Cybercrime Investigations 101: Anatomy of Fake Employment Listings

What you will learn

Explain the mechanics of a fake job listing scam.

Describe intelligence analysis.

Why is meta-data important?

What is the primary means by which this particular type of fraud succeeds?

Description

In this course, we will be discussing the nature of fake job listings fraud targeting remote workers, which utilizes fake job posts, and fake check scams, designed to victimize prospecting job candidates. In this particular fraud, malicious actors are using e-commerce websites which have been set up to create the false appearance of a legitimate business seeking to hire employees. Also, the fraud incorporates a popular check bouncing scam to then defraud their victims by asking that candidates deposit a fake check into their bank account, and then withdraw a portion of the deposit which candidates are then instructed to send back to the employer.


Get Instant Notification of New Courses on our Telegram channel.


Here students will learn how to counter Cybercrime by conducting reconnaissance on the attackers, which will familiarize students with certain tools and scripts designed for Geo-locating and GPS tracking, and social engineering techniques that are designed to gather further intelligence on our subject. Additionally, students will learn about the banking system, fake invoicing, social media, and the intelligence cycle that is used to analyze and corroborate information and data. The course will also teach students about User-Agent spoofing, ISPΒ IPΒ address locating, financial services and the banking system as such pertains to fake check scams, and the how attackers target their victims.

English
language

Content

Investigating Fake Job Listings Fraud Targeting Remote Workers

Investigating Fake Job Listings Fraud Targeting Prospecting Job Candidates
Reconnaissance, Banking System, Geo-Locating Fraud, and User-Agent Spoofing

Anatomy of Fake Job Listings and Check Scam Fraud

Fake Invoices, Check Bouncing, Licensing, Social Media & Financial Services
Social Engineering, Geo-Locating w/ Seeker & Ngrok, Screenshots, & Social Media

Countering Cybercrime, Social Engineering, Generating Leads for Investigators

Countering Cybercrime with Social Engineering, Bitcoin, and Generating Leads.
Wire Transfers, Identity Fraud, Money Transmitter Services, Response to Threats