The Fraud Kill Chain

Real-world examples

Select a threat:

Reconnaissance Resource Development Psychological Manipulation Faux Communications Credential Compromise Account Access Authorization Compromise Fraud Event Monetization Money Laundering
SMS Intercept Acquire Infrastructure Romance Phishing Keyloggers Device Compromise Location Spoofing Victim Transfer Cashout Resale of Goods
Bots Compromise Infrastructure Impersonation Spearphishing Screen Capture Insiders Virtual Phone Account Takeover Subscriptions Crypto Mixers
Malware Social Networks Accounts Accessibility Permissions Smishing SMS Intercept Cloned Devices Voice Changers P2P Transfers ATM Withdrawal
Personal Info Infected POS Fake Loan Requests Vishing Card Dump Captures Brute Force Page Overlays Imposter QR Gift Cards
Public Domain Infected ATM Loyalty Programs Social Media Session Cookie Capture Session Hijack Fake Extensions NFC Payments NFC Relay (Token Relay)
Dark Web SIP Services Official Phone Number Spoofing Message HTTPS Intercept Remote Access 2FA Compromise Stolen Card Use Crypto Purchase
Malvertising Profitable Propositions Scam Ads Illegal Access to Database Virtual Machines Malware Network Interception
App Repackaging Employee Credentials Fake Support Password Stealer Caller ID Spoofing Mule Card Transfers
Malware Employee Impersonation Fake Call Centers Phone Number Disclosure Bonus Withdrawal
Supply Chain Compromise Account Detail Changes Fake (Merchant) Websites Man in the Middle ATM Jackpotting
Fake Accounts Branded Resources Fake Apps Fake Forms Shipping Redirect
Hosting Services Website Redirects Payments from Mule Account
Money Mules Prepaid Reservations Payment to Mule Account
Payment via Gift Card
Social Engineering
Reconnaissance Resource Development Psychological Manipulation Faux Communications Credential Compromise Account Access Authorization Compromise Fraud Event Monetization Money Laundering
SMS Intercept Acquire Infrastructure Romance Phishing Keyloggers Device Compromise Location Spoofing Victim Transfer Cashout Resale of Goods
Bots Compromise Infrastructure Impersonation Spearphishing Screen Capture Insiders Virtual Phone Account Takeover Subscriptions Crypto Mixers
Malware Social Networks Accounts Accessibility Permissions Smishing SMS Intercept Cloned Devices Voice Changers P2P Transfers ATM Withdrawal
Personal Info Infected POS Fake Loan Requests Vishing Card Dump Captures Brute Force Page Overlays Imposter QR Gift Cards
Public Domain Infected ATM Loyalty Programs Social Media Session Cookie Capture Session Hijack Fake Extensions NFC Payments NFC Relay (Token Relay)
Dark Web SIP Services Official Phone Number Spoofing Message HTTPS Intercept Remote Access 2FA Compromise Stolen Card Use Crypto Purchase
Malvertising Profitable Propositions Scam Ads Illegal Access to Database Virtual Machines Malware Network Interception
App Repackaging Employee Credentials Fake Support Password Stealer Caller ID Spoofing Mule Card Transfers
Malware Employee Impersonation Fake Call Centers Phone Number Disclosure Bonus Withdrawal
Supply Chain Compromise Account Detail Changes Fake (Merchant) Websites Man in the Middle ATM Jackpotting
Fake Accounts Branded Resources Fake Apps Fake Forms Shipping Redirect
Hosting Services Website Redirects Payments from Mule Account
Money Mules Prepaid Reservations Payment to Mule Account
Payment via Gift Card
Social Engineering
Reconnaissance Resource Development Psychological Manipulation Faux Communications Credential Compromise Account Access Authorization Compromise Fraud Event Monetization Money Laundering
SMS Intercept Acquire Infrastructure Romance Phishing Keyloggers Device Compromise Location Spoofing Victim Transfer Cashout Resale of Goods
Bots Compromise Infrastructure Impersonation Spearphishing Screen Capture Insiders Virtual Phone Account Takeover Subscriptions Crypto Mixers
Malware Social Networks Accounts Accessibility Permissions Smishing SMS Intercept Cloned Devices Voice Changers P2P Transfers ATM Withdrawal
Personal Info Infected POS Fake Loan Requests Vishing Card Dump Captures Brute Force Page Overlays Imposter QR Gift Cards
Public Domain Infected ATM Loyalty Programs Social Media Session Cookie Capture Session Hijack Fake Extensions NFC Payments NFC Relay (Token Relay)
Dark Web SIP Services Official Phone Number Spoofing Message HTTPS Intercept Remote Access 2FA Compromise Stolen Card Use Crypto Purchase
Malvertising Profitable Propositions Scam Ads Illegal Access to Database Virtual Machines Malware Network Interception
App Repackaging Employee Credentials Fake Support Password Stealer Caller ID Spoofing Mule Card Transfers
Malware Employee Impersonation Fake Call Centers Phone Number Disclosure Bonus Withdrawal
Supply Chain Compromise Account Detail Changes Fake (Merchant) Websites Man in the Middle ATM Jackpotting
Fake Accounts Branded Resources Fake Apps Fake Forms Shipping Redirect
Hosting Services Website Redirects Payments from Mule Account
Money Mules Prepaid Reservations Payment to Mule Account
