<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Fraudster Profile Podcast Series Archives | PYMNTS.com</title>
	<atom:link href="https://www.pymnts.com/tag/fraudster-profile-podcast-series/feed/" rel="self" type="application/rss+xml"/>
	<link>https://www.pymnts.com/tag/fraudster-profile-podcast-series/</link>
	<description>The latest global news and analysis in payments, retail, fintech, financial services and the digital economy.</description>
	<lastBuildDate>Tue, 22 Aug 2017 17:16:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.pymnts.com/wp-content/uploads/2022/11/cropped-PYMNTS-Icon-512x512-1.png?w=32</url>
	<title>Fraudster Profile Podcast Series Archives | PYMNTS.com</title>
	<link>https://www.pymnts.com/tag/fraudster-profile-podcast-series/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">225068944</site>	<itunes:explicit>no</itunes:explicit><itunes:image href="http://www.pymnts.com/wp-content/uploads/2016/08/MEET-THE-FRAUDSTERS-1-1.jpg"/><itunes:subtitle>The latest global news and analysis in payments, retail, fintech, financial services and the digital economy.</itunes:subtitle><itunes:category text="Business"><itunes:category text="Business News"/></itunes:category><itunes:author>PYMNTS.com</itunes:author><item>
		<title>Forter: The Sour Side Of Sweet-Talking Fraudsters</title>
		<link>https://www.pymnts.com/news/security-and-risk/2016/forter-on-the-rise-of-sweet-talking-fraudsters/</link>
					<comments>https://www.pymnts.com/news/security-and-risk/2016/forter-on-the-rise-of-sweet-talking-fraudsters/#respond</comments>
		
		
		<pubDate>Tue, 01 Nov 2016 08:02:41 +0000</pubDate>
				<category><![CDATA[Security & Fraud]]></category>
		<category><![CDATA[The Weekender]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Featured News]]></category>
		<category><![CDATA[Forter]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[Fraudster Profile Podcast Series]]></category>
		<category><![CDATA[global fraud]]></category>
		<category><![CDATA[Meet The Fraudsters]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[podcast]]></category>
		<guid isPermaLink="false">http://www.pymnts.com/?p=323966</guid>

					<description><![CDATA[<p>Not all fraudsters rely on being technically savvy to get by — some have the charm and deception to pry sensitive information right out of unsuspecting consumers and businesses. In the latest installment of Forter’s Meet The Fraudsters series, Forter Senior Fraud Analyst Gilit Saporta joined Karen Webster to discuss these Sweet-Talking Fraudsters and why their kindness shouldn’t be taken for weakness.</p>
<p>The post <a href="https://www.pymnts.com/news/security-and-risk/2016/forter-on-the-rise-of-sweet-talking-fraudsters/">Forter: The Sour Side Of Sweet-Talking Fraudsters</a> appeared first on <a href="https://www.pymnts.com">PYMNTS.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><audio class="wp-audio-shortcode" id="audio-323966-1" preload="none" style="width: 100%;" controls="controls"><source type="audio/wav" src="http://www.pymnts.com/wp-content/uploads/2016/11/Sweet-Talking-Fraudster-edit.wav?_=1" /><a href="http://www.pymnts.com/wp-content/uploads/2016/11/Sweet-Talking-Fraudster-edit.wav">http://www.pymnts.com/wp-content/uploads/2016/11/Sweet-Talking-Fraudster-edit.wav</a></audio></p><div
	id="article-paywall-overlay"
	class="d-none"
>
	<div id="article-paywall-content" class="my-4">
		
