Category: Fraud & Abuse

As an established leader in providing risk intelligence services to address fraud, compliance and security issues, we at FiveBy are fortunate enough to have some of the best people in the business working as part of our team.  Many of our people are accomplished educators in the fraud, compliance and security space.

As part of an occasional series covering key industry terms and issues, we’d like to share some of our insights. Our first video below provides an explainer on ‘synthetic identity’ from our Fraud and Abuse Practice Lead Rolanda London. For more information on how FiveBy Solutions can help you address your risk intelligence needs, contact us to learn more.

www.fiveby.com

(FiveBy Youtube Synthetic identify creation embedded video)

Don’t Let Your Eyes Deceive You

The SANS Institute reported that 95% of all cyberattacks begin with social engineering – tricking people into disclosing sensitive information to a source they believe to be genuine. Many social engineering attacks use homoglyphs — characters or letters that look alike — to create usernames, emails, or other unique identifiers that are visually similar to legitimate addresses, usernames, and domains.

To better understand the infrastructure of cybercrime and the tactics of attackers, FiveBy performed a study on homoglyph domains associated with the COVID-19 pandemic.

This paper focuses on the following areas:

Section 1:  What is Homoglyph domain spoofing?

Section 2:  Case Study – COVID-19 Homoglyph Spoof Detected, December 2020

Section 3:  Applying this knowledge to other scenarios

Download the paper here

Whether from a coordinated or opportunistic attack, the risk of falling prey to fraud, piracy, or abuse is increasingly common in an all-but-fully digitized world. This threat is no longer a unique concern for security and logistics professionals, as the risks for lost revenue now exist at nearly every level of business. Even those firms that previously prioritized the development of a broad anti-piracy or anti-fraud strategy find themselves subject to complex challenges that impact their bottom line. Without significant expertise and an ability to dig deep to understand all possible vulnerabilities and challenges, many industry leaders are at risk of encountering major problems as fraud, piracy, and abuse continue to evolve.

Section 1: Addressing software piracy through product and process improvements

Section 2: Addressing fraud and security risks in the supply chain

Section 3: Supporting growth by reducing fraud

DOWNLOAD THE WHITEPAPER HERE