Hacking Group Took Sim Swapping To The Next Level

This article was originally published on frankonfraud.com. Beginning in late 2021 and continuing late into 2022, a globally active, extortion-focused cyber threat actor group called Lapsus$ attacked dozens of well-known companies and government agencies around the world. It penetrated corporate networks, stole source code, and then demanded ransoms. In a newly released report by the US […]

To access this post, you must purchase Academic Premium Individual Membership.

Evolving Transaction Monitoring Efforts to Combat Sex Trafficking in the Era of Cryptocurrencies and the Darknet

Is your financial institution doing what it can and should to identify and mitigate sex trafficking money laundering risks? Are your risk assessment and transaction monitoring models up to date with emerging trafficking risks and trends? The rise of cryptocurrencies and the darknet (or dark web) have created new challenges for financial institutions in detecting […]

To access this post, you must purchase Academic Premium Individual Membership.

Fact vs. Myth: ACH Credits

Webinar: July 25 – Spotlight: Handling Suspect Credits in ACH Presenters:  Sandy Ortins, AAP, APRP, NCP  Rayleen M. Pirnie, BCJ, AAP, CERP  Compliance Officers and Fraud Investigators are often challenged with identifying appropriate actions when money laundering activity or fraud is suspected with ACH credit entries. The ACH Network Rules must be balanced with applicable […]

To access this post, you must purchase Academic Premium Individual Membership.

[Wake-Up Call] It’s Time to Focus More on Preventing Spear Phishing

Fighting spear phishing attacks is the single best thing you can do to prevent breaches. Social engineering is involved in 70% to 90% of successful compromises. It is the number one way that all hackers and malware compromise devices and networks. No other initial root cause comes close (unpatched software and firmware is a distant second being involved […]

To access this post, you must purchase Academic Premium Individual Membership.

Why EVERY Financial Institution Needs to Be a 314(b) Participant A Joint Effort from the desks of: NEACH and AML-ology

Imagine this: Nancy at ABC Credit Union calls Rayleen at MainStreet Bank to inquire about 3 large ACH transactions moving between accounts of the two financial institutions (FIs). The three transactions appeared in the transaction monitoring system at ABC Credit Union, prompting an AML investigation. Nancy suspects their member is a money mule. Rayleen at […]

To access this post, you must purchase Academic Premium Individual Membership.

Human Trafficking Digital Crimes

Human traffickers are quick to adapt their business models based on technology trends to grow their markets and increase their profits. Traffickers use technology as a force multiplier to profile, recruit, control and exploit their victims via a variety of online platforms, where personal information and details of people’s locations are readily available, they connect […]

To access this post, you must purchase Academic Premium Individual Membership.

Encryption Isn’t Your Only Ransomware Problem – There Are Some Other Nasty Issues

Ransomware has become one of the most dreaded problems in the cyber world and it’s only getting worse. Much worse! Traditionally, ransomware was a trojan horse malware program which when it found a new host computer simply went off, encrypted all the data it could find, and sent the user an onscreen message to pay a […]

To access this post, you must purchase Academic Premium Individual Membership.