	</div>
</div>
<div id="article-paywall-hidden-content">
	
<p>&nbsp;</p>
<p>Stealing personal data or sensitive information doesn’t always require brute-force cyberattacks or massive data breaches.</p>
<p>Sometimes, it can happen just by having what seems like an innocent conversation with the wrong person. Enter the <strong>Sweet-Talking Fraudsters</strong>.</p>
<p>These Sweet-Talking Fraudsters don’t always need malicious code or cyberattacks to compromise information, instead their tools of the trade typically involve social engineering and social manipulation.</p>
<p>In the latest episode of the <strong>Meet The Fraudsters</strong> series,<strong> Gilit Saporta</strong>,<strong> senior fraud analyst at <a href="https://www.forter.com" target="_blank">Forter</a></strong>, explains why this particular fraudster profile is one that should not be underestimated.</p>
<p>Whether it&#8217;s someone who sparks a conversation with the intention of getting a person to divulge their mother’s maiden name or a fraudster posing as a customer in order to persuade the victim’s bank to change their mailing address, Sweet-Talking Fraudsters are everywhere.</p>
<p>Saporta compared them to the so-called &#8220;magicians&#8221; in the film &#8220;Now You See Me,&#8221; who have small talk with someone and, by talking about their childhood, they manage to get that person to say their mother’s maiden name.</p>
<p>Even with very minimal pieces of data, Saporta said it&#8217;s easy for these fraudsters to manipulate a customer support representative at an eCommerce establishment or a person’s financial institution.</p>
<p>&nbsp;</p>
<p><strong>Putting People Skills To Work</strong></p>
<p>For the Sweet-Talking Fraudster, their expertise lies in being friendly and unsuspecting.</p>
<p>Saporta explained that, oftentimes, they will friend a potential victim on Facebook to gather information or even stoop so low as to befriend their child on Facebook, hoping the kid may start chatting about family details.</p>
<p>Any information a Sweet-Talking Fraudster acquires can then be turned around and sold to more sophisticated cybercriminals. In many cases, a Sweet-Talking Fraudster’s lack of technical expertise is offset with their ability to gather data that can be used against both consumers and merchants.</p>
<p>While they may not be the cybercriminals making big-dollar scores or absconding with a lot of merchandise, they perpetrate these actions by selling information to the fraudsters that can.</p>
<p>&#8220;Think about the damage that they can do if they sell that information not to just one type of fraudster but to several as they usually do,” Saporta noted.</p>
<p>&nbsp;</p>
<p><strong>How To Stop The Sweet Talk</strong></p>
<p>The ways in which Sweet-Talking Fraudsters use and sell the data they steal can make their activities very difficult to detect.</p>
<p>Saporta recommended that, in order for merchants to protect themselves from the schemes of this particular fraudster profile, they may have to rely on third-party authentication services.</p>
<p>But picking the right security vendor is key.</p>
<p>&#8220;I know of third-party services that will automatically approve any transaction where anyone passes security questions, and merchants need to grow out of this phase,” she explained, because, oftentimes, Sweet-Talking Fraudsters have the information in their possession that can bypass security questions.</p>
<p>Trusting a single point of authentication to safeguard consumers and transactions is a mindset Saporta noted the entire industry needs to let go of.</p>
<p>&#8220;It&#8217;s always about a constant analytical effort to map the legit behaviors and the fraudulent behaviors in your particular industry,&#8221; she said. “Anti-fraud mechanisms are always multi-layered, as they should be. You just can&#8217;t rely on a single silver bullet to handle everything.”</p>

</div>
<script>
	window.pymntsAllowedArticleCount = 2;
	window.pymntsPostID = 323966;
</script><p>The post <a href="https://www.pymnts.com/news/security-and-risk/2016/forter-on-the-rise-of-sweet-talking-fraudsters/">Forter: The Sour Side Of Sweet-Talking Fraudsters</a> appeared first on <a href="https://www.pymnts.com">PYMNTS.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pymnts.com/news/security-and-risk/2016/forter-on-the-rise-of-sweet-talking-fraudsters/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="57277550" type="audio/wav" url="http://www.pymnts.com/wp-content/uploads/2016/11/Sweet-Talking-Fraudster-edit.wav"/>

		<post-id xmlns="com-wordpress:feed-additions:1">323966</post-id><media:content height="305" medium="image" url="https://www.pymnts.com/wp-content/uploads/2016/10/forter-sweet-talking-fraudster.jpg?w=457" width="457"/>	<dc:creator>PYMNTS.com</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Not all fraudsters rely on being technically savvy to get by — some have the charm and deception to pry sensitive information right out of unsuspecting consumers and businesses. In the latest installment of Forter’s Meet The Fraudsters series, Forter Senior Fraud Analyst Gilit Saporta joined Karen Webster to discuss these Sweet-Talking Fraudsters and why their kindness shouldn’t be taken for weakness. The post Forter: The Sour Side Of Sweet-Talking Fraudsters appeared first on PYMNTS.com.</itunes:subtitle><itunes:author>PYMNTS.com</itunes:author><itunes:summary>Not all fraudsters rely on being technically savvy to get by — some have the charm and deception to pry sensitive information right out of unsuspecting consumers and businesses. In the latest installment of Forter’s Meet The Fraudsters series, Forter Senior Fraud Analyst Gilit Saporta joined Karen Webster to discuss these Sweet-Talking Fraudsters and why their kindness shouldn’t be taken for weakness. The post Forter: The Sour Side Of Sweet-Talking Fraudsters appeared first on PYMNTS.com.</itunes:summary><itunes:keywords>Security &amp; Fraud, The Weekender, Cybersecurity, Featured News, Forter, fraud, Fraudster Profile Podcast Series, global fraud, Meet The Fraudsters, News, podcast</itunes:keywords></item>
		<item>
		<title>The True Face Of A Fraudster Mastermind</title>
		<link>https://www.pymnts.com/news/security-and-risk/2016/arch-fraudsters-pose-big-danger-merchants/</link>
					<comments>https://www.pymnts.com/news/security-and-risk/2016/arch-fraudsters-pose-big-danger-merchants/#respond</comments>
		
