree, that it delivers a better way to modify strategies quickly, catch fraud faster, improve compliance and enhance the customer experience. Need further convincing? Here are the top 3 reasons you should vote for CrossCore. Reason 1: common access Manage your entire fraud and identity portfolio. Start immediately by turning on Experian services through a single integration. Connect to services quickly with a common, flexible API. Reason 2: open approach Control the data being used in decisions. CrossCore supports a best-in-class approach to managing a portfolio of services that work together in any combination — including Experian solutions, third-party services and client systems — delivering the level of confidence needed for each transaction. Reason 3: workflow decisioning Act quickly and adapt to new risks with built-in strategy design and workflow capabilities. You can precisely tailor strategies based on transaction type or risk threshold. Make changes dynamically, with no downtime. We hope you’ll vote for CrossCore as a better way to manage fraud prevention and identity services.
Happy holidays! It’s the holiday season and a festive time of year. Colorful lights, comfort food and holiday songs – all of these things contribute to the celebratory atmosphere which causes many people to let their guards down and many businesses to focus more on service than on risk. Unfortunately, fraudsters and other criminals can make one of the busiest shopping times of the year, a miserable one for their victims. The nature of the stolen data has the potential to create long-term headaches for the organization and tens of millions of individuals. Unlike a retailer or financial breach, where stolen payment cards can be deactivated and new ones issued, the theft of permanent identity information is, well, not easily corrected. You can’t simply reissue Social Security numbers, birth dates, names and addresses. For individuals, we need to internalize this fact: our data has likely been breached, and we need to become vigilant and defend ourselves. Sign-up for a credit monitoring service to be alerted if your data or ID is being used in ways that indicate fraud. Include your children, as well. A child’s identity is far more valuable to a fraudster as they know it can be several years before their stolen identity is detected. The good news is, in addition to the credit bureau, many banks and auto clubs now offer this as a service to their customers. For organizations, the focus should be on two fronts: data protection and fraud prevention. Not just to prevent financial theft, but to preserve trust — trust between organizations and consumers, as well as widespread consumer trust. Organizations must strive to evolve data protection controls and fraud prevention skills to minimize the damage caused by stolen identity data. There are dozens of tools in the industry for identifying that a consumer is who they say they are – and these products are an important part of any anti-fraud strategy. These options may tell you that the combination of elements is the consumer, but do you know that it is the REAL consumer presenting them? The smart solution is to use a broad data set for not only identity verification, but also to check linkage and velocity of use. For example: Is the name linking to other addresses being presented in the past week? Is the phone number showing up to other addresses and names over the past 30 days? Has the SSN matched to other names over the past 90 days? Since yesterday the address matches to four phone numbers and two names – is this a problem? And it must be done in ways that reinforce the trust between consumers and organizations, enhance the customer experience, and frustrate criminals. Click here to learn more about Experian’s products and services that can help. As we go walking in the winter wonderland, remember, the holiday season is a time for cheer… and vigilance!