Fraud Basics
Social Engineering
Transaction Monitoring
Cyber Fraud
100

This type of fraud involves stealing someone’s personal information to open accounts.


Identity Theft

100

Fraudsters pretending to be the bank by phone is an example of this.


Impersonation

100

Multiple transactions just below a CTR reporting thresholds may indicate this activity.


Structuring

100

Emails designed to steal credentials are called this.

Phishing

200

A fraudster uses fake checks and quickly withdraws funds before the check bounces.


Check Kiting

200

A phishing attack conducted through text messages is called this.


Smishing

200

Suspicious activity, for example sudden international wire transfer from a normally inactive account, is considered this.

Red Flag

200

This security control adds a second layer of verification beyond passwords.

Multi-Factor Authentication (MFA)

300

Fraudsters alter stolen paper checks by changing the payee or dollar amount using chemicals or other methods.

Check Washing

300

Scammers use emotional manipulation and fake relationships in this scam type.


Romance Scam

300

Multiple small purchases on on a card may indicate this type card activity.

Unauthorized Card Use/Charges

300

Fraudsters install devices on ATMs to steal card data using this method.

Card Skimming

400

Fraudsters recruit people to transfer stolen money through their accounts. These individuals are called this.

Money Mule

400

A fraudster sends a fake email pretends to be a senior executive and pressures an employee to urgently transfer funds or share sensitive information.


Business Email Compromise

400

A customer’s account suddenly shows transactions that are significantly outside their normal spending or withdrawal behavior.

Unusual Account Activity

400

Malicious software that locks systems until payment is made is called this.


Ransomware