Nigerian cyber criminals target Texas unemployment system

Cyber criminals use Gmail feature to register the same email address multiple times

Hacker in a hood on a computer

A Nigerian cyber crime gang has attacked the Texas unemployment system, according to reports.

Evidence shared with reporters at the CBS 11 I-Team based in Dallas/Fort Worth, Texas showed the criminals detailed how to commit unemployment identity fraud through the Texas Workforce Commission website in a 13-page step-by-step tutorial.

Related Resource

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats

Security awareness training strategies for account takeover protection - whitepaper from MimecastDownload now

The tutorial, created by the Nigerian cyber crime gang known as Scattered Canary, was discovered in a closed online group chat between members.

An insider helped cyber security company Agari to acquire a copy of the document from a WhatsApp group chat. Former FBI agent Crane Hassold, now director of threat research for Agari, said information flow is important to this type of cyber crime.

"The tutorial shows how to apply for unemployment benefits and even introduces some of the red flags if you enter things a certain way," he said.

Fraud has cost Texas over $893 million in unemployment benefits since the beginning of the COVID-19 pandemic. The Texas Workforce Commission said that it has been the target of cyber scammers worldwide, but IP masking has made it difficult to find the perpetrators' exact location.

Hassold said the Scattered Canary cyber crime gang is abusing a feature in the Gmail system to help them work quicker. Gmail ignores periods in its email addresses, so john.doe@gmail.com, j.ohndoe@gmail.com," and "j.o.h.n.d.o.e@gmail.com" are all, in fact, the same email account. But the state unemployment systems see them as unique emails, allowing fraudsters to make a claim with each variation without suspicion.

"Essentially it allows their communication flow to be much more efficient," said Hassold.

"Instead of having to go to dozens of different email accounts to look at what's going on, it's all coming to one centralized location."

The gang then funnels any money defrauded from Texas into offshore accounts before any claims are flagged. The gang has used Green Dot prepaid cards to receive the payments from their fraudulent claims. These cards will have been registered with the same stolen identity as the unemployment claims to avoid red flags. Before cards can be delivered via mail, the gang goes online to withdraw money from the account.

The Texas Workforce Commission said it has deployed several fraud protections on its systems and prevented over $9 billion in fraudulent identity theft claims.

Featured Resources

Consumer choice and the payment experience

A software provider's guide to getting, growing, and keeping customers

Download now

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Download now

Business in the new economy landscape

How we coped with 2020 and looking ahead to a brighter 2021

Download now

How to increase cyber resilience within your organisation

Cyber resilience for dummies

Download now

Recommended

ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021
CISOs aren’t leading by example when it comes to cyber security
cyber security

CISOs aren’t leading by example when it comes to cyber security

24 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
Cyber attacks on manufacturing up 300% in a year
Security

Cyber attacks on manufacturing up 300% in a year

11 May 2021

Most Popular

Best paying tech jobs of 2021
Careers & training

Best paying tech jobs of 2021

7 Jun 2021
Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
Mythic launches power-sipping AI chip
Hardware

Mythic launches power-sipping AI chip

8 Jun 2021