The Fraud Kill Chain
Real-world examples
Select a threat:
Reconnaissance | Resource Development | Psychological Manipulation | Faux Communications | Credential Compromise | Account Access | Authorization Compromise | Fraud Event | Monetization | Money Laundering |
---|---|---|---|---|---|---|---|---|---|
SMS Intercept | Acquire Infrastructure | Romance | Phishing | Keyloggers | Device Compromise | Location Spoofing | Victim Transfer | Cashout | Resale of Goods |
Bots | Compromise Infrastructure | Impersonation | Spearphishing | Screen Capture | Insiders | Virtual Phone | Account Takeover | Subscriptions | Crypto Mixers |
Malware | Social Networks Accounts | Accessibility Permissions | Smishing | SMS Intercept | Cloned Devices | Voice Changers | P2P Transfers | ATM Withdrawal | |
Personal Info | Infected POS | Fake Loan Requests | Vishing | Card Dump Captures | Brute Force | Page Overlays | Imposter QR | Gift Cards | |
Public Domain | Infected ATM | Loyalty Programs | Social Media | Session Cookie Capture | Session Hijack | Fake Extensions | NFC Payments | NFC Relay (Token Relay) | |
Dark Web | SIP Services | Official Phone Number Spoofing | Message | HTTPS Intercept | Remote Access | 2FA Compromise | Stolen Card Use | Crypto Purchase | |
Malvertising | Profitable Propositions | Scam Ads | Illegal Access to Database | Virtual Machines | Malware | Network Interception | |||
App Repackaging | Employee Credentials | Fake Support | Password Stealer | Caller ID Spoofing | Mule Card Transfers | ||||
Malware | Employee Impersonation | Fake Call Centers | Phone Number Disclosure | Bonus Withdrawal | |||||
Supply Chain Compromise | Account Detail Changes | Fake (Merchant) Websites | Man in the Middle | ATM Jackpotting | |||||
Fake Accounts | Branded Resources | Fake Apps | Fake Forms | Shipping Redirect | |||||
Hosting Services | Website Redirects | Payments from Mule Account | |||||||
Money Mules | Prepaid Reservations | Payment to Mule Account | |||||||
Payment via Gift Card | |||||||||
Social Engineering |