Investigating Fake Remote Job Listings & Check Fraud



Cybercrime Investigations 101: Anatomy of Fake Employment Listings

What you will learn

Explain the mechanics of a fake job listing scam.

Describe intelligence analysis.

Why is meta-data important?

What is the primary means by which this particular type of fraud succeeds?

Description

In this course, we will be discussing the nature of fake job listings fraud targeting remote workers, which utilizes fake job posts, and fake check scams, designed to victimize prospecting job candidates. In this particular fraud, malicious actors are using e-commerce websites which have been set up to create the false appearance of a legitimate business seeking to hire employees. Also, the fraud incorporates a popular check bouncing scam to then defraud their victims by asking that candidates deposit a fake check into their bank account, and then withdraw a portion of the deposit which candidates are then instructed to send back to the employer.


Here students will learn how to counter Cybercrime by conducting reconnaissance on the attackers, which will familiarize students with certain tools and scripts designed for Geo-locating and GPS tracking, and social engineering techniques that are designed to gather further intelligence on our subject. Additionally, students will learn about the banking system, fake invoicing, social media, and the intelligence cycle that is used to analyze and corroborate information and data. The course will also teach students about User-Agent spoofing, ISP IP address locating, financial services and the banking system as such pertains to fake check scams, and the how attackers target their victims.

English
language

Content

Investigating Fake Job Listings Fraud Targeting Remote Workers

Investigating Fake Job Listings Fraud Targeting Prospecting Job Candidates
Reconnaissance, Banking System, Geo-Locating Fraud, and User-Agent Spoofing

Anatomy of Fake Job Listings and Check Scam Fraud

Fake Invoices, Check Bouncing, Licensing, Social Media & Financial Services
Social Engineering, Geo-Locating w/ Seeker & Ngrok, Screenshots, & Social Media

Countering Cybercrime, Social Engineering, Generating Leads for Investigators

Countering Cybercrime with Social Engineering, Bitcoin, and Generating Leads.
Wire Transfers, Identity Fraud, Money Transmitter Services, Response to Threats

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock

Check Today's 30+ Free Courses on Telegram!

X