Blog Dark Reading Threat Dashboard: Cyber-Enabled Fraud

Dark Reading Threat Dashboard: Cyber-Enabled Fraud

How One Company’s Cybersecurity Problem Can Become Another's Fraud Problem is the fourth post of a threat intelligence dashboard series developed by TruSTAR and Dark Reading. The full analysis is hosted on Dark Reading.

Fraud isn’t something new or something that only happens on the Internet. Identity theft has been around for decades. What has changed is HOW fraud is executed; not only are individuals targeted, but now entire companies can become targets for fraud. For example, what are phishing sites masquerading as a legit websites if not an attempt at counterfeiting the identity of that company?

TruSTAR defines “cyber-enabled fraud” as fraud that is facilitated through the use of malware exploits, social engineering, and/or lateral movement through a compromised website, network or account. Note that all there of these can be, and many times are, used in conjunctions with one another.

To help you investigate this trend further on your own, we’ve provided a .txt file of curated IOCs that have been tried to both cyber and fraud campaigns we have observed on TruSTAR’s threat intelligence platform.

If you have any questions about this research, don’t hesitate to send our Data Science Unit a note via

Download Cyber-Enabled Fraud IOCs

Thanks for reading and happy hunting.

TruSTAR To Present Blockchain Research Tool At ShmooCon 2019 TruSTAR is headed to ShmooCon 2019! As a follow-on to our blockchain research debut at Black Hat and DEF CON 2018, TruSTAR will present a second ... Read More
IBM & Rackspace Select TruSTAR To Power Unprecedented New Cloud Fraud Exchange Partnership TruSTAR, a leader in cyber intelligence management, has announced a new partnership with IBM and Rackspace to create the Cloud Fraud Exchange, a ... Read More
The Rise of the Enterprise Intelligence Officer - Panel Discussion With Former CIA and AT&T Read More
Rackspace | Finally, a Truly Secure Approach to Threat Intelligence Exchange Finally, a Truly Secure Approach to Threat Intelligence Exchange Read More