March 27, 2018 By Shane Schick 2 min read

Law enforcement recently conducted the largest ever coordinated sweep of identity fraud cases targeting the elderly. According to the U.S. Department of Justice, more than 250 defendants have been charged in the sweep, 200 of whom have been charged criminally.

Elders Fall Victim to Social Engineering Schemes

Some of these identity fraud campaigns included grandparent scams in which seniors were contacted and told that their grandchildren had been arrested and needed bail money. Other scams suggested that seniors had won the lottery but needed to pay a large fee to get the winnings, or that they owed back taxes to the Internal Revenue Service (IRS).

In total, the Justice Department reported that more than 1 million people collectively lost “hundreds of millions of dollars” through these scams.

While some identity fraud is conducted through traditional technologies such as the telephone, there are other methods. For example, romance scams involve an attacker befriending a senior online and then asking for money to visit the U.S., among other pretenses.

An expert from the American Association of Retired Persons (AARP) Foundation noted that technology makes life much easier for scammers, as reported by USA Today. While phone-based scams might ensnare one senior at a time, email and other online channels allow fraudsters to reach millions of potential victims at once.

Identity Fraud by the Numbers

According to the Federal Trade Commission (FTC)’s “Consumer Sentinel Network Data Book 2017,” identity fraud made up 14 percent of consumer complaints last year, second only to debt collection.

The FTC also showed that, while scams against the elderly are a concern, younger citizens are equally at risk: 40 percent of millennials in their 20s said they lost money to fraud, compared to 18 percent of those over 70. However, seniors tended to suffer higher median losses than other age groups, the report found.

Although credit card scams involving new or existing accounts were among the major identity fraud issues highlighted in the FTC’s data, it also referred to other modes of attack such as online shopping and payment account schemes, data theft via email and social media, and more.

More from

Exploiting GOG Galaxy XPC service for privilege escalation in macOS

7 min read - Being part of the Adversary Services team at IBM, it is important to keep your skills up to date and learn new things constantly. macOS security was one field where I decided to put more effort this year to further improve my exploitation and operation skills in macOS environments. During my research, I decided to try and discover vulnerabilities in software that I had pre-installed on my laptop, which resulted in the discovery of this vulnerability. In this article, I…

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

IBM identifies zero-day vulnerability in Zyxel NAS devices

12 min read - While investigating CVE-2023-27992, a vulnerability affecting Zyxel network-attached storage (NAS) devices, the IBM X-Force uncovered two new flaws, which when used together, allow for pre-authenticated remote code execution. Zyxel NAS devices are typically used by consumers as cloud storage devices for homes or small to medium-sized businesses. When used together, the flaws X-Force discovered allow a remote attacker to execute arbitrary code on the device with superuser permissions and without requiring any credentials. This results in complete control over the…

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today