Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Money Mules: The Hidden Side of Phishing

    Written by

    Ryan Naraine
    Published October 16, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The dramatic rise in phishing and identity theft attacks includes a well-organized offline component—the not-so-innocent “money mule” recruited by fraudsters to launder stolen money across the globe.

      The ads appear innocently on all the major employment listing sites, offering stay-at-home positions titled “shipping manager,” “private financial receiver” or “sales representative.”

      These, however, are active attempts at enlisting people—mostly in the United States, the United Kingdom and Australia—to transfer illegal funds from credit card thieves operating out of the former Soviet Union, according to an investigation by VeriSigns iDefense security research outfit.

      “This is the other side of phishing that most people never see or hear about. But, its probably the most important part of the attack,” said Ken Dunham, director of the Rapid Response Team at iDefense, in Dulles, Va. “Without the money mule, they really cant do anything with stolen credit card credentials,” Dunham added.

      Using hijacked PCs in well-stocked botnets, crime rings have hit pay dirt via adware installations, spam runs and phishing e-mails that attempt to trick users into entering log-in credentials on fake sites.

      Once the phish is successful and the malicious attacker has access to credit card and bank log-in details, there is a desperate need for a money mule in the same country as the victim to handle money transfers or to reship items to the fraudster.

      The recruitment drive also includes well-designed Web sites that serve as fronts for the companies recruiting the money mules, Dunham said. iDefense found that all such Web sites it investigated were registered in Panama, the home of WebMoney, one of the most popular electronic money services among credit card thieves, also called carders.

      eWEEK responded to a Craigslist advertisement for a “regional assistant” and got an immediate response from the hiring manager for Terenfc, an outfit that describes itself as a wholesale product distribution service. Terenfc offered a commission of $50 per received package/operated transfer plus a base salary of $2,000 per month.

      /zimages/1/28571.gifeBay and PayPal remain the top phishing targets, a study says. Read more here.

      A week later, a follow-up e-mail arrived with two Microsoft Word attachments—a personal information form and an employment agreement. The first form requested complete data on the job seeker, including name, address, phone number, bank account number and PayPal account information.

      The employment agreement sets out in plain terms the requirements of the money mule. It reads, in part:

      • To accept merchandise orders at his/her residential address;

      • To handle the received merchandise in accordance with the reasonable conditions of handling of items;

      • To fill in all the necessary postal documents of the postal service company in complete accordance with the instructions;

      • To ship the item or merchandise to the address listed in the instructions;

      • To scan and send via e-mail or fax all postal documents attached to the shipped correspondence (such as invoices, package slips, custom declarations, receipts or couriers tracking numbers) to the representative of the company within one business day.

      The recruitment of money mules has been aggressive in the United Kingdom, prompting the formation of Bank Safe Online, a phishing awareness campaign launched by a consortium of British banks. The initiative, which is managed by the Association for Payment Clearing Services, or APACS, has zeroed in on the money mule scam, issuing stern warnings about the fake jobs and the risks involved with reshipping and laundering money.

      Jemma Smith, a spokesperson for Bank Safe Online, in London, said the attempts to enlist mules have moved beyond misspelled spam ads and are now “very slick-looking sites offering what [appear] to be bona fide jobs.”

      /zimages/1/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      Once recruited, Smith said money mules will receive stolen funds into their accounts. The mules then are asked to take these funds out of their account and forward them overseas (minus a commission payment), typically using a wire transfer service.

      “Acting as a mule is an illegal activity. When caught, money mules often have their bank accounts suspended. Weve had a few arrests and some ongoing investigations here in the U.K.,” Smith said.

      In some cases, Smith said money mules are encouraged to open multiple accounts with the same bank as the identity theft victim. “If the mule is collusive, they can have multiple accounts in multiple banks, do small transfers just to stay under the radar. This is a big, big part of the problem because, without the mule, the phisher has no way to get the stolen money,” Smith added.

      Money Mules explained

      • Fraudsters contact prospective victims with job vacancy ads via spam e-mail, Internet chat rooms or job search Web sites. Jobs usually are advertised as financial management work, and ads suggest that no special knowledge is required.
      • The crime rings persuade the victim to come and work for their fake company. Some fraudsters even ask mules to sign official-looking contracts of employment.
      • Once recruited, money mules receive funds into their accounts. These funds are stolen from other accounts that have been compromised.
      • Mules then are asked to take these funds out of their accounts and forward them overseas (minus a commission payment), typically using a wire transfer service.

      Source: Bank Safe Online

      /zimages/1/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.