		
		<pubDate>Fri, 14 Oct 2016 08:00:23 +0000</pubDate>
				<category><![CDATA[Security & Fraud]]></category>
		<category><![CDATA[Forter]]></category>
		<category><![CDATA[Fraudster Profile Podcast Series]]></category>
		<category><![CDATA[fraudsters]]></category>
		<category><![CDATA[global fraud]]></category>
		<category><![CDATA[Main Feature]]></category>
		<category><![CDATA[meet fraudsters]]></category>
		<category><![CDATA[Meet The Fraudsters]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[podcast]]></category>
		<guid isPermaLink="false">http://www.pymnts.com/?p=320583</guid>

					<description><![CDATA[<p>Fraudsters come in all shapes and sizes, and frankly, all of them of are pretty scary. But there’s one particular type that may strike a little more fear into the hearts of unsuspecting consumers and businesses. In the latest episode of Forter’s Meet The Fraudsters series, Forter Senior Fraud Analyst Gilit Saporta joined Karen Webster to examine what could be the most dangerous fraudster of them all.</p>
<p>The post <a href="https://www.pymnts.com/news/security-and-risk/2016/arch-fraudsters-pose-big-danger-merchants/">The True Face Of A Fraudster Mastermind</a> appeared first on <a href="https://www.pymnts.com">PYMNTS.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><audio class="wp-audio-shortcode" id="audio-320583-2" preload="none" style="width: 100%;" controls="controls"><source type="audio/wav" src="http://www.pymnts.com/wp-content/uploads/2016/10/Arch-Fraudster.wav?_=2" /><a href="http://www.pymnts.com/wp-content/uploads/2016/10/Arch-Fraudster.wav">http://www.pymnts.com/wp-content/uploads/2016/10/Arch-Fraudster.wav</a></audio></p><div
	id="article-paywall-overlay"
	class="d-none"
>
	<div id="article-paywall-content" class="my-4">
		
	</div>
</div>
<div id="article-paywall-hidden-content">
	
<p>&nbsp;</p>
<p>Versatility is an attribute that many value — that kind of all-around utility player who can substitute for a key player or employee in a pinch.</p>
<p>That’s also the skill set of the “Arch Fraudster,” which makes them efficient as a fraudster and a dangerous nemesis to the online retailer.</p>
<p>In the most recent installment of the <a href="http://www.pymnts.com/tag/meet-the-fraudsters/" target="_blank"><strong>Meet The Fraudsters</strong></a> series,<strong> Gilit Saporta</strong>,<strong> senior fraud analyst at <a href="http://forter.com" target="_blank">Forter</a></strong>,<strong> </strong>sheds light on this somewhat mysterious but dangerous fraudster profile. When the most sophisticated and advanced — both technologically and analytically — cyberattacks take place, Saporta said Arch Fraudsters are typically the culprits.</p>
<p>&#8220;These are the guys who are not necessarily limited to just stolen credit cards or spoofed accounts. They can be very versatile. We can see them using their tech expertise for eCommerce fraud one day and then malware attacks on banks the next,” she explained.</p>
<p>Their versatility is rooted in the Arch Fraudster&#8217;s ability to be both tech-savvy and business-savvy, a great combination in an employee but a treacherous combination in a fraudster.</p>
<p>&nbsp;</p>
<p><strong>The Bigger, Badder Fraudster</strong></p>
<p>Arch Fraudsters have the savviness to move around segments and use different techniques to create problems for all types of online merchants. That, Saporta explained, makes them capable of carrying out a small number of thoroughly planned transactions to buy high-end items one day and then launch thousands of transactions to steal digital goods the next day. Their patience and tech expertise that gives them the ability to move from fraud tactic to fraud tactic also makes them hard to detect — and catch.</p>
<p>But how do these types of fraudsters acquire their skills?</p>
<p>Much like other fraudsters, it’s hard to nail down a single answer for how Arch Fraudsters are able to jump to the head of the cybercriminal ranks.</p>
<p>In many cases, Arch Frausters are just truly more creative and innovative than your average fraudster, Saporta noted.</p>
<p>While some share their insights and expertise on dark net forums, others will deliberately distribute false data to either troll less sophisticated fraudsters or create noise to distract from what they are really up to.</p>
<p>&nbsp;</p>
<p><strong>Staying Ahead Of The Fraudster Curve </strong></p>
<p>Arch Fraudsters tend to have various motivating factors — obviously, making money, but they also like to prove how far advanced they are compared to the other run-of-the-mill fraudsters. That gives them the incentive to invest the time and money necessary to set up impressive operations and ensure they don’t get caught.</p>
<p>According to Saporta, this can mean purchasing brand new devices and machines for every attack and paying for VPN services to stay hidden behind extra layers of anonymity. Arch Fraudsters are also known for setting up very convincing spoof websites that look almost exactly like established merchants.</p>
<p>Versatile.</p>
<p>It’s no wonder fighting these fraudsters is no easy task.</p>
<p>&#8220;I&#8217;m always the advocate for automation, but this is an area where I think merchants need a combination of strong automated systems and strong research teams,” Saporta explained, “because if you reach that level of sophistication as a fraudster, then you&#8217;re not going to give up.”</p>
<p>In some cases, these cybercriminals will even throw out bait to lure in unsuspecting merchants that may be trying to hunt them down. In turn, these merchants only open themselves up to more vulnerabilities.</p>
<p>Saporta issued a stern warning against merchants trying to independently investigate Arch Fraudsters and looking into dark net forums, even if they get a lead, because it could just be a phishing trap.</p>
<p>&#8220;If a merchant feels that they are encountering this level of fraud, then trying to handle it on their own will be very difficult. It&#8217;s only with the aid of professional anti-fraud services that it is truly realistic to tackle it.&#8221;</p>

