Focus on EB-5 and EB-2 Visas Financial institutions are charged with mitigating the risks of products, services, and customers, and there are many risks presented in each area. For customer risk, one area that is often overlooked is the type of visa that a non-U.S. citizen has. Many institutions often donât consider this as a […]
Hacking Group Took Sim Swapping To The Next Level
This article was originally published onâŻfrankonfraud.com. Beginning in late 2021 and continuing late into 2022, a globally active, extortion-focused cyber threat actor group called Lapsus$ attacked dozens of well-known companies and government agencies around the world. It penetrated corporate networks, stole source code, and then demanded ransoms. In a newly released report by the US […]
Evolving Transaction Monitoring Efforts to Combat Sex Trafficking in the Era of Cryptocurrencies and the Darknet
Is your financial institution doing what it can and should to identify and mitigate sex trafficking money laundering risks? Are your risk assessment and transaction monitoring models up to date with emerging trafficking risks and trends? The rise of cryptocurrencies and the darknet (or dark web) have created new challenges for financial institutions in detecting […]
Fact vs. Myth: ACH Credits
Webinar: July 25 â Spotlight: Handling Suspect Credits in ACH Presenters:Â Sandy Ortins, AAP, APRP, NCPÂ Rayleen M. Pirnie, BCJ, AAP, CERPÂ Compliance Officers and Fraud Investigators are often challenged with identifying appropriate actions when money laundering activity or fraud is suspected with ACH credit entries. The ACH Network Rules must be balanced with applicable […]
[Wake-Up Call] It’s Time to Focus More on Preventing Spear Phishing
Fighting spear phishing attacks is the single best thing you can do to prevent breaches. Social engineering is involved in 70% to 90% of successful compromises. It is the number one way that all hackers and malware compromise devices and networks. No other initial root cause comes close (unpatched software and firmware is a distant second being involved […]
The Common Root Exploits of All Hackers and Malware Attacks
Readers, am I missing something in my inclusive list? I need your help. If you want to stop thieves from breaking into your house, over and over, you need to figure out how the thieves could break into your house (e.g., doors, windows, floor, ceiling, basement, roof, wall, etc.),figure out the MOST LIKELY ways they […]
Why EVERY Financial Institution Needs to Be a 314(b) Participant A Joint Effort from the desks of: NEACH and AML-ology
Imagine this: Nancy at ABC Credit Union calls Rayleen at MainStreet Bank to inquire about 3 large ACH transactions moving between accounts of the two financial institutions (FIs). The three transactions appeared in the transaction monitoring system at ABC Credit Union, prompting an AML investigation. Nancy suspects their member is a money mule. Rayleen at […]
Key Themes from Consent Orders
Warren Buffett once said, âWhen people tell me theyâve learned from experience, I tell them the trick is to learn from other peopleâs experience.â This is true in many areas of life, especially when it comes to BSA Consent Orders. BSA (Bank Secrecy Act) and OFAC (Office of Foreign Assets Control) personnel are wise to […]
Human Trafficking Digital Crimes
Human traffickers are quick to adapt their business models based on technology trends to grow their markets and increase their profits. Traffickers use technology as a force multiplier to profile, recruit, control and exploit their victims via a variety of online platforms, where personal information and details of peopleâs locations are readily available, they connect […]
Encryption Isnât Your Only Ransomware Problem – There Are Some Other Nasty Issues
Ransomware has become one of the most dreaded problems in the cyber world and itâs only getting worse. Much worse! Traditionally, ransomware was a trojan horse malware program which when it found a new host computer simply went off, encrypted all the data it could find, and sent the user an onscreen message to pay a […]