fraudster hunter: delivering a strategic advantage to

9
Fraudster Hunter: Delivering a strategic advantage to financial organisations to stop fraud at the source

Upload: others

Post on 15-Jan-2022

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fraudster Hunter: Delivering a strategic advantage to

Fraudster Hunter: Delivering a strategic advantage to financial organisations to stop fraud at the source

Page 2: Fraudster Hunter: Delivering a strategic advantage to

)NQDCN�ƒPCPEKCN�KPUVKVWVKQPU�JCXG�DGGP�GPICIGF�KP�CP�CTOU�TCEG�YKVJ�HTCWF�CPF�E[DGTETKOG�ICPIU�HQT�VJG�DGUV�RCTV�QH�VYQ�FGECFGU��During this time, banks have largely been playing in defence, seemingly one step behind the fraudsters. (KTUV�KV�YCU�RJKUJKPI�CPF�GCTN[�DCPMKPI�VTQLCPU��VJGP�F[PCOKE�OCNYCTG�HGCVWTKPI�RQN[OQTRJKE�CPF�FQOCKP�IGPGTCVKQP�CNIQTKVJO�&)#��VGEJPKSWGU��#U�DGJCXKQWT�DCUGF�FGHGPEGU�YGTG�FGXGNQRGF�VQ�VCEMNG�VJGUG�VJTGCVU��DQVU��TGOQVG�CEEGUU�VTQLCPU�4#6U��CPF�GOWNCVQTU�GOGTIGF�VQ�ECWUG�OQTG�EJCQU��

6QFC[�C�E[DGTETKOG�GEQPQO[�RQVGPVKCNN[�worth as much CU������VTKNNKQP�CPPWCNN[�UWRRQTVU�a vast underworld marketplace for breached identity and ƒPCPEKCN�FCVC�CU�YGNN�CU�HQT�CWVQOCVGF�HTCWF�VQQNU�CPF�MPQY�JQY�

The current pandemic is spurring a new wave of digital transformation�KP�VJG�KPFWUVT[�CU�DCPMU�CPF�NGPFGTU�UETCODNG�VQ�UWRRQTV�OCUU�TGOQVG�YQTMKPI�CPF�EWUVQOGTU�YJQ�CTG�TGNWEVCPV�VQ�UGV�HQQV�KPUKFG�DTCPEJGU�

According to Deloitte������QH�75�EWUVQOGTU�JCXG�KPETGCUGF�VJGKT�WUG�QH�QPNKPG�DCPMKPI�FWTKPI�VJG�ETKUKU��#U�VJKU�ITQYVJ�EQPVKPWGU�UQ�YKNN�VJG�NGXGN�QH�QPNKPG�HTCWF��GXGP�NCUV�[GCT��QXGT�����QH�TGURQPFGPVU�VQ�-2/)ŨU�Global Banking Fraud Survey TGRQTVGF�CP�KPETGCUG�KP�HTCWF�XQNWOG�CPF�QXGT�����GZRGTKGPEGF�CP�KPETGCUG�KP�HTCWF�NQUUGU�

#U�HTCWFUVGTU�VCMG�CFXCPVCIG�QH�TGCFKN[�CXCKNCDNG�KFGPVKV[�FCVC��CPQP[OKUKPI�VQQNU��CWVQOCVGF�DQVU�CPF�YKNNKPI�OWNGU��VJG�QFFU�EQPVKPWG�VQ�UVCEM�WR�CICKPUV�ƒPCPEKCN�KPUVKVWVKQPU�

(QTVWPCVGN[��PGY�YC[U�CTG�GOGTIKPI�VQ�URQV�KPETGCUKPIN[�UQRJKUVKECVGF�HTCWF�RCVVGTPU��6JGUG�KPENWFG�AI-powered behavioural biometrics�Ť�YJKEJ�RTQƒNG�JQY�KPFKXKFWCN�WUGTU�KPVGTCEV�YKVJ�OQDKNG�FGXKEGU��MG[DQCTFU��VQWEJUETGGPU�CPF�OKEG�Ť�CNQPI�YKVJ�FGXKEG�ƒPIGTRTKPVKPI��PGVYQTM�FCVC�CPF�\GTQ�FC[�OCNYCTG�CPCN[UKU�KP�QTFGT�VQ�CNGTV�YJGP�CEVKXKV[�FGXKCVGU�HTQO�VJG�PQTO��

