Why blocking Money mule accounts doesn’t work – be aware of modern cash-out vectors

TM_story-v

Cash-out is one of the final stages of fraudulent attacks. Traditionally attackers used money mules to perform the dirty job of going into a bank to cash-out money that came from previously made fraudulent transactions. Cybercriminals even use tools to automatize recruiting and other money mule cash-out related processes.

More

Client Behavior is the new password

2

Fraud detection in online banking certainly represents a non-trivial task against the perennial problem of increasingly sophisticated fraudulent schemes. Authentication of the user in modern applications is one of the tasks where traditional fraud detection systems fail to provide reliable decisions leaving enough space for fraudsters to come in and commit their activity.  

More

2015 fraudulent cyber attacks resolved

a_shepherd_760x400

  The world is changing fast, the digital economy is growing and the number of digital payments is increasing.  We at ThreatMark successfully managed to solve many fraudulent cyber attacks in 2015. We also found unweaponized / piloted threats that will emerge in large scale in 2016 against selected organisations and their clients. We bring… Continue reading

More

ThreatMark Cyber Fraud Report Europe 2015 – Cyber Fraudsters favorite countries in EU revealed

a_map2015_760x400

Your cyber protection team @ThreatMark have produced a final summary for 2015 on how the year was from the on-line payment and digital banking risk perspective. Part of the research was the modelling of fraudulent cyber scene maturity in European countries. As an addition to traditional and neXtGEN Security models, we have created this model… Continue reading

More

ThreatMark European Media Monitoring Cyber Fraud Report

a_map2015_760x400

ThreatMark media research covering more than 400 press articles across all European countries has revealed that Phishing is the most mentioned and discussed ahead of other fraudulent cyberattacks such as financial malware and Remote Administration tool abuse. We are going to bring you a summary of that media research, followed by our expert opinion –… Continue reading

More