Other Fraud Schemes Flashcards
A pharming scheme differs from phishing because:
A. The attacker delivers the solicitation message via telephones using Voice over Internet Protocol (VoIP) instead of email.
B. The attacker must rely on users clicking a link in an email or other message to direct them to the malicious website that is imitating a legitimate website.
C. The attacker does not have to rely on users clicking a link in an email or other message to direct them to the malicious website that is imitating a legitimate website.
D. The attacker delivers the solicitation message via short message service (also known as SMS or text messaging) instead of email.
C. The attacker does not have to rely on users clicking a link in an email or other message to direct them to the malicious website that is imitating a legitimate website.
See pages 1.1410-1.1411 in the Fraud Examiner’s Manual
Pharming is a type of attack in which users are fooled into entering sensitive data (such as a password or credit card number) into a malicious website that imitates a legitimate website. It is different from phishing because in pharming schemes, the attacker does not have to rely on users clicking a link in an email or other message to direct them to the imitation website.
In smishing schemes, the attacker uses text messages or other short message systems to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, internet service provider (ISP), or other entity with which the target does business.
In vishing schemes, the attacker leverages Voice over Internet Protocol (VoIP) in the telephone system to falsely claim to be a legitimate enterprise to scam users into disclosing personal information or executing an act that furthers a scheme.
After paying the ransom demanded by the fraudster, a ransomware victim is always granted access to all locked files on the compromised computer.
A. True
B. False
B. False
See pages 1.1426-1.1427 in the Fraud Examiner’s Manual
Ransomware, as its name implies, is a form of malware that locks a user’s operating system and restricts access to data files until a ransom is paid. While some ransomware simply prevents access to files, other forms encrypt users’ files or steal data. This is concerning to businesses due to the potentially disastrous threat of encrypted network drives. These schemes typically promise that, after payment is received, the user will be provided with a key to release the system and unencrypt files; however, even after money is transferred, many victims find that the malware remains installed on their machine and a key is never provided.
Less sophisticated forms of ransomware have also appeared that claim to have encrypted victims’ files when the malware has simply deleted the files, thus tricking victims into paying to regain access to files that no longer exist. Some forms of this imitation ransomware go a step farther by deleting the restore points and registry keys needed to reboot a system in safe mode or overwriting deleted files to make them nearly impossible to recover.
Fraudsters often use stolen credit or debit cards to purchase prepaid gift or debit cards to quickly convert illicit card funds into a legitimate cash equivalent.
A. True
B. False
A. True
See pages 1.1020 in the Fraud Examiner’s Manual
Among the schemes that prepaid cards are used to facilitate are payment (i.e., credit or debit) card theft schemes. Thieves use stolen payment cards to purchase prepaid debit or gift cards, thus quickly converting the illicit payment card funds into a legitimate cash equivalent.
__________ is the term used for including additional coverages in an insurance policy without the insured’s knowledge.
A. Sliding
B. Churning
C. Twisting
D. None of the above
A. Sliding
See pages 1.1104 in the Fraud Examiner’s Manual
Sliding is the term used for including additional coverage in an insurance policy without the insured’s knowledge. The extra charges are hidden in the total premium. Since the insured is unaware of the coverage, few claims are ever filed. For example, motor club memberships, accidental death, and travel accident coverage can usually be added to the policy without the insured’s knowledge.
Susanna was arrested for committing a fraud scheme. During her arrest, she falsely identified herself as her cousin, Laura, so that the crime would be attributed to Laura instead of Susanna. This scheme is an example of which of the following?
A. Business identity theft
B. True name fraud
C. Criminal identity theft
D. Account takeover
C. Criminal identity theft
See pages 1.804-1.805, 1.807-1.808 in the Fraud Examiner’s Manual
Criminal identity theft occurs when fraudsters falsely identify themselves as other people to law enforcement while being arrested or investigated for a crime. The crime is then incorrectly attributed to the other person instead of the fraudster.
Financial identity theft occurs when a fraudster uses an individual’s personal information for fraudulent financial transactions. Examples of financial identity theft include:
- Using an individual’s stolen credit card or credit card number to purchase goods (account takeover)
- Impersonating an individual to gain access to the individual’s bank account (account takeover)
- Using an individual’s personal information to open a new credit card account (true name fraud)
Business identity theft occurs when a fraudster impersonates a business to commit financial fraud. In addition to impersonating an existing business, fraudsters can use government business filings to reinstate a closed or dissolved business. They can also deceive third parties by creating a new business with a name similar to an existing business.