</div>
<script>
	window.pymntsAllowedArticleCount = 2;
	window.pymntsPostID = 320583;
</script><p>The post <a href="https://www.pymnts.com/news/security-and-risk/2016/arch-fraudsters-pose-big-danger-merchants/">The True Face Of A Fraudster Mastermind</a> appeared first on <a href="https://www.pymnts.com">PYMNTS.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pymnts.com/news/security-and-risk/2016/arch-fraudsters-pose-big-danger-merchants/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="57997846" type="audio/wav" url="http://www.pymnts.com/wp-content/uploads/2016/10/Arch-Fraudster.wav"/>

		<post-id xmlns="com-wordpress:feed-additions:1">320583</post-id><media:content height="305" medium="image" url="https://www.pymnts.com/wp-content/uploads/2016/10/forter-arch-fraudster.jpg?w=457" width="457"/>	<dc:creator>PYMNTS.com</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Fraudsters come in all shapes and sizes, and frankly, all of them of are pretty scary. But there’s one particular type that may strike a little more fear into the hearts of unsuspecting consumers and businesses. In the latest episode of Forter’s Meet The Fraudsters series, Forter Senior Fraud Analyst Gilit Saporta joined Karen Webster to examine what could be the most dangerous fraudster of them all. The post The True Face Of A Fraudster Mastermind appeared first on PYMNTS.com.</itunes:subtitle><itunes:author>PYMNTS.com</itunes:author><itunes:summary>Fraudsters come in all shapes and sizes, and frankly, all of them of are pretty scary. But there’s one particular type that may strike a little more fear into the hearts of unsuspecting consumers and businesses. In the latest episode of Forter’s Meet The Fraudsters series, Forter Senior Fraud Analyst Gilit Saporta joined Karen Webster to examine what could be the most dangerous fraudster of them all. The post The True Face Of A Fraudster Mastermind appeared first on PYMNTS.com.</itunes:summary><itunes:keywords>Security &amp; Fraud, Forter, Fraudster Profile Podcast Series, fraudsters, global fraud, Main Feature, meet fraudsters, Meet The Fraudsters, News, podcast</itunes:keywords></item>
		<item>
		<title>The (Unfriendly) Fraudster Lurking Next Door</title>
		<link>https://www.pymnts.com/news/security-and-risk/2016/fraudster-profile-podcast-series-unfriendly-local-fraudster-forter/</link>
					<comments>https://www.pymnts.com/news/security-and-risk/2016/fraudster-profile-podcast-series-unfriendly-local-fraudster-forter/#respond</comments>
		
		
		<pubDate>Thu, 01 Sep 2016 08:02:23 +0000</pubDate>
				<category><![CDATA[Security & Fraud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Forter]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[Fraudster Profile Podcast Series]]></category>
		<category><![CDATA[global fraud]]></category>
		<category><![CDATA[Main Feature]]></category>
		<category><![CDATA[Meet The Fraudsters]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[podcast]]></category>
		<guid isPermaLink="false">http://www.pymnts.com/?p=302979</guid>