6JGTGŨU�LWUV�QPG�RTQDNGO��YJKNG�VJGUG�VQQNU�CTG�ITGCV�CV�RTQXKFKPI�CUUWTCPEGU�VJCV�C�WUGT�KU�YJQ�VJG[�UC[�VJG[�CTG��CPF�HNCIIKPI�YJGP�UGUUKQPU�CTG�JKLCEMGF�D[�HTCWFUVGTU��that’s where they stop.

#P�CFFKVKQPCN�CRRTQCEJ�KU�PGGFGF�VQ�TGXGCN�VJG�DKIIGT�RKEVWTG�QH�OCNKEKQWU�CEVKXKV[��one that is capable of improving banks’ resilience going forward, and leads to the discovery of much larger and systematic fraud campaigns.6JKU�KU�YJGTG�DWIWTQQŨU�Fraudster Hunter�VQQN�EQOGU�KP�

01

INTRODUCTION

Page 3: Fraudster Hunter: Delivering a strategic advantage to

02

$WIWTQQ�WUGU�C�highly granular approach to fraud prevention��EQODKPKPI�DGJCXKQWTCN�DKQOGVTKEU�UWEJ�CU�ECFGPEG��V[RKPI�TJ[VJO��ƒPIGT�UK\G��RTGUUWTG��OQWUG�XGNQEKV[�CPF�ENKEMKPI�HTGSWGPE[�YKVJ�QVJGT�GNGOGPVU�KPENWFKPI�PGVYQTM�CPF�VJTGCV�KPVGNNKIGPEG��FGXKEG�RTQƒNKPI�FCVC��OCNYCTG�KPURGEVKQP��CPF�DGJCXKQWTCN�CPCN[VKEU��

This creates a unique BionicID for every banking user that can be used to generate a risk score in real-time for each interaction at all points during a transaction, from login to signoff.

9JKNG�VJKU�VGEJPQNQI[�YQTMU�GHHGEVKXGN[�VQ�RTQXKFG�XKUKDKNKV[�KPVQ�EWUVQOGT�DGJCXKQWT�CPF�DNQEM�HTCWF��VJGTGŨU�CPQVJGT�WUG�ECUG�YJKEJ�EQWNF�GORQYGT�DCPMU�VQ�IGV�GXGP�OQTG�RTQCEVKXG�CDQWV�UVQRRKPI�OCNKEKQWU�CEVKXKV[��

2QYGTGF�D[�VJG�TKIJV�CNIQTKVJOU��KV�EQWNF�JGNR�VQ identify and link potentially much wider fraudulent activity��YJKNUV�RTQXKFKPI�KPVGNNKIGPEG�VQ�JGNR�block future attacks at the source.

+VŨU�VJG�HTCWF�GSWKXCNGPV�QH�VTCEKPI�CP�KPFKXKFWCN�FTQRNGV�QH�YCVGT�HCNNKPI�QP�C�ICTFGP�back to the sprinkler it came from.

This is Fraudster Hunter

The bigger picture

Page 4: Fraudster Hunter: Delivering a strategic advantage to

03

Fraudster Hunter�KU�CP�KPPQXCVKXG�ECRCDKNKV[�QH�VJG�DWIWTQQ�RNCVHQTO�VJCV�CNGTVU�DCPMUŨ�KP�JQWUG�VGCOU�QH�CP[�UWURKEKQWU�DGJCXKQWT�CPF�GPCDNGU�VJGO�VQ�build unique BionicIDs for each criminal attempting to target their systems.