All the following can help prevent a computer from infection by malicious software EXCEPT:
A. Updating the operating system regularly
B. Using anti-malware software
C. Installing shareware into a system’s root directory
D. Updating with the latest security patches
C. Installing shareware into a system’s root directory
See pages 1.1431-1.1432 in the Fraud Examiner’s Manual
The following measures can help avoid infection from a malicious program:
- Use anti-malware software to scan all incoming email messages and files.
- Regularly update virus definitions in anti-malware programs.
- Use precaution when opening emails from acquaintances.
- Do not open email attachments unless they are from trusted sources.
- Only download files from reputable sources.
- Regularly update the operating system.
- Regularly update the computer with the latest security patches available for the operating system, software, browser, and email programs.
- Ensure that there is a clean boot disk to facilitate testing with antivirus software.
- Use a firewall and keep it turned on.
- Consider testing all computer software on an isolated system before loading it.
- In a network environment, do not place untested programs on the server.
- Secure the computer against unauthorized access from external threats such as hackers.
- Keep backup copies of production data files and computer software in a secure location.
- Scan pre-formatted storage devices before using them.
- Consider preventing the system from booting with a removable storage device (such as a USB flash drive); this might prevent accidental infection.
- Establish corporate policies and an employee education program to inform employees of how malware is introduced and what to do if malware is suspected.
- Encourage employees to protect their home systems as well. Many malware infections result from employees bringing infected storage devices or files from home.
The purpose of draw requests in construction lending is to provide:
A. Documentation that the construction project cannot continue without additional funding
B. Documentation that the design is approved by the International Union of Architects
C. Documentation that costs have been incurred and reimbursement is sought
D. Documentation that all architectural and engineering designs and quotes have been completed
C. Documentation that costs have been incurred and reimbursement is sought
See pages 1.908 in the Fraud Examiner’s Manual
Construction loan advances are generally supported by draw requests. A draw request is the documentation substantiating that a developer/borrower has incurred the appropriate construction expenses and is now seeking reimbursement or direct payment. A typical fraud scheme that occurs in a draw request involves requesting advances on the loan for inappropriate costs, such as personal expenses and/or construction costs for an unrelated project. Draw requests might provide the greatest opportunity for a developer to commit fraud because the lender relies upon the developer’s documentation.
Which of the following is NOT an indicator that a computer or network might have been accessed or compromised by an unauthorized user or entity?
A. Users are prompted to install unusual software or patches onto their computers.
B. Users receive a notification to update their system passwords before they expire.
C. An authorized user is denied access to an area in the network that is part of their role.
D. A user in the IT department detects geographical irregularities in network traffic.
B. Users receive a notification to update their system passwords before they expire.
See pages 1.1402-1.1403 in the Fraud Examiner’s Manual
Recognizing that a computer or network has been accessed by an unauthorized user or entity is one of the most important elements of cybersecurity. Signs that attackers have accessed or are currently attempting to access a system might be referred to as indicators of compromise (IOCs) or indicators of attack (IOAs) depending on the context. Regardless of the technical labels a cybersecurity professional might use to describe an indication of intrusion, it is important for fraud examiners and other computer system users to recognize signs that intruders have accessed or affected the system, which can include unusual inbound or outbound network traffic, anomalies in user access to network files, or unusual network or computer performance.
Every day, organizations’ networks experience inbound and outbound traffic as part of normal business operations. Among the typical types of traffic are emails sent to and from employees, as well as data transmitted to or from the internet. Abnormal traffic, either higher or lower than usual, could be an indication that an attacker has gained access to an organization’s network and is manipulating traffic by sending malicious software to the network or exfiltrating data from it. A common sign of unusual network traffic includes geographical irregularities related to network access and traffic.
Most organizations employ a system that restricts access to sensitive files or information on their network to those who require that access as part of their organizational role, and user patterns typically reflect access that aligns with normal business habits. Any abnormalities or outliers to the usual access patterns could indicate that the network has been compromised by an insider or external actor and might include passwords that are not working or bundles of data in the incorrect place.