					<description><![CDATA[<p>Fraudsters are launching attacks from every nook and cranny in the world, but merchants should also keep a watchful eye on the fraudster down the block. In the latest installment of the Forter Fraudster Profile Series, Forter fraud analyst Gilit Saporta joined Karen Webster to shed light on the unique type of threat local fraudsters are bringing to your POS.</p>
<p>The post <a href="https://www.pymnts.com/news/security-and-risk/2016/fraudster-profile-podcast-series-unfriendly-local-fraudster-forter/">The (Unfriendly) Fraudster Lurking Next Door</a> appeared first on <a href="https://www.pymnts.com">PYMNTS.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><audio class="wp-audio-shortcode" id="audio-302979-3" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Part-2.mp3?_=3" /><a href="http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Part-2.mp3">http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Part-2.mp3</a></audio></p><div
	id="article-paywall-overlay"
	class="d-none"
>
	<div id="article-paywall-content" class="my-4">
		
	</div>
</div>
<div id="article-paywall-hidden-content">
	
<p>&nbsp;</p>
<p>When it comes to real estate and cybercrime, it seems, it’s all about location, location, location.</p>
<p>With data breaches on the rise and online merchants constantly under threat, retailers may assume the most dangerous fraud attacks are coming at them from the faceless, nameless bad guys all over the world.</p>
<p>True. But cybercriminals are far from only the faceless, nameless group performing their illicit activities from the dark corners of the Earth. In fact, in certain cases, those who are geographically closest to a merchant can be the toughest to combat and among the most dangerous.</p>
<p>The latest installment of the <strong>Fraudster Profile Podcast Series</strong>, which takes listeners inside the various fraudster personas across a diverse and ever-growing group of cybercriminals, is focused on a very underestimated, but no less dangerous, segment: The <strong>Unfriendly Local Fraudster</strong>.</p>
<p>&nbsp;</p>
<p><strong>Why Proximity Matters</strong></p>
<p>Fraudsters are as unique as fingerprints, it seems. Each have their own personalities and characteristics and apply their craft very differently to the online merchant world.</p>
<p>Local fraudsters — the ones that happen to be in the same country or even the same state of the merchants they are looking to scheme — can be a huge challenge to fraud systems.</p>
<p>As explained by <strong>Gilit Saporta</strong>,<strong> fraud analyst at </strong><a href="http://www.forter.com/" target="_blank"><strong>Forter</strong></a>,<strong> </strong>there is a specific pattern of behavior among domestic fraud criminals.</p>
<p>&#8220;These are often the fraudsters who gain from experience after spending some time being a <a href="http://www.pymnts.com/news/security-and-risk/2016/forter-profile-podcast-series-teenage-fraudsters/" target="_blank">teenage or nonprofessional fraudster</a>. Now, they are trying to make a living of it,&#8221; Saporta said.</p>
<p>That&#8217;s right: On-the-job training and climbing the corporate ladder are concepts that are alive and well in the cybercriminal world.</p>
<p>One method of attack by these unfriendly local fraudsters is trying to buy as many products as possible in order to quickly resell them, even if that means doing so from the back of a van somewhere, she added.</p>
<p>And though local fraudsters may not always be the most sophisticated, they still have a huge advantage in the form of resources and tools available to them.</p>
<p>&#8220;It&#8217;s like the fraudster next door who is knocking — that guy can get access to a variety of dropoff points and reshipping options that third-world countries aren&#8217;t going to be familiar with. Often, those are the guys who are easier to spot and catch,” Saporta explained.</p>
<p>For example, these local fraudsters know the geography so well — down to getting information about who might have stopped their mail or from Facebook pages about who might be on a family holiday and therefore away — that they can then intercept and change shipping addresses based on that knowledge to legitimate addresses. A package gets delivered on the front porch since no one is home — bad guy makes off with the loot.</p>
<p>In some cases, Saporta pointed out, these fraudsters are able to manage one bad transaction and then get another 10 through the door long before the merchant even realizes the products have been shipped to a legitimate address that may have been “compromised’ or an illegitimate one.</p>
<p>&nbsp;</p>
<p><strong>When Going Local Goes Bad</strong></p>
<p>Every merchant has unique vulnerabilities.</p>
<p>For some, the unfriendly local fraudster can be the most dangerous type of cyberthreat, while others face a bigger risk from more sophisticated fraudsters.</p>
<p>But Saporta noted that both fashion, as well as electronic and gadget retailers, are repeatedly attacked by domestic fraudsters who are “very serious in their intention to succeed.”</p>
<p>Though there may always be specific red flags associated with unauthorized transactions, in order to detect unfriendly local fraudster attacks, merchants need to keep an eye out for unusual bulk purchases.</p>
<p>To do this, it helps if merchants have a very clear picture of the legitimate behavior characterizing good customers on their website so that a reseller or an affiliate program isn&#8217;t mistaken for a local fraudster.</p>
<p>The biggest risk when it comes to this fraudster persona, Saporta explained, is if merchants miss out on an opportunity when they see a rise in sales and site traffic because of the possibility that the increase in orders could possibly be fraudulent.</p>
<p>One of the other unique challenges is that, as local fraudsters mature, they have the potential to progress into being more multichannel fraudsters. Saporta said these unfriendly local types may even begin working in gift card fraud because of how easily they can translate those cards into cash. Some of these more mature fraudsters may also end up being early adopters of technology and go into mobile.</p>
<p>Saporta said that not only do these unfriendly local fraudsters have a more business-like mindset but they are true professionals who know how to cover their tracks and are not afraid to invest in their craft.</p>
<p>&#8220;They are really financially — and very likely emotionally — invested in the fraud factories that they are running,&#8221; Saporta emphasized. &#8220;Just because it&#8217;s fraud doesn&#8217;t mean it&#8217;s not their day job.”</p>

