Today’s cyber criminals have a wide variety of tools and services for committing both online and physical crimes. Most of the threats we hear about today are malware, phishing and targeted attacks; however, identity theft and identity forgery are regaining momentum due to new offerings from multiple underground vendors.

Don’t Call It a Comeback

While it is a crime on its own, tampering with official documents to create or change an identity can be an important part of a broader cyber crime scheme. Some criminals use fake documents to perform new account fraud (NAF), while others manipulate bank statements, utility bills and credit card scans to enroll in services that require official documents for registration. While the latter is mostly used to access online betting and gambling sites, fake documents (including passports, ID cards and driver’s licenses) allow a fraudster to walk into a physical bank branch, show ample proof of identity and open a new account under someone else’s name.

Once the account is open, the fraudster can request that all his bills (for services registered under false identities) be charged to that account. These could include credit card bills, utility bills and any other form of payment the fraudster wishes. The fraudster will never actually pay these bills, and the debt will start growing. When the bank or one of the companies investigates the issue, they will end up talking to the person whose identity was used and not the fraudster.

Cyber Crime On Demand

The increase of identity services being offered in the underground has made NAF an easier attack vector than ever. Today’s criminal identity services are so easy to access and use that the websites themselves have become an “on demand” instant identity one-stop shop. All a fraudster needs to do is choose the document he wishes to forge — be it a U.S. passport, a European driver’s license, a credit card statement or another type of official document — provide the website with the picture and credentials he wishes to forge and pay using an anonymous payment service or a virtual currency. Within mere seconds, the documents will be created.

Does this sound familiar? It is the same basic idea behind variable data printing (VDP), an approach often used to create custom calendars and gift cards. For those fraudsters who want more than just a document, some underground forum members offer “the complete package”: New or stolen identity documents, including a physical ATM card, passport, online credentials, credit card numbers and more, shipped to the customer’s house for as low as $350.

To learn more about these types of cyber underground activities, as well as other techniques and tools today’s cyber criminals use to target institutions and end users, please view our on-demand webinar on the latest offerings from the criminal underground.

More from Fraud Protection

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

How Security Teams Combat Disinformation and Misinformation

“A lie can travel halfway around the world while the truth is still putting on its shoes.” That popular quote is often attributed to Mark Twain. But since we're talking about misinformation and disinformation, you’ll be unsurprised to learn Twain never said that at all. In fact, no one knows who first strung those words together, but the idea that truth spreads slowly while lies spread quickly is at least several hundred years old. The “Twain” quote also serves to…

A View Into Web(View) Attacks in Android

James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses overlay techniques to steal victims’ credentials. In 2022, IBM Security Trusteer researchers discovered a new trend in financial mobile malware that targets…

New DOJ Team Focuses on Ransomware and Cryptocurrency Crime

While no security officer would rely on this alone, it’s good to know the U.S. Department of Justice is increasing efforts to fight cyber crime. According to a recent address in Munich by Deputy Attorney General Lisa Monaco, new efforts will focus on ransomware and cryptocurrency incidents. This makes sense since the X-Force Threat Intelligence Index 2022 named ransomware as the top attack type in 2021. What exactly is the DOJ doing to improve policing of cryptocurrency and other cyber…