8KC�C�JKIJN[�KPVWKVKXG�WUGT�KPVGTHCEG��HTCWF�VGCOU�ECP�FQWDNG�ENKEM�QP�WUGTU��FGXKEGU��+2�CFFTGUUGU�QT�UGUUKQPU�VQ�FKUEQXGT�VJG�JKFFGP�TGNCVKQPUJKRU�DGVYGGP�VJGO�ť�CPF�KP�UQ�FQKPI�WPEQXGT�OCLQT�HTCWF�ECORCKIPU�KP�VJG�RNCPPKPI�QT�GZGEWVKQP�RJCUGU�

1PEG�HTCWFUVGTU�CTG�CEVKXGN[�KFGPVKƒGF�D[�VJGKT�$KQPKE+&��VJGKT�KFGPVKƒGTU�ECP�DG�WUGF�VQ�ETGCVG�TWNGU�CPF�CEVKQPU�VQ�TGEQIPKUG�CFFKVKQPCN�HTCWFWNGPV�CEVKXKV[��This flexible capability provides fraud prevention teams with the ability to create customisable fraud detection and prevention rules. 1PEG�KFGPVKƒGF��CNN�UWDUGSWGPV�UWURKEKQWU�CEVKXKV[�YKNN�IGPGTCVG�CNGTVU�VQ�VJG�ƒPCPEKCN�KPUVKVWVKQP�CNNQYKPI�KV�VQ�VCMG�CRRTQRTKCVG�CEVKQP�TCPIKPI�HTQO�UVGRRKPI�WR�CWVJGPVKECVKQP�VQ�VGTOKPCVKPI�VJG�VTCPUCEVKQP��

Fraudster Hunter�FGNKXGTU�C�ENQUGF�NQQR�FKUEQXGT[�CPF�RTQCEVKXG�OKVKICVKQP�ECRCDKNKV[�CNNQYKPI�ƒPCPEKCN�KPUVKVWVKQPU�VQ�FTCOCVKECNN[�KORTQXG�HTCWF�RTGXGPVKQP�VGCO�GHƒEKGPE[�and fraud detection rates.

+P�GUUGPEG��Fraudster Hunter�IKXGU�DCPMU�C�EQORGVKVKXG�CFXCPVCIG�D[�CNNQYKPI�VJGO�VQ�IGV�KP�HTQPV�QH�GOGTIKPI�HTCWF�VJTGCVU��(WTVJGTOQTG��KV�GPCDNGU�VJGO�VQ�quickly respond to the unique fraud threats that they are experiencing – CNNQYKPI�VJGO�VQ�UYKHVN[�UVQR�PGY�HTCWF�UEJGOGU�CPF�OCKPVCKP�EWUVQOGT�VTWUV�CPF�DTCPF�TGRWVCVKQP�

#FFKVKQPCNN[��Fraudster Hunter CNNQYU�DCPMU�VQ�ECVCNQIWG�CPF�ETQUU�TGHGTGPEG�WUGT�$KQPKE+&�KPHQTOCVKQP�YKVJ�EWUVQOGT�FCVC��UQ�HTCWF�VGCOU�ECP�trace malicious activity back to individual actors in a highly effective manner��+V�JGNRU�VJGUG�VGCOU�RKPRQKPV�CEEQWPVU�VJCV�JCXG�DGGP�UGV�WR�QT�EQORTQOKUGF�D[�VJG�HTCWFUVGT�Ť�KPENWFKPI�NKPMGF�OWNG�CEEQWPVU�Ť�allowing the bank to block any future fraud attempts — cutting fraud off at the root.