Payment via Gift Card
Social Engineering
Reconnaissance Resource Development Psychological Manipulation Faux Communications Credential Compromise Account Access Authorization Compromise Fraud Event Monetization Money Laundering
SMS Intercept Acquire Infrastructure Romance Phishing Keyloggers Device Compromise Location Spoofing Victim Transfer Cashout Resale of Goods
Bots Compromise Infrastructure Impersonation Spearphishing Screen Capture Insiders Virtual Phone Account Takeover Subscriptions Crypto Mixers
Malware Social Networks Accounts Accessibility Permissions Smishing SMS Intercept Cloned Devices Voice Changers P2P Transfers ATM Withdrawal
Personal Info Infected POS Fake Loan Requests Vishing Card Dump Captures Brute Force Page Overlays Imposter QR Gift Cards
Public Domain Infected ATM Loyalty Programs Social Media Session Cookie Capture Session Hijack Fake Extensions NFC Payments NFC Relay (Token Relay)
Dark Web SIP Services Official Phone Number Spoofing Message HTTPS Intercept Remote Access 2FA Compromise Stolen Card Use Crypto Purchase
Malvertising Profitable Propositions Scam Ads Illegal Access to Database Virtual Machines Malware Network Interception
App Repackaging Employee Credentials Fake Support Password Stealer Caller ID Spoofing Mule Card Transfers
Malware Employee Impersonation Fake Call Centers Phone Number Disclosure Bonus Withdrawal
Supply Chain Compromise Account Detail Changes Fake (Merchant) Websites Man in the Middle ATM Jackpotting
Fake Accounts Branded Resources Fake Apps Fake Forms Shipping Redirect
Hosting Services Website Redirects Payments from Mule Account
Money Mules Prepaid Reservations Payment to Mule Account
Payment via Gift Card
Social Engineering
Reconnaissance Resource Development Psychological Manipulation Faux Communications Credential Compromise Account Access Authorization Compromise Fraud Event Monetization Money Laundering
SMS Intercept Acquire Infrastructure Romance Phishing Keyloggers Device Compromise Location Spoofing Victim Transfer Cashout Resale of Goods
Bots Compromise Infrastructure Impersonation Spearphishing Screen Capture Insiders Virtual Phone Account Takeover Subscriptions Crypto Mixers
Malware Social Networks Accounts Accessibility Permissions Smishing SMS Intercept Cloned Devices Voice Changers P2P Transfers ATM Withdrawal
Personal Info Infected POS Fake Loan Requests Vishing Card Dump Captures Brute Force Page Overlays Imposter QR Gift Cards
Public Domain Infected ATM Loyalty Programs Social Media Session Cookie Capture Session Hijack Fake Extensions NFC Payments NFC Relay (Token Relay)
Dark Web SIP Services Official Phone Number Spoofing Message HTTPS Intercept Remote Access 2FA Compromise Stolen Card Use Crypto Purchase
Malvertising Profitable Propositions Scam Ads Illegal Access to Database Virtual Machines Malware Network Interception
App Repackaging Employee Credentials Fake Support Password Stealer Caller ID Spoofing Mule Card Transfers
Malware Employee Impersonation Fake Call Centers Phone Number Disclosure Bonus Withdrawal
Supply Chain Compromise Account Detail Changes Fake (Merchant) Websites Man in the Middle ATM Jackpotting
Fake Accounts Branded Resources Fake Apps Fake Forms Shipping Redirect
Hosting Services Website Redirects Payments from Mule Account
Money Mules Prepaid Reservations Payment to Mule Account
Payment via Gift Card
Social Engineering
Reconnaissance Resource Development Psychological Manipulation Faux Communications Credential Compromise Account Access Authorization Compromise Fraud Event Monetization Money Laundering
SMS Intercept Acquire Infrastructure Romance Phishing Keyloggers Device Compromise Location Spoofing Victim Transfer Cashout Resale of Goods
Bots Compromise Infrastructure Impersonation Spearphishing Screen Capture Insiders Virtual Phone Account Takeover Subscriptions Crypto Mixers
Malware Social Networks Accounts Accessibility Permissions Smishing SMS Intercept Cloned Devices Voice Changers P2P Transfers ATM Withdrawal
Personal Info Infected POS Fake Loan Requests Vishing Card Dump Captures Brute Force Page Overlays Imposter QR Gift Cards
Public Domain Infected ATM Loyalty Programs Social Media Session Cookie Capture Session Hijack Fake Extensions NFC Payments NFC Relay (Token Relay)
Dark Web SIP Services Official Phone Number Spoofing Message HTTPS Intercept Remote Access 2FA Compromise Stolen Card Use Crypto Purchase
Malvertising Profitable Propositions Scam Ads Illegal Access to Database Virtual Machines Malware Network Interception
App Repackaging Employee Credentials Fake Support Password Stealer Caller ID Spoofing Mule Card Transfers
Malware Employee Impersonation Fake Call Centers Phone Number Disclosure Bonus Withdrawal
Supply Chain Compromise Account Detail Changes Fake (Merchant) Websites Man in the Middle ATM Jackpotting
Fake Accounts Branded Resources Fake Apps Fake Forms Shipping Redirect
Hosting Services Website Redirects Payments from Mule Account
Money Mules Prepaid Reservations Payment to Mule Account
Payment via Gift Card
Social Engineering