SlideShare a Scribd company logo
1© iovation. All RightsReserved
BrookeSnelling, Senior Product Marketing Manager at iovation
BrettJohnson,Keynote Speaker and Cybersecurity Consultant
at AnglerPhish Security
Synthetic Identity Fraud:
How Cybercriminals
Complete Their Hack
“The Original Internet Godfather”
--United States Secret Service,
Columbia South Carolina Field Office
© iovation. All RightsReserved 3
Shadowcrew
© iovation. All RightsReserved 4
© iovation. All RightsReserved 5
Cybercrime Communities / Forums
Allow Members to Network for
Maximum Success
© iovation. All RightsReserved 6
Synthetic Fraud
• Fastest Growing Form of Identity Theft
• Over 80% of all New Account Fraud
• Losses Last Year over $50 Billion
• Unknown to Most People
• 20% of all credit card losses
• 5% of all credit card debt
• $15,000 average charge off per instance of synthetic fraud
• $6 Billion in losses for 2016
• Over $50 Billion in losses to date
Synthetic Fraud is the Fastest
Growing Financial Crime on the
Planet
Cybercrime Succeeds Through
a Series of Failures Across a
Variety of Systems
Why Synthetic Fraud
Understanding Weakness
• 2011 and the Social Security Administration
• Credit Bureaus Don’t Know You Exist Until You Tell
Them
• Credit Piggybacking
• Traditional Fraud Models Don’t Flag Synthetic Identities
• Defining Synthetic Fraud
What is Synthetic Fraud?
A combination of fictitious and sometimes real
information (SSN, DOB, etc.) used to create new
identities to perpetrate financial fraud.
Ok…What does that mean?
How Fraudsters Commit
Synthetic Fraud
Step One: Creating the Identity
• buy stolen pii or fabricate SSN
• Stolen: Children, elderly, homeless
• Fabricated: SSN algorithm
• SSN validator
• Add name, dob, address, phone number
• If using elderly or active SSN the “drop” address must be
in a different zipcode
• Phone number should NOT be VOIP
• Address should be residential
Step Two: Creating the Credit
Profile
• Credit bureaus don’t know you exist until you
tell them
• Applying for credit and trimerging to create
the credit report
• Fraudsters are often creative. Think
mortgage refi, auto loans, etc
Step Three: OSINT
• Listyourself.net
• Rewards Cards
• Facebook or other social
media?
Step Four: The Secured Credit Card
• Secured cards which require a minimum deposit
remain prime targets
Step Five: Credit Piggybacking
Step Six: Applying for Credit and Cashing
Out
• Novice Level
• Personal loans, branded cards, auto loans, etc
• Potential Profit $15k Range
• Intermediate
• Opens accounts and makes payments on accounts to increase credit limits
• Potential Profit $40k range
• Advanced
• Mixes real pii with fictitious to apply for business credit
• Potential Profit $150k range
Variations
• Primary Credit Lines
• Creating fictitious businesses
• Using reporting services
• Using the court system (now
dead)
• Layering Identity Profiles
• Using ITINs and other
• Aging the profiles
• Opening a bank account
© iovation. All RightsReserved 21
Synthetic Fraudsters Collaborate for
Maximum Success
Placeholder for pics or vid of physical fake
IDs
A Brief History of Fake IDs Among Cybercrook
Cybercrime Isn't
Rocket Science...
Mostly
Combatting Synthetic
Fraud
30© iovation. All RightsReserved
Q&A
© iovation. All RightsReserved 31
© iovation. All RightsReserved 32
33© iovation. All RightsReserved
Thank You

More Related Content

More from TransUnion

PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
TransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
TransUnion
 

More from TransUnion (20)

How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
Lunch and Learn: MFA vs 2FA Just A Numbers Game, or Real Value?
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry Report
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the Customer
 

Recently uploaded

Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
mbmh111980
 

Recently uploaded (20)

