Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Small Business

    Inside Cyber-Crime Money Mule Operations

    Written by

    Brian Prince
    Published January 6, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Recruiting money mules may not be the sexiest part of a cyber-crime operation, but it is among the most vital tasks-something underscored last year when the FBI arrested mules tied to a gang accused of looting millions from banks around the world.

      According to Fortinet, mule recruiters are putting more effort into targeting specific countries in a more orchestrated manner. For example, the company found some of these “localized” campaigns used regional-sounding domain names such as asia-sitezen.com and Australia-resume.com, both of which were registered to the same Russian contact.

      “The concept of location-based services has been around for a while for other attacks-i.e., pharmacy sites that dynamically change currencies/country flags, etc., based on [the] geo-IP of visitors-but now this is being applied to mule recruitments,” said Derek Manky, project manager of cyber security and threat research at Fortinet. “By doing so, it’s more targeted. … One of the examples we saw actually listed ‘an established relationship with local banks’ as a prerequisite. This is because mules will typically open several accounts [and] it’s much easier to do so if you are a long-time customer.”

      By opening multiple accounts in multiple regions, cyber-criminals are creating a layer of redundancy in their operations, he added.

      In most cases, mule recruitment is local or supported by someone targeting specific countries, said Uri Rivner, head of new technologies for Consumer Identity Protection at EMC’s RSA security division. One exception to this, however, is Europe, where the SEPA (Single European Payment Area) initiative makes this less necessary.

      “For example, if a fraudster is targeting victims in Germany, they don’t have to recruit mules from Germany anymore because of SEPA,” Rivner said. “They can [move] money from a German bank to a bank in Latvia. By law it is considered a domestic transaction. In the U.S., this would be like banks handling transactions between states. U.S. banks should be very pleased they don’t operate this way in Europe because in Europe the problem is much more difficult because of SEPA. This makes it easier to recruit mules from anywhere in Europe.”

      “In many cases we actually know the mule operators are physically located in the U.S. or they have local mule coordinators in specific countries,” he continued. “They field mule phone calls, support questions, etc. Big mule operations have multiple local coordinators that manage local mule support calls. One thing that appears to be a new trend is that many more mules nowadays are students who come in knowing they’re part of a criminal organization-or are simply very stupid. But the mule operators promise them work in the U.S., and they get a student visa, they fly to the U.S. to study and work part-time as a mule.”

      This side of the business is kept largely separate from other parts of the cyber-underworld, with the people actually making the malware and stealing the data operating on their own, security experts agreed. According to RSA, the number of mule-recruiting Websites jumped from 34 in December 2007 to 591 in December 2009.

      Pay can vary, with offers sometimes being exaggerated compared with what mules actually get, Manky said.

      Most of the payments, he said, come in the form of commission-typically about 10 percent of every transaction. Due to money laundering laws, most transactions are kept under $10,000 (USD), with the average being in the thousands, he added.

      “Like any business relationship, an established mule will have more trust with the criminal operators, and will receive larger transactions most often on a more frequent basis; thus they will earn more than others,” Manky said.

      Another way fraudsters turn stolen data into cash is a reshipping operation, which is where a criminal uses a stolen credit card to buy an item online and then ships it to the home of a mule. From there, the mule ships the item on to the fraudster, who sells it for a profit.

      “Mule operations [are] big business. … They have to recruit mules, have them ship goods outside the country, sell merchandise on auction Websites, etc.,” Rivner said. “Sometimes there are mule operators that recruit and do cash-out together, but they typically won’t do more than that. … It’s a lot of work to control the mules, to recruit them, answer their questions [and] get them set up. It is labor-intensive and is quite unique. Mule operators have to be more like con men than hackers, so it makes sense to separate the operations.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.