Loading...

Surveillance, staging and the fraud lifecycle

August 1, 2015 by Maria Scalone

Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe account activity to understand the ebbs and flows of normal cash movement – peering into private financial records – verifying the optimal time to strike for the most financial gain.

Surveillance and fraud staging are the seemingly benign and often-transparent account activities that fraudsters undertake after an account has been compromised but before that compromise has been detected or money is moved. Activities include viewing balances, changing settings to more effectively cover tracks, and setting up account linkages to stage eventual fraudulent transfers.

The unfortunate thing is that the actual theft is often the final event in a series of several fraudulent surveillance and staging activities that were not detected in time. It is the activity that occurs before theft that can severely undermine consumer trust and can devastate a brand’s reputation.

Read more about surveillance, staging and the fraud lifecycle in this complimentary whitepaper.

Related Posts

The sharp uptick in fraud made it clear that banks, credit unions, and fintechs need to invest in a strategy that utilizes identity layers.

March 30, 2021 by Alison Kray

Gain insight into emerging fraud schemes related to the COVID-19 vaccines and increased use of digital home technologies. Read more!

March 11, 2021 by Laura Burrows

Digital transformation has impacted account takeover fraud over the last year, requiring businesses to update their prevention and detection strategies.

February 11, 2021 by Chris Ryan

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image