Many different types of computer and network intrusion or compromise can result in performance issues for the computers or networks that are presumed to be affected, whether the issues relate to malware infection, external unauthorized access, or insider actions. Some unusual performance issues that could indicate that a computer or network is compromised include unexpected patching of systems or the installation of unwanted or unknown software.
All the following are methods of identity theft prevention that are recommended for businesses EXCEPT:
A. Limiting employees from accessing the personal information of customers
B. Performing audits of practices involving the handling of information only when regulators require it
C. Conducting background checks on prospective employees when permitted by law to gather that information
D. Restricting the use of laptops to those employees who need them to do their jobs
B. Performing audits of practices involving the handling of information only when regulators require it
See pages 1.816 in the Fraud Examiner’s Manual
The following are some of the steps that businesses can take to protect personal information and prevent identity theft:
- Limit the personal information collected from customers. For example, do not collect government identification numbers from customers unless there is a legal requirement to gather that information.
- Restrict employees from accessing the personal information of customers and coworkers.
- Use network-security tools to monitor who accesses personal information.
- Do not retain personal information for longer than necessary.
- Adopt a policy regarding the handling of information that governs how personal information is stored, protected, and disposed of. Strictly enforce the policy, and discipline employees who violate it.
- Conduct regular employee training on the company’s policy regarding the handling of information and best practices for preventing identity theft.
- Ensure the security of buildings by using locks, access codes, and other security features.
- Keep physical documents containing personal information in locked rooms or locked file cabinets.
- Secure all computer networks and electronic information.
- Use encryption to protect all personal information stored by the company or sent to third parties. Encryption should also be used to protect information sent over the company’s wireless network.
- Restrict the use of laptops to those employees who need them to do their jobs.
- Require employees to use complex passwords or passphrases.
- Where permitted by law, perform background checks on prospective employees.
- Thoroughly investigate contractors and vendors before hiring them.
- Do not use government identification numbers as employee identification numbers or print them on paychecks.
- Perform regular audits of practices involving the handling of information, network security, and other internal controls.
- Create a data breach response plan.
High percentages of returns, missing compliance certificates, and evidence of falsified test inspection results are red flags of which of the following procurement fraud scenarios?
A. A contractor charging the procuring entity for labor costs that are not permissible
B. A contractor delivering goods or services that do not conform to the contract specifications
C. Two or more competing contractors agreeing to refrain from bidding
D. A procuring employee manipulating the bidding process to benefit a favored contractor
B. A contractor delivering goods or services that do not conform to the contract specifications
See pages 1.1523-1.1525 in the Fraud Examiner’s Manual
Nonconforming goods or services fraud, also known as product substitution or failure to meet contract specifications, refers to attempts by contractors to deliver goods or services to the procuring entity that do not conform to the underlying contract specifications. Once contractors deliver goods that do not conform to the contract, they bill and receive payment for conforming goods or services without informing the purchaser of the deficiency.
The following is a list of potential red flags for nonconforming schemes:
- High percentage of returns for noncompliance regarding specifications
- Missing, altered, or modified product compliance certificate
- Compliance certificates signed by employees with no quality assurance responsibilities
- Materials testing done by supplier, using the supplier’s own personnel and facilities
- Evidence that test or inspection results were falsified (e.g., documents appear altered or modified, test documents are illegible, signatures on documents are illegible, documents were signed by unqualified or inappropriate personnel, or test reports are similar or identical to sample descriptions and test results)
- Highest profit product lines have the highest number of material return authorizations or reshipments
- Discrepancy between product’s description or normal appearance and actual appearance (e.g., a new product appears to be used)
- Used, surplus, or reworked parts are delivered
- Delivery of products that appear counterfeit (e.g., product packaging, appearance, and description do not appear genuine; items that are consistently defaced in the same area; items that appear different from each other)
- Offers by contractors to select the sample and prepare it for testing
- Delivery of look-alike goods
- Unusually high number of early replacements
- Contractor restricts or avoids inspections of goods or services upon delivery
Unscrupulous debt consolidation schemes include each of the following EXCEPT:
A. The debt consolidation company writes a letter to the debtor’s creditors and arranges a payment plan.
B. The debt consolidation company charges an up-front processing fee and then disappears.
C. The debt consolidation company guarantees the debtor will receive a loan or credit card regardless of the debtor’s credit ratings.