</div>
<script>
	window.pymntsAllowedArticleCount = 2;
	window.pymntsPostID = 302979;
</script><p>The post <a href="https://www.pymnts.com/news/security-and-risk/2016/fraudster-profile-podcast-series-unfriendly-local-fraudster-forter/">The (Unfriendly) Fraudster Lurking Next Door</a> appeared first on <a href="https://www.pymnts.com">PYMNTS.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pymnts.com/news/security-and-risk/2016/fraudster-profile-podcast-series-unfriendly-local-fraudster-forter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="12352622" type="audio/mpeg" url="http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Part-2.mp3"/>

		<post-id xmlns="com-wordpress:feed-additions:1">302979</post-id><media:content height="305" medium="image" url="https://www.pymnts.com/wp-content/uploads/2016/09/forter-fraud-podcast-unfriendly-local-fraudster.jpg?w=457" width="457"/>	<dc:creator>PYMNTS.com</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>Fraudsters are launching attacks from every nook and cranny in the world, but merchants should also keep a watchful eye on the fraudster down the block. In the latest installment of the Forter Fraudster Profile Series, Forter fraud analyst Gilit Saporta joined Karen Webster to shed light on the unique type of threat local fraudsters are bringing to your POS. The post The (Unfriendly) Fraudster Lurking Next Door appeared first on PYMNTS.com.</itunes:subtitle><itunes:author>PYMNTS.com</itunes:author><itunes:summary>Fraudsters are launching attacks from every nook and cranny in the world, but merchants should also keep a watchful eye on the fraudster down the block. In the latest installment of the Forter Fraudster Profile Series, Forter fraud analyst Gilit Saporta joined Karen Webster to shed light on the unique type of threat local fraudsters are bringing to your POS. The post The (Unfriendly) Fraudster Lurking Next Door appeared first on PYMNTS.com.</itunes:summary><itunes:keywords>Security &amp; Fraud, Cybersecurity, Forter, fraud, Fraudster Profile Podcast Series, global fraud, Main Feature, Meet The Fraudsters, News, podcast</itunes:keywords></item>
		<item>
		<title>Say Hello To The New Kids On The Fraudster Block</title>
		<link>https://www.pymnts.com/news/security-and-risk/2016/forter-profile-podcast-series-teenage-fraudsters/</link>
					<comments>https://www.pymnts.com/news/security-and-risk/2016/forter-profile-podcast-series-teenage-fraudsters/#respond</comments>
		
		
		<pubDate>Thu, 18 Aug 2016 08:02:06 +0000</pubDate>
				<category><![CDATA[Security & Fraud]]></category>
		<category><![CDATA[The Weekender]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Featured News]]></category>
		<category><![CDATA[Forter]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[fraud protection]]></category>
		<category><![CDATA[Fraudster Profile Podcast Series]]></category>
		<category><![CDATA[fraudsters]]></category>
		<category><![CDATA[global fraud]]></category>
		<category><![CDATA[Main Feature]]></category>
		<category><![CDATA[Meet The Fraudsters]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[What's happening now]]></category>
		<guid isPermaLink="false">http://www.pymnts.com/?p=300152</guid>