6JKU�ECRCDKNKV[�ECP�DG�WUGF�VQ�UVQR�New Account Fraud (NAF)��Account Takeover (ATO)��Card Not Present (CNP) fraud�CPF�uncover money mule activity�

Introducing Fraudster Hunter

Page 5: Fraudster Hunter: Delivering a strategic advantage to

Digging and linking

04

In the physical world, successful bank robbers would usually scope out a target bank for weeks or months before formulating their plan. 6JG[�OC[�RQUG�CU�EWUVQOGTU�QT�ENGCPGTU�VQ�DGVVGT�WPFGTUVCPF�JQY�UGEWTKV[�YQTMU�KPUKFG��YJGTG�VJG�%%68�ECOGTCU�CTG�CPF�YJGTG�VJG�ICRU�CTG�NQECVGF�VJCV�VJG[�ECP�GZRNQKV��+VŨU�PQV�UQ�FKHHGTGPV�KP�VJG�XKTVWCN�YQTNF�

1PNKPG�HTCWFUVGTU�YKNN�WUWCNN[�PGGF�VQ�RGTHQTO�FGVCKNGF�TGEQPPCKUUCPEG�QP�C�XKEVKO�QTICPKUCVKQP�RTKQT�VQ�UVTKMKPI��6JG[ŨNN�TGIKUVGT�CP�CEEQWPV�CPF�OC[DG�ECTT[�QWV�UQOG�UKORNG�VTCPUCEVKQPU�VQ�EJGEM�JQY�CWVJGPVKECVKQP�KU�RGTHQTOGF�CPF�YJCV�OGCUWTGU�VJG�DCPM�JCU�KP�RNCEG�VQ�OKVKICVG�OCNKEKQWU�CEVKXKV[�

9JCV�VJG[�FQPŨV�MPQY�KU�VJCV�HQT�DWIWTQQ�ENKGPVU��VJGKT�WUGTUŨ�GXGT[�OQXG�KU�DGKPI�TGEQTFGF�CPF�CPCN[UGF�Ť�CNN�YKVJQWV�WUKPI�RGTUQPCNN[�KFGPVKƒCDNG�KPHQTOCVKQP��7UKPI�VJG�UCOG�VGEJPKSWGU�FGUETKDGF�CDQXG��a “digital DNA” is compiled for every customer, including those hidden fraudsters.

This BionicID is impossible to mimic CPF�YKNN�KPFGNKDN[�VKG�C�OCNKEKQWU�DCPMKPI�WUGT�VQ�VJGKT�CEVKXKV[��Fraudster Hunter GHHGEVKXGN[�CNNQYU�DCPMKPI�VGCOU�VQ�KPVGNNKIGPVN[�OKPG�EQORKNGF�FCVC�KP�VJKU�YC[�VQ�GHƒEKGPVN[�FGVGTOKPG�VJG�UQWTEG�QH�HTCWF��1PEG�KFGPVKƒGF��HTCWFUVGT�BionicIDs can be utilised as actionable data to stop new and in-progress fraudulent activity.

How are hidden patterns discovered? 9KVJ�NKPM�CPCN[UKU��YJKEJ�JGNRU�HTCWF�VGCOU�XKUWCNKUG�DQVJ�NGIKVKOCVG�CPF�OCNKEKQWU�EQPPGEVKQPU�VQ�FKUEQXGT�CEEQWPVU�DGKPI�WUGF�VQ�EQOOKV�HTCWF�CPF�VJQUG�CV�JKIJ�TKUM�QH�DGKPI�WUGF�HQT�HWVWTG�ETKOGU�

Here’s an example:

A single device is found to be linked to multiple accounts and is being used by seemingly unrelated people, raising a red flag for a bank’s fraud teams.

They can use Fraudster Hunter to see what other connections that device has within the bank. It’s possible the same device is linked to other IP addresses, that are in turn linked to other devices and other accounts —so it goes on, like a family tree.

A single discovery could therefore uncover hundreds of potential dangers. Using this link analysis, a bank can pinpoint the “brain of brains” — the central controller of multiple fraudulent accounts, potentially bringing a whole crime ring down in one go.

Page 6: Fraudster Hunter: Delivering a strategic advantage to

05

Uncovering a network of 400+ mule accounts1PG�QH�'WTQRGŨU�VQR�VJTGG�DKIIGUV�FKIKVCN�DCPMU��YKVJ�QXGT�����OKNNKQP�ENKGPVU�CPF�����DKNNKQP�KPEWUVQOGT�CUUGVU��contacted buguroo to help detect what it suspected to be a large number of mule accounts.