D. The debt consolidation company collects payments but does not appropriately forward them.
A. The debt consolidation company writes a letter to the debtor’s creditors and arranges a payment plan.
See pages 1.1302 in the Fraud Examiner’s Manual
Unscrupulous debt consolidation schemes often involve the agency collecting the money from the debtor but not forwarding it to the creditors. In some instances, considerable time can pass before the debtor discovers that their money has been misappropriated. Another variation of the debt consolidation scheme occurs when customers are guaranteed that they will receive a loan or a credit card regardless of their credit rating. Typically, the victims have been rejected by legitimate financial institutions because their credit ratings are poor. The victim must pay a processing fee for the application to be accepted. After the victim pays the fee, the fraudster disappears.
To conduct an electronic payment using a person-to-person (P2P) system, the two individuals must meet in person at a financial institution to sign an order requesting the transfer of money from one person’s account to the other.
A. True
B. False
B. False
See pages 1.1031 in the Fraud Examiner’s Manual
Individuals can pay each other for goods or services electronically, which is known as the person-to-person (P2P) system. Many credit cards and banks offer this service to their customers. P2P payments can now be made through a variety of services using a computer, smartphone application, or email address.
Which of the following is a way that dishonest contractors collude to evade the competitive bidding process?
A. Submit bids that are competitive in price.
B. Submit invoices for work that was not performed or materials that were not delivered.
C. Use obscure publications to publish bid solicitations.
D. Submit token bids that are not genuine attempts to win the contract.
D. Submit token bids that are not genuine attempts to win the contract.
See pages 1.1511 in the Fraud Examiner’s Manual
Schemes involving collusion among contractors seek to evade the competitive bidding process. In these schemes, competitors in the same market collude to defeat competition or to inflate the prices of goods and services artificially.
Complementary bidding (also known as protective, shadow, or cover bidding) is a common form of collusion between competitors, and it occurs when competitors submit token bids that are not genuine attempts to win the contract. Token bids give the appearance of genuine bidding, but, by submitting token bids, the conspirators can influence the contract price and who is awarded the contract.
Which of the following are considered red flags of insider cyberfraud?
I. Access privileges are limited to those required to perform assigned tasks.
II. Access logs are not reviewed.
III. Production programs are run during normal business hours.
IV. Exception reports are not reviewed and resolved.
A. I and III only
B. I, II, III, and IV
C. III and IV only
D. II and IV only
D. II and IV only
See pages 1.1405 in the Fraud Examiner’s Manual
The following are conditions that produce an environment that is conducive to, or facilitates, insider cyberfraud:
- Access privileges are beyond those required to perform assigned job functions.
- Exception reports are not reviewed and resolved.
- Access logs are not reviewed.
- Production programs are run at unusual hours.
- Lack of separation of duties exists in the data center.
Which of the following is the BEST definition of the automobile insurance scheme known as ditching?
A. An insured falsely reports a vehicle as stolen to collect on an insurance policy.
B. An agent inflates their commissions by pressuring customers to unnecessarily replace existing policies for new ones.
C. An insured has two insurance policies in place and files claims with both.
D. An agent collects a customer’s premium but does not remit the payment to the insurance company.
A. An insured falsely reports a vehicle as stolen to collect on an insurance policy.
See pages 1.1105 in the Fraud Examiner’s Manual
Ditching, also known as owner give-ups, involves disposing of a vehicle to collect on an insurance policy or settle an outstanding loan. The vehicle is normally expensive and purchased with a small down payment. The owner falsely reports the vehicle as stolen while orchestrating its destruction or disappearance in some way, such as by having it stripped for parts, burned, or submerged in a large body of water. In some cases, the owner just abandons the vehicle, hoping that it will be stolen. Sometimes the scheme involves a homeowner’s insurance claim for the property that was supposedly in the vehicle when it was “stolen.”
If an insurance company fails to follow procedures to detect fraudulent claims when acting as an intermediary for a government health care program, it can be found guilty of fraud in some jurisdictions.