					<description><![CDATA[<p>It’s natural to worry about teens acting reckless on the roads when they first get their driver’s license or even skipping school, but what about hacking into your POS system? Yes, that’s right. Many we consider to be the “hope of the future” are actually budding fraudsters. Gilit Saporta, fraud analyst at Forter, told Karen Webster all about the teenage fraudster demographic and why merchants may want to steer clear.</p>
<p>The post <a href="https://www.pymnts.com/news/security-and-risk/2016/forter-profile-podcast-series-teenage-fraudsters/">Say Hello To The New Kids On The Fraudster Block</a> appeared first on <a href="https://www.pymnts.com">PYMNTS.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><audio class="wp-audio-shortcode" id="audio-300152-4" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Part-1.mp3?_=4" /><a href="http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Part-1.mp3">http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Part-1.mp3</a></audio></p><div
	id="article-paywall-overlay"
	class="d-none"
>
	<div id="article-paywall-content" class="my-4">
		
	</div>
</div>
<div id="article-paywall-hidden-content">
	
<p>&nbsp;</p>
<p>We all know teenagers have a tendency to be a bit rebellious.</p>
<p>While some may be skipping school or making prank calls, there’s a growing demographic of teenagers out there with a new, more illicit hobby.</p>
<p><strong>Fraud.</strong></p>
<p>When it comes to fraudsters it’s easy to think of them as a faceless, nameless group of cybercriminals that come out to wreak havoc on payment systems and then retreat back to the hidden corners of the dark web.</p>
<p>But that’s just not the case.</p>
<p>Different segments of fraudsters have very different personas and motivations behind the activities they do.</p>
<p>In the new <strong>Fraudster Profile Podcast Series</strong>, <strong>Karen Webster</strong> is joined by <strong><a href="http://www.forter.com/" target="_blank">Forter</a> fraud analyst Gilit Saporta,</strong> who helps us to identify and break down the characteristics and personas within the diverse and ever-growing group of cybercriminals.</p>
<p>The latest installment focuses on a very surprising segment: teen fraudsters.</p>
<h3><strong>Just Teens Being Teens?</strong></h3>
<p>&#8220;With teenagers, we don&#8217;t believe that these guys are thinking of themselves as fraudsters to begin with,” Saporta explained, noting that in many cases teens may be exhibiting fraudulent behaviors but just see it as messing around or having fun.</p>
<p>Many teenagers today own smartphones and have an internet connection, so they essentially have the world in the palm of their hands.</p>
<p>With this type of access, they can quickly and easily take up what they think to be a “cool pastime,” such as using stolen credit card credentials to make purchases from their favorite game or seeing how many pizzas they can order before anyone notices.</p>
<p>And surprisingly, teenage fraudsters don’t always fit the mold of a thrill-seeking individual with highly sophisticated computer skills.</p>
<p>Saporta said that oftentimes the fraud attempts of teenage fraudsters take place with stolen card information that they may have picked up from a friend at school or perhaps a family member’s credentials.</p>
<p>“Sometimes you even see teenagers who aren&#8217;t that tech-savvy, but more often they have strong social media skills,&#8221; she added.</p>
<p><div id="attachment_300161" style="width: 467px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-300161" class="wp-image-300161 size-large" src="http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Gilit-Saporta-457x287.jpg" alt="Gilit Saporta , Fraud Analyst, Forter" width="457" height="287" srcset="https://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Gilit-Saporta-457x287.jpg 457w, https://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Gilit-Saporta-258x162.jpg 258w, https://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Gilit-Saporta-768x482.jpg 768w, https://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Gilit-Saporta.jpg 1000w" sizes="(max-width: 457px) 100vw, 457px" /><p id="caption-attachment-300161" class="wp-caption-text">Gilit Saporta , Fraud Analyst, Forter</p></div></p>
<h3><strong>The Cyber Hierarchy </strong></h3>
<p>Though the threat posed by teen fraudsters places them on the lower end of the <a href="http://www.pymnts.com/news/security-and-risk/2016/cybercriminal-ring-leader-gets-seven-years-in-prison/" target="_blank">cybercriminal totem pole</a>, the abundance of resources and support from the organized cyber ecosystem can still make them a problem for merchants.</p>
<p>What may be a prank or a game to a teen, still has the potential to cause harm to both merchants and customers alike.</p>
<p>And when these teenage fraudsters mature and decide to take their fraud activities more seriously, Saporta explained, they can certainly become more dangerous.</p>
<p>But the riskiest aspect of teen fraudsters is the fact that their activities can be very difficult to detect.</p>
<p>As Saporta pointed out, it can be hard to differentiate between the legitimate customer who just happens to be a teenager with consent to use a parent&#8217;s funding source, versus a teenager who is using a stolen credit card.</p>
<p>In many cases, teens committing fraud may not even realize their activities are fraudulent so they don’t bother to cover their tracks. On the flip side, those who are intentional in their fraudulent activities typically try to get creative when it comes to covering up their crimes, Saporta explained.</p>
<p>It’s not uncommon to see a teenage fraudster using pretty recognizable names – such as William Shakespeare, Justin Timberlake or even Kanye West – which may show they aren’t seriously trying to disguise themselves but may just view the fraudulent transaction as a gag, she added.</p>
<h3><strong>Putting Teen Fraudsters To Bed</strong></h3>
<p>Though Saporta couldn’t go into too much detail about Forter’s techniques for detecting and <a href="http://www.pymnts.com/news/2015/forter-adds-omnichannel-fraud-prevention-platform/" target="_blank">shutting down fraud</a> perpetrated by teens, she did share what’s important to keep in mind when seeing these types of activities.</p>
<p>The first step for analysts to differentiate between the legit behavior and the fraudulent behavior of teens is to try to walk a mile in the fraudster&#8217;s shoes and to really picture themselves as that teenager looking to commit fraud, intentionally or unintentionally.</p>
<p>Saporta said that while seeing fraud committed at the teenage level is not a new phenomenon, it is one that continues to evolve and grow.</p>
<p>Over the last five years in particular, she’s noted that teens are moving from simply using family members as a source for stolen credit cards to going online to find stolen credentials.</p>
<p>It’s no wonder this trend has emerged, especially with the <a href="http://www.pymnts.com/forter/" target="_blank">onslaught of data breaches</a> in recent years that have made compromised payment data more accessible than ever before.</p>
<p>Whether teenage fraudsters grow up to become full-fledged cybercriminals or simply grow out of the rebellious fraudster phase is something that really can’t be generalized, but Saporta noted that the fraud attempts that used to be very easily characterized as coming from teens have continued to evolve to the next level.</p>
<p>It seems as though the well-oiled cybercriminal machine is working a little too well.</p>
<p>But, there’s always a silver lining.</p>
<p>&#8220;The good news is that it means many of the fraudsters are going to be demonstrating fairly similar behaviors and tactics,” Saporta pointed out, adding that this means there is also a pattern of bad behavior and good behavior that theoretically can be differentiated and tackled.</p>
<p>&nbsp;</p>

