Fraud Pattern Recognition Sample (Fictional)
This sample identifies common fraud indicators, including Business Email Compromise (BEC), and demonstrates how to escalate effectively.
How the Activity Was Identified
The activity was identified during routine transaction and account review prior to transaction processing.
Fraud Scenario
Potential business email compromise (BEC)
What Was Observed
- A request was received to initiate an outgoing wire transfer to a new beneficiary.
- The request emphasized urgency and the need for immediate action.
- Instructions relied on email communication rather than established contact methods.
- The beneficiary information had not been previously used on the account.
Why This Pattern Was Notable
- The combination of urgency, a new beneficiary, and email-based instructions aligns with known BEC patterns involving payment redirection.
- The indicators occurred together and increased the risk of payment redirection or unauthorized funds movement.
Action Taken
- The activity was escalated to Compliance prior to any funds movement due to multiple indicators occurring together.
- The escalation supported preventative review and additional assessment.
What Was Not Done
- No conclusions were made regarding fraud or intent.
- The customer was not contacted directly.
No transactions were processed before review.
Documentation
The observed indicators and escalation decision were documented to support escalation and preventative review in accordance with recordkeeping expectations.