Cybercriminals Target Unemployed To Launder Money - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government // Cybersecurity

Cybercriminals Target Unemployed To Launder Money

Scams promising work-at-home opportunities disguise money mule operations to translate the glut of stolen identities into cash, says Cisco's annual security report.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010

What's in store for information security attacks this year? Expect more viruses, malware, spam, and phishing attacks, of course. But in a twist, also expect cybercriminals to devote more time and energy to translating stolen financial information into cash.

So says the "Cisco 2010 Annual Security Report," released on Thursday, which predicts that "the real focus of cybercriminal investment for 2011... will be on improving the success and expanding the number of cash-out services."

The problem for today's online criminals is that they have many more stolen account credentials than they can translate into profit. "Currently, the ratio of stolen account credentials to available mule capacity could be as high as 10,000 to 1," said Cisco senior security researcher Mary Landesman. On forums devoted to selling such information, "there's such a glut of stolen credit cards that they don't even fetch that much."

The barrier is simple: "cash-out" operations are labor-intensive and risky, and may result in arrest. To lower the risk to themselves, cybercriminals often farm out this part to money mules -- teams of criminals who use fake ATM or credit cards loaded with stolen account credentials. Money mules typically withdraw money from a different country than the one in which the target account is located, and outside the other country's banking hours. Criminals' goal is to maximize their haul before financial service organization's fraud departments get suspicious, block withdrawals, or alert law enforcement.

Increasingly, however, these money laundering operations are being built on scams that target unemployed or underemployed people, Landesman said. "Whereas a couple of years ago, money mules tended to be meth addicts or people addicted to drugs who didn't mind taking these risks, today, money mules tend to be people who are just victims."

Such scams increasingly pose as "work at home" opportunities where people's "job" involves receiving shipments of items, repackaging them, and shipping them out of the country. In reality, however, the goods have been ordered by criminals using stolen or fraudulent credentials, as a way to launder their money.

"When you're desperate to put food on the table, you might not look too closely at exactly what you're being asked to do," said Landesman.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
News
Can Cloud Revolutionize Business and Software Architecture?
Joao-Pierre S. Ruth, Senior Writer,  1/15/2021
Slideshows
10 IT Trends to Watch for in 2021
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/22/2020
News
How CDOs Can Build Insight-Driven Organizations
Jessica Davis, Senior Editor, Enterprise Apps,  1/15/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
Slideshows
Flash Poll