</div>
<script>
	window.pymntsAllowedArticleCount = 2;
	window.pymntsPostID = 300152;
</script><p>The post <a href="https://www.pymnts.com/news/security-and-risk/2016/forter-profile-podcast-series-teenage-fraudsters/">Say Hello To The New Kids On The Fraudster Block</a> appeared first on <a href="https://www.pymnts.com">PYMNTS.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.pymnts.com/news/security-and-risk/2016/forter-profile-podcast-series-teenage-fraudsters/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure length="11760373" type="audio/mpeg" url="http://www.pymnts.com/wp-content/uploads/2016/08/Forter-Fraud-Series-Part-1.mp3"/>

		<post-id xmlns="com-wordpress:feed-additions:1">300152</post-id><media:content height="305" medium="image" url="https://www.pymnts.com/wp-content/uploads/2016/08/forter-fraud-podcast-teen-fraudsters.jpg?w=457" width="457"/>	<dc:creator>PYMNTS.com</dc:creator><itunes:explicit>no</itunes:explicit><itunes:subtitle>It’s natural to worry about teens acting reckless on the roads when they first get their driver’s license or even skipping school, but what about hacking into your POS system? Yes, that’s right. Many we consider to be the “hope of the future” are actually budding fraudsters. Gilit Saporta, fraud analyst at Forter, told Karen Webster all about the teenage fraudster demographic and why merchants may want to steer clear. The post Say Hello To The New Kids On The Fraudster Block appeared first on PYMNTS.com.</itunes:subtitle><itunes:author>PYMNTS.com</itunes:author><itunes:summary>It’s natural to worry about teens acting reckless on the roads when they first get their driver’s license or even skipping school, but what about hacking into your POS system? Yes, that’s right. Many we consider to be the “hope of the future” are actually budding fraudsters. Gilit Saporta, fraud analyst at Forter, told Karen Webster all about the teenage fraudster demographic and why merchants may want to steer clear. The post Say Hello To The New Kids On The Fraudster Block appeared first on PYMNTS.com.</itunes:summary><itunes:keywords>Security &amp; Fraud, The Weekender, Cybersecurity, Featured News, Forter, fraud, fraud protection, Fraudster Profile Podcast Series, fraudsters, global fraud, Main Feature, Meet The Fraudsters, podcast, What's happening now</itunes:keywords></item>
	</channel>
</rss>