A. True
B. False
A. True
See pages 1.1231 in the Fraud Examiner’s Manual
When an insurance company acts as an intermediary administering a government health care program, the insurance company has a duty to try to detect false claims by providers and beneficiaries. Although it is impossible to detect every fraudulent claim, if a company bypasses its own claims verification procedures, it can be found guilty of fraud in some jurisdictions.
All the following are correct statements about identity theft EXCEPT:
A. Solicitations for pre-approved credit cards are especially valuable to identity thieves.
B. The type of malware that is most commonly associated with identity theft is ransomware.
C. One way to conceal identity theft is to change the victim’s mailing address.
D. Identity thieves often engage in pretexting by impersonating the victim’s bank.
B. The type of malware that is most commonly associated with identity theft is ransomware.
See pages 1.809-1.811, 1.814 in the Fraud Examiner’s Manual
Identity thieves use malware to steal personal and business information from computers. The type of malware that is most commonly associated with identity theft is spyware, which is software that collects and reports information about a computer user without the user’s knowledge or consent.
Dumpster diving can yield bills, credit card receipts, bank statements, and other items that contain a person’s name, address, and telephone number. Solicitations for pre-approved credit cards are especially valuable to identity thieves, but even nonfinancial information can be useful.
Another way to obtain personal or business information is to surreptitiously change the victim’s mailing address (or email address) to an address selected by the identity thief. In this way, the identity thief receives the victim’s mail directly, and no theft is required.
Identity thieves often engage in pretexting by impersonating the victim’s bank or another financial institution with which the victim has a business relationship.
Insurance agent/broker fraud includes which of the following?
A. Fictitious death claims
B. Premium theft
C. Fictitious payees
D. All of the above
D. All of the above
See pages 1.1102-1.1103 in the Fraud Examiner’s Manual
Types of insurance agent/broker fraud include:
- Premium theft—An agent collects the premium but does not remit the payment to the insurance company. Thus, the insured unknowingly has no coverage available upon a qualifying event.
- Fictitious payees—An agent or a clerk changes the beneficiary on record to a fictitious person and subsequently submits the necessary papers to authorize the issuance of a payment.
- Fictitious death claims—An agent or employee obtains a fictitious death certificate and requests that a death claim payment be issued. The agent then steals the payment.
Which of the following statements about vendor management best practices is INCORRECT?
A. The person who maintains the vendor master file should have the authority to approve payments for invoices.
B. Vendor master files should be kept current to reduce the risk of duplicate payments.
C. The procedures used to monitor vendors should address the red flags of vendor schemes that pose the greatest risk.
D. Vendors should be subject to a background check before they are added to the vendor master file.
A. The person who maintains the vendor master file should have the authority to approve payments for invoices.
See pages 1.1536 in the Fraud Examiner’s Manual
The person responsible for the vendor master file should not be authorized to approve payments for invoices or to sign checks.
Procurement entities must maintain an accurate and up-to-date vendor master file. An inaccurate or incomplete vendor master file can result in greater risks of duplicate payments, unfavorable payment terms, and noncompliance regarding regulations. Thus, the vendor master file should be updated continuously and reviewed on a regular basis for inaccurate or incomplete records.
To manage vendors, a procuring entity must establish clear procedures for setting up new vendors and changing vendor master file records. For example, procuring entities should require accounts payable personnel to verify new vendors (i.e., ensure that the vendors are qualified) by conducting a vendor background check before entering them into the vendor master file.
Procuring entities must also use monitoring and auditing systems reasonably designed to detect criminal conduct by their vendors. The procedures to monitor vendors are similar to those used to evaluate vendors, and they should address red flags of vendor schemes that pose the greatest risk.
A draw request on a construction loan should be accompanied by all the following EXCEPT:
A. Inspection reports
B. Lien releases from subcontractors
C. Change orders, if applicable
D. Expenses from similar contracts
D. Expenses from similar contracts
See pages 1.908-1.909 in the Fraud Examiner’s Manual
A draw request is the documentation substantiating that a developer has incurred the appropriate construction expenses and is now seeking reimbursement or direct payment. Generally, draw requests on construction loans are made on a periodic schedule (e.g., once a month) and are verified by a quantity surveyor (QS) or other authorized entity as agreed to by the financial institution. The request should be accompanied by the following documents:
- Paid invoices for raw materials
- Lien releases from each subcontractor
- Inspection reports
- Canceled checks from previous draw requests
- Bank reconciliation for construction draw account for previous month
- Loan balancing form demonstrating that the loan remains in balance
- Change orders, if applicable
- Wiring instructions, if applicable
- Proof of developer contribution, if applicable
Which of the following BEST describes a linked financing loan fraud scheme?