APVP,apvp apvp High quality supplier safe spot transport, 98% purity
APVP,apvp apvp High quality supplier safe spot transport, 98% purityAPVP,apvp apvp High quality supplier safe spot transport, 98% purity
APVP,apvp apvp High quality supplier safe spot transport, 98% purity
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
The Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion ProductionThe Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion Production
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
Workforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfWorkforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdf
 

Webinar: Synthetic Identity Fraud: How Cybercriminals Complete Their Hack

  • 1. 1© iovation. All RightsReserved BrookeSnelling, Senior Product Marketing Manager at iovation BrettJohnson,Keynote Speaker and Cybersecurity Consultant at AnglerPhish Security Synthetic Identity Fraud: How Cybercriminals Complete Their Hack
  • 2. “The Original Internet Godfather” --United States Secret Service, Columbia South Carolina Field Office
  • 3. © iovation. All RightsReserved 3 Shadowcrew
  • 4. © iovation. All RightsReserved 4
  • 5. © iovation. All RightsReserved 5 Cybercrime Communities / Forums Allow Members to Network for Maximum Success
  • 6. © iovation. All RightsReserved 6 Synthetic Fraud • Fastest Growing Form of Identity Theft • Over 80% of all New Account Fraud • Losses Last Year over $50 Billion • Unknown to Most People
  • 7. • 20% of all credit card losses • 5% of all credit card debt • $15,000 average charge off per instance of synthetic fraud • $6 Billion in losses for 2016 • Over $50 Billion in losses to date
  • 8. Synthetic Fraud is the Fastest Growing Financial Crime on the Planet
  • 9. Cybercrime Succeeds Through a Series of Failures Across a Variety of Systems
  • 10. Why Synthetic Fraud Understanding Weakness • 2011 and the Social Security Administration • Credit Bureaus Don’t Know You Exist Until You Tell Them • Credit Piggybacking • Traditional Fraud Models Don’t Flag Synthetic Identities • Defining Synthetic Fraud
  • 11. What is Synthetic Fraud? A combination of fictitious and sometimes real information (SSN, DOB, etc.) used to create new identities to perpetrate financial fraud.
  • 14. Step One: Creating the Identity • buy stolen pii or fabricate SSN • Stolen: Children, elderly, homeless • Fabricated: SSN algorithm • SSN validator • Add name, dob, address, phone number • If using elderly or active SSN the “drop” address must be in a different zipcode • Phone number should NOT be VOIP • Address should be residential
  • 15. Step Two: Creating the Credit Profile • Credit bureaus don’t know you exist until you tell them • Applying for credit and trimerging to create the credit report • Fraudsters are often creative. Think mortgage refi, auto loans, etc
  • 16. Step Three: OSINT • Listyourself.net • Rewards Cards • Facebook or other social media?
  • 17. Step Four: The Secured Credit Card • Secured cards which require a minimum deposit remain prime targets
  • 18. Step Five: Credit Piggybacking
  • 19. Step Six: Applying for Credit and Cashing Out • Novice Level • Personal loans, branded cards, auto loans, etc • Potential Profit $15k Range • Intermediate • Opens accounts and makes payments on accounts to increase credit limits • Potential Profit $40k range • Advanced • Mixes real pii with fictitious to apply for business credit • Potential Profit $150k range
  • 20. Variations • Primary Credit Lines • Creating fictitious businesses • Using reporting services • Using the court system (now dead) • Layering Identity Profiles • Using ITINs and other • Aging the profiles • Opening a bank account
  • 21. © iovation. All RightsReserved 21 Synthetic Fraudsters Collaborate for Maximum Success
  • 22. Placeholder for pics or vid of physical fake IDs
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. A Brief History of Fake IDs Among Cybercrook
  • 30. 30© iovation. All RightsReserved Q&A
  • 31. © iovation. All RightsReserved 31
  • 32. © iovation. All RightsReserved 32
  • 33. 33© iovation. All RightsReserved Thank You