FraudHIGH

Vacant Homes - Adversaries Exploit Mail for Fraud

Featured image for Vacant Homes - Adversaries Exploit Mail for Fraud
BCBleepingComputer
mail fraudidentity theftdrop addressespostal servicesfraud tutorials
🎯

Basically, criminals use empty houses to steal mail and commit fraud.

Quick Summary

Criminals are exploiting vacant homes to intercept mail and commit fraud. This method targets sensitive information, leading to identity theft. Stay vigilant and monitor your mail to protect yourself.

What Happened

Threat actors have devised a cunning method to exploit vacant homes as drop addresses for intercepting mail. This tactic enables them to commit identity theft and financial fraud without relying on traditional cybercrime techniques like malware or phishing. Instead, they leverage legitimate postal services and weak identity verification processes to turn mail into a fraud vector.

Who's Affected

The primary victims of this scheme are individuals whose mail is intercepted. This includes anyone receiving sensitive documents like bank statements, credit cards, or verification letters. Additionally, the broader community is impacted as these fraudulent activities contribute to rising crime rates and undermine trust in postal services.

What Data Was Exposed

By intercepting mail, fraudsters can access a wealth of sensitive information. This includes:

  • Financial documents
  • Credit cards
  • Personal identification letters Such data can be used to commit further fraud, including account takeovers and unauthorized transactions.

What You Should Do

To protect yourself from becoming a victim of this scheme, consider the following actions:

  • Monitor your mail: Be vigilant about any unexpected changes in your mail delivery.
  • Use secure mailboxes: Invest in a secure mailbox or a mail forwarding service that requires strong identity verification.
  • Report suspicious activity: If you notice any signs of mail theft or identity fraud, report it to your local postal service and law enforcement.

Turning Vacant Properties into Fraud Infrastructure

The tutorial shared among criminals outlines how to identify and exploit vacant properties. Attackers are encouraged to search real estate platforms for recently listed rental properties, increasing the likelihood of finding a suitable drop address. They may even maintain these properties to avoid suspicion.

Monitoring Incoming Mail to Identify Valuable Targets

Once a drop address is established, attackers can utilize services like Informed Delivery to monitor incoming mail. This allows them to identify valuable items before physically accessing the mailbox. If the address is already registered, they can submit change-of-address requests to gain control over mail delivery.

Establishing Persistence through Mail Forwarding

After identifying valuable mail, the next step for attackers is to establish long-term access through mail forwarding services. Using fake identities and forged documents, they can redirect all incoming mail to a location under their control, effectively gaining continuous access to sensitive information.

A Hybrid Fraud Model Blending Digital and Physical Layers

This method reflects a broader trend in fraud operations, where attackers combine online intelligence gathering with physical manipulation. Reports indicate that mail theft has risen significantly, with schemes linked to hundreds of millions of dollars in suspicious activity. The integration of digital and physical tactics illustrates the evolving nature of fraud, which now requires organizations to adapt their defenses accordingly.

Expanding Attack Surface Beyond Traditional Cybersecurity Controls

The rise of these techniques presents a challenge for organizations. Many systems being exploited, such as real estate platforms and postal services, exist outside traditional cybersecurity defenses. As fraud operations evolve, detection will increasingly depend on correlating signals across various domains, including address usage patterns and identity inconsistencies. Without comprehensive visibility, these attacks may continue to evade conventional security measures.

🔒 Pro insight: This hybrid approach highlights the need for organizations to enhance monitoring of physical address usage to combat evolving fraud tactics.

Original article from

BCBleepingComputer· Sponsored by Flare
Read Full Article

Related Pings

HIGHFraud

Drift Protocol Hacked - $280 Million Stolen in Heist

A major security breach at Drift Protocol has resulted in a staggering $280 million loss. The hackers executed a sophisticated attack without exploiting flaws. Users are advised to avoid depositing funds while investigations are ongoing.

BleepingComputer·
MEDIUMFraud

Business Email Compromise - The New Threat Landscape Explained

A recent fraud attempt shows how business email compromise is evolving. Small organizations are now prime targets for these scams. Awareness is key to staying safe.

Cisco Talos Intelligence·
HIGHFraud

Drift Crypto Platform Hack - $280 Million Stolen by North Korea

A massive $280 million was stolen from Drift, a crypto platform, linked to North Korean hackers. This breach raises alarms about security in decentralized finance. Drift is working to trace the stolen assets and improve security measures.

The Record·
HIGHFraud

EvilTokens - New Phishing Campaign Abuses Microsoft Login

A new phishing campaign called EvilTokens is exploiting Microsoft’s device code flow to hijack accounts. Users in multiple countries are at risk. Stay alert and protect your credentials!

CSO Online·
HIGHFraud

Customer Authentication - Why Are They Sending Money to Scammers?

Fraud expert Lenny Gusel reveals how separating identity management from fraud detection increases risks. Customers can still be scammed even after authentication. Integrating these systems is crucial for security.

Help Net Security·
HIGHFraud

Digital Assets After Death - Managing Fraud Risks Explained

Fraudsters are targeting deceased individuals' digital accounts. Families must learn how to safeguard digital assets and prevent scams during this vulnerable time. Planning ahead can protect loved ones.

WeLiveSecurity (ESET)·