#�E[DGTETKOG�ITQWR�JCF�VTKEMGF�EQPUWOGTU�KPVQ�DW[KPI�RTQFWEVU�VJCV�FKFPŨV�GZKUV��FKTGEVKPI�VJGO�VQ�RC[�KPVQ�OWNG�CEEQWPVU�YKVJ�VJG�DCPM��6JG�NGPFGT�YCU�CDNG�VQ�FGVGEV�UQOG�HTCWFWNGPV�CEVKXKV[�FWG�VQ�UWURKEKQWU�DGJCXKQWT�RCVVGTPU�DWV�HQWPF�KV�FKHƒEWNV�VQ�KFGPVKH[�CNN�VJG�HTCWFUVGTU���Fraudster Hunter�YCU�CDNG�VQ�RTQƒNG�VJG�OCNKEKQWU�CEVQTU�VJTQWIJ�VJGKT�DGJCXKQWTCN�DKQOGVTKEU��CUUQEKCVGF�$KQPKE+&U�CPF�IGQNQECVKQP�KPHQTOCVKQP��DGHQTG�NKPMKPI�VJKU�CEVKXKV[�VQ�KFGPVKH[�QVJGT�HTCWFWNGPVN[�ETGCVGF�CEEQWPVU��

+P�VQVCN��the bank uncovered a network of 425 mule accounts registered using stolen or synthetic identities.

6JG�DCPM�YCU�CDNG�VQ�HTGG\G�VJGUG�CEEQWPVU�CPF�JCNV�VJG�ECORCKIP�KP�TGCN�VKOG��PQVKH[�VJG�RQNKEG�VQ�JGNR�YKVJ�VJGKT�KPXGUVKICVKQP��CPF�PQY�JCU�KPHQTOCVKQP�VQ�FGVGEV�CP[�HWVWTG�CEVKXKV[�D[�VJGUG�UCOG�HTCWFUVGTU�

Page 7: Fraudster Hunter: Delivering a strategic advantage to

1

2

3

4

06

Early detection is keySuspicious activity�VJCV�Fraudster Hunter�JGNRU�KFGPVKH[�KPENWFGU�

#U�YGŨXG�UGGP��KPFKXKFWCN�ECUGU�OKIJV�PQV�CNYC[U�TGXGCN�HTCWF��DWV�VJG[�ECP�CV�NGCUV�generate a transaction risk score indicating a bank should take action.�6JKU�EQWNF�DG�KP�VJG�HQTO�QH�GZVTC�+&�EJGEMU��HWTVJGT�KPXGUVKICVKQPU�QT�GXGP�CEEQWPV�UWURGPUKQP��+VŨU�CNN�CDQWV�KORTQXKPI�VTCPURCTGPE[�CV�C�OQTG�UVTCVGIKE�NGXGN�VQ�DGVVGT�OKVKICVG�HTCWF�TKUM�

&Q\GPU�QH�KPFKXKFWCNU�WUKPI�VJG�UCOG�KPHTCUVTWEVWTG�QP�VJG�UCOG�FC[�CPF�KP�VJG�UCOG�VKOGHTCOG��6JKU�EQWNF�UWIIGUV�an attacker is stealing from several victims in a single working day.

1PG�FGXKEG��OWNVKRNG�WPTGNCVGF�CEEQWPVU�DGKPI�CEEGUUGF�CV�TCRKF�URGGFU��YJKEJ�EQWNF�KPFKECVG�a bot testing stolen credentials�QDVCKPGF�VJTQWIJ�C�RJKUJKPI�ECORCKIP�QT�RWTEJCUGF�QPNKPG�

One account, multiple BionicIDs: 'CEJ�CEEQWPV�JQNFGT�UJQWNF�JCXG�WPKSWG�DKQOGVTKE�KFGPVKƒGTU��DWV�YJCV�KH�[QW�UGG�OQTG�VJCP�QPG�DKQOGVTKE�DGJCXKQWT�RCVVGTP�KP�VJGO!�+V�EQWNF�DG�C�EQWRNG�UJCTKPI�VJG�CEEQWPV��QT�KV�EQWNF�DG�CP�CVVCEMGT�KORGTUQPCVKPI�VJG�CEEQWPV�JQNFGT�WUKPI�UVQNGP�ETGFGPVKCNU�

One BionicID, multiple accounts: *GTG�VJG�DCPM�YQWNF�UGG�VJG�UCOG�DKQPKE�RTQƒNG�CRRGCT�KP�UGXGTCN�CEEQWPVU��K�G��VJG�UCOG�KPFKXKFWCN�JCU�CEEGUUGF�CNN�QH�VJGO��6JKU�OC[�DG�NGIKVKOCVG�KH�VJG[�CTG�EQTRQTCVG�CEEQWPVU�OCPCIGF�D[�CP�GZVGTPCN�CIGPE[��$WV�KV�EQWNF�CNUQ�DG�C�ENWG�VJCV�VJG�UCOG�CVVCEMGT�KU�CEEGUUKPI�OWNVKRNG�XKEVKO�CEEQWPVU��5QOG�QH�VJGUG�CEEQWPVU�OC[�GXGP�DG�VJG�CVVCEMGTU�QYP�ť�TGIKUVGTGF�VQ�JGNR�VJGO�YKVJ�TGEQPPCKUUCPEG��$[�NQECVKPI�VJKU�CEEQWPV��VJG�DCPM�EQWNF�WPOCUM�VJG�CVVCEMGT�

Page 8: Fraudster Hunter: Delivering a strategic advantage to

123

4

5

6

07

The network effect6JG�XCNWG�QH�Fraudster Hunter and BionicIDs IQ�YC[�DG[QPF�JGNRKPI�KPFKXKFWCN�ƒPCPEKCN�KPUVKVWVKQPU�GNKOKPCVG�RTQHGUUKQPCN�HTCWFUVGTU��6JG�EJCNNGPIG�HQT�VJG�KPFWUVT[�CU�C�YJQNG�KU�VJCV�HTCWF�ICPIU�YKNN�HQEWU�QP�C�UKPING�KPUVKVWVKQP��FTCKP�KV�QH�CU�OWEJ�ECUJ�CU�RQUUKDNG�DGHQTG�VJG[�CTG�FKUEQXGTGF��CPF�VJGP�UKORN[�OQXG�QP�VQ�VJG�PGZV�QPG��

6Q�DTGCM�VJKU�XKEKQWU�E[ENG��VJG�ƒPCPEKCN�UGTXKEGU�KPFWUVT[�OWUV�GPJCPEG�INQDCN�EQNNCDQTCVKXG�GHHQTVU�YKVJ�KORTQXGF�KPHQTOCVKQP�UJCTKPI��

6JKU�JCU�JKUVQTKECNN[�DGGP�C�EJCNNGPIG��EQOOGTEKCN�GPVKVKGU�NQCVJ�VQ�IKXG�VJGKT�TKXCNU�C�RQVGPVKCN�EQORGVKVKXG�CFXCPVCIG�D[�CFOKVVKPI�HTCWF�NQUUGU�CPF�UJCTKPI�RQVGPVKCNN[�UGPUKVKXG�RTQRTKGVCT[�KPHQTOCVKQP��

*QYGXGT��$KQPKE+&�FCVC�YKVJQWV�CP[�CUUQEKCVGF�CPF�RTQDNGOCVKE�RGTUQPCNN[�KFGPVKƒCDNG�KPHQTOCVKQP�QHHGTU�C�TGCN�QRRQTVWPKV[�HQT�DCPMU�VQ�DGPGƒV�HTQO�C�OQTG�QRGP�CRRTQCEJ��

$[�UJCTKPI�CPF�WVKNKUKPI�VJKU�FCVC�KV�VJGP�ECP�DG�WUGF�VQ�RTQCEVKXGN[�UVQR�HTCWFUVGTU�HTQO�OQXKPI�WPKORGFGF�HTQO�QPG�KPUVKVWVKQP�VQ�CPQVJGT��

