0
(0)

Understanding and Protecting Yourself Against Money Mule Schemes

A SCARS Money Mule Series Guide

A Guide To Help You Avoid Becoming A Mule

Becoming A Money Mule Can Come With Consequences Far Beyond Money Loss!

Money Mules Are Used to Commit Fraud

Money mules” are people who are used to transport and launder stolen money or some kind of merchandise.

Criminals may even recruit money mules to use stolen credit card information. Individuals being used as money mules may be willing participants; however, many money mules are not aware that they are being used to commit fraud. The individuals being used as money mules are not the only victims; the larger scheme is designed to extract money from an organization or from countless other people.

Schemes May Seem Like Legitimate Opportunities

The most common money mule solicitations are disguised as “work from home” opportunities. These advertisements often target unsuspecting people who are interested in the convenience and flexibility of these types of jobs. Because there are companies that legitimately offer opportunities to work from home, users may not recognize malicious offers. Criminals often try to make the offer seem as legitimate as possible and may use the following approaches:

  • Carefully crafting the wording so that an email does not appear to be spam and is not caught by spam filters
  • Linking to fake but professionally designed websites that appear to belong to recognized companies or that promote a company that does