A. Borrowers pledge the same collateral with different lenders before liens are recorded without telling the lenders.
B. Unqualified borrowers misrepresent personal creditworthiness, overstate their ability to pay, and misrepresent characteristics of a housing unit.
C. Insiders in different banks cause their banks to lend funds or sell loans to other banks with agreements to buy their loans.
D. Large deposits (usually brokered deposits) are offered to a bank on the condition that loans are made to individuals affiliated with the deposit broker.
D. Large deposits (usually brokered deposits) are offered to a bank on the condition that loans are made to individuals affiliated with the deposit broker.
See pages 1.905-1.906 in the Fraud Examiner’s Manual
In a linked financing scheme, large deposits (usually brokered deposits) are offered to a bank on the condition that loans are made to individuals affiliated with the deposit broker.
In a residential loan fraud scheme, unqualified borrowers misrepresent personal creditworthiness, overstate their ability to pay, and misrepresent characteristics of a housing unit they intend to occupy or treat as an investment property to qualify for a loan.
In double-pledging collateral schemes, borrowers pledge the same collateral (i.e., an item of value used to secure or guarantee a loan) with different lenders before liens are recorded without telling the lenders.
In a reciprocal loan arrangements scheme, insiders in different banks cause their banks to lend funds or sell loans to other banks with agreements to buy their loans, which is done to conceal loans and sales.
One method that competitive intelligence professionals commonly use to gather data about a competitor involves posing as a job applicant and interviewing with key employees at the competing company. This practice is BEST described as conducting surveillance.
A. True
B. False
B. False
See pages 1.707-1.708 in the Fraud Examiner’s Manual
Intelligence professionals might gather data through human intelligence (i.e., through direct contact with people). Generally, human intelligence is gathered from subject-matter experts and informed individuals. Such efforts typically target individuals who can provide the most valuable information.
For example, an intelligence professional might gather intelligence by posing as a customer of the target entity. This approach exploits two weaknesses of corporate culture: (1) all salespeople want to make a sale and (2) many salespeople will do almost anything to make a sale. Other approaches include:
- Employment interviews (real and fake)
- False licensing negotiations
- False acquisition or merger negotiations
- Hiring an employee away from a target entity
- Planting an agent in a target organization
- Social engineering
An address similarity report is an electronic insurance fraud detection tool that compares multiple payments going to the same address.
A. True
B. False
A. True
See pages 1.1123 in the Fraud Examiner’s Manual
Data analysis is an effective tool used to detect insurance fraud schemes. By using data analytics, fraud examiners can generate reports that provide good leads to possible fraud. For example, address similarity reports electronically compare multiple payments going to the same address. These reports are extremely useful because they might show a payment defalcation or funds going to another insurance company, broker, or fictitious payee.
Which of the following activities does NOT typically occur during the containment and eradication step of the recommended methodology for responding to cybersecurity incidents?
A. Identifying all breaches that occurred
B. Restoring control of the affected systems
C. Limiting the damage caused by the attack
D. Notifying the appropriate internal personnel
A. Identifying all breaches that occurred
See pages 1.1462-1.1463, 1.1465 in the Fraud Examiner’s Manual
Every organization should be ready to respond to a wide range of cybersecurity incidents, including cyberattacks and data breaches. The recommended methodology for responding to cybersecurity incidents can be summarized in the following steps:
- Preparation
- Detection and analysis
- Containment and eradication
- Breach notification
- Recovery and follow-up
The focus of the detection and analysis step is to identify incidents of breach as quickly as possible.
During the containment and eradication step, management must rely on its preparation and planning to mitigate the attack effectively and efficiently. The idea is to restore control of the affected systems and limit the damage. Other considerations, such as identifying the intruder, are important, but maintaining control of the system is a primary concern. Also, appropriate personnel must be notified in accordance with the incident response plan. Information about the attack should be distributed on a need-to-know basis. Managers need to distribute enough information to effectively combat the problem without creating panic or additional vulnerabilities.