7UKPI�Fraudster HunterŨU�CEVKXG�HTCWF�CNGTVKPI�ECRCDKNKV[�NQCFGF�YKVJ�UJCTGF�HTCWFUVGT�$KQPKE+&�FCVC�VJGTGŨU�PQ�YC[�C�HTCWF�QRGTCVQT�ECP�UJCMG�VJGKT�RGTOCPGPV�FKIKVCN�&0#�KORTKPV��UQ�HQTGYCTPGF�CPF�HQTGCTOGF�YKVJ�VJKU�KPHQTOCVKQP��DCPMU�EQWNF�

6JKU�KU�LWUV�VJG�DGIKPPKPI��$KQPKE+&U�CPF�Fraudster Hunter�EQWNF�DG�CRRNKGF�KP�C�TCPIG�QH�UEGPCTKQU�QWVUKFG�QH�VJG�DCPMKPI�HTCWF�URCEG��HTQO�G�EQOOGTEG�%02�VTCPUCEVKQPU�VQ�RQNKEKPI�CEEQWPV�CEEGUU�CETQUU�C�TCPIG�QH�QPNKPG�UGTXKEGU��+VŨU�VKOG�VQ�ICKP�C�UVTCVGIKE�CFXCPVCIG�QXGT�HTCWFUVGTU�CPF�UVQR�RNC[KPI�KP�FGHGPEG��

6Q�ƒPF�QWV�OQTG�CDQWV�Fraudster Hunter�CPF�DWIWTQQŨU�EQORTGJGPUKXG�TCPIG�QH�DCPMKPI�HTCWF�FGVGEVKQP�UQNWVKQPU��RNGCUG�XKUKV�our website.

/KPKOKUG�VJG�KORCEV�QH�HTCWF�QP�NGIKVKOCVG�EWUVQOGTU�

4GFWEG�VJGKT�QYP�FKIKVCN�CVVCEM�UWTHCEG�

#EV�RTG�GORVKXGN[�VQ�DNQEM�HTCWF�HTQO�FC[�\GTQ�

5GV�JQPG[VTCRU�VJCV�ECP�DG�WUGF�VQ�FGVGEV�CPF�EQWPVGTCEV�HTCWFUVGTUŨ�TGEQPPCKUUCPEG�GHHQTVU�CPF�CVVCEMU�CICKPUV�QVJGT�DCPMKPI�EWUVQOGTU�

5JCTG�CEEQWPV�TGIKUVTCVKQP�FGVCKNU��KFGPVKVKGU�CPF�NQECVKQPU�YKVJ�KPVGTPCVKQPCN�RQNKEG�VQ�UJQY�VJGTG�CTG�TGCN�YQTNF�EQPUGSWGPEGU�VQ�QPNKPG�HTCWF�

/CMG�HTCWF�NGUU�RTQƒVCDNG�CPF�TKUMKGT�HQT�VJG�RGTRGVTCVQTU��RQVGPVKCNN[�FGVGTTKPI�UQOG�QH�VJGO�

Page 9: Fraudster Hunter: Delivering a strategic advantage to

YYY�DWIWTQQ�EQO

© 2020 buguroo. All product names, brand names and registered trademarks are the property of their respective owners.

Europe Offices

MADRID%#..'�#0#$'.�5')74#�����

'&+(+%+1���2.#06#��j#.%1$'0&#5�������� ����������������

52#+0

LONDON��*#;5�.#0'�

.10&10�v�)4'#6'4�.10&10.10&10�$4+&)'�v�5'���*$

����������������70+6'&�-+0)&1/

KATOWICE7.��70+9'45;6'%-#����6*�(.114�v�������

21.#0&

LatAm Offices

MEXICO CITY#8��4ǵ1�/+5+5+2+����������

������������/':+%1

BOGOTA DC%#44'4#���#�������������

%1.1/$+#

SAO PAULO#8��2#7.+56#��������y�#0&#4���������

$4#<+.

North America Offices

MIAMI�����09���4&�564''6�

(.14+&#�������75