Law enforcement recently conducted the largest ever coordinated sweep of identity fraud cases targeting the elderly. According to the U.S. Department of Justice, more than 250 defendants have been charged in the sweep, 200 of whom have been charged criminally.

Elders Fall Victim to Social Engineering Schemes

Some of these identity fraud campaigns included grandparent scams in which seniors were contacted and told that their grandchildren had been arrested and needed bail money. Other scams suggested that seniors had won the lottery but needed to pay a large fee to get the winnings, or that they owed back taxes to the Internal Revenue Service (IRS).

In total, the Justice Department reported that more than 1 million people collectively lost “hundreds of millions of dollars” through these scams.

While some identity fraud is conducted through traditional technologies such as the telephone, there are other methods. For example, romance scams involve an attacker befriending a senior online and then asking for money to visit the U.S., among other pretenses.

An expert from the American Association of Retired Persons (AARP) Foundation noted that technology makes life much easier for scammers, as reported by USA Today. While phone-based scams might ensnare one senior at a time, email and other online channels allow fraudsters to reach millions of potential victims at once.

Identity Fraud by the Numbers

According to the Federal Trade Commission (FTC)’s “Consumer Sentinel Network Data Book 2017,” identity fraud made up 14 percent of consumer complaints last year, second only to debt collection.

The FTC also showed that, while scams against the elderly are a concern, younger citizens are equally at risk: 40 percent of millennials in their 20s said they lost money to fraud, compared to 18 percent of those over 70. However, seniors tended to suffer higher median losses than other age groups, the report found.

Although credit card scams involving new or existing accounts were among the major identity fraud issues highlighted in the FTC’s data, it also referred to other modes of attack such as online shopping and payment account schemes, data theft via email and social media, and more.

More from

Remote Employees: Update Your Routers (and More WFH IT Tips)

As a business owner or manager, you must ensure your employees have the right tools and resources to do their jobs well — especially with more people working from home. And IT infrastructure is one of the most important considerations regarding remote work.However, the truth is that most employees don’t think about their IT infrastructure until something goes wrong. In many cases, this can leave an employee stranded and unable to complete their tasks. In a worst-case scenario, this reactionary…

More School Closings Coast-to-Coast Due to Ransomware

Instead of snow days, students now get cyber days off. Cyberattacks are affecting school districts of all sizes from coast-to-coast. Some schools even completely shut down due to the attacks. The federal government recently warned that K-12 schools face a growing threat from cyber groups. According to the FBI, school districts often have limited cybersecurity protections, which makes them even more vulnerable. The FBI also says it anticipates the number of threats to increase. In a recent warning, the nation’s…

The Role of Human Resources in Cybersecurity

The human resources (HR) department is an integral part of an organization. They work with all departments with a wider reach than even IT. As a highly visible department, HR can support and improve an organization’s security posture through employee training. Their access to employees at the start of employment is an opportunity to lay a foundation for a culture of risk awareness. HR departments do not typically include cybersecurity risk awareness training with new hire onboarding, but it’s something…

New Attack Targets Online Customer Service Channels

An unknown attacker group is targeting customer service agents at gambling and gaming companies with a new malware effort. Known as IceBreaker, the code is capable of stealing passwords and cookies, exfiltrating files, taking screenshots and running custom VBS scripts. While these are fairly standard functions, what sets IceBreaker apart is its infection vector. Malicious actors are leveraging the helpful nature of customer service agents to deliver their payload and drive the infection process. Here’s a look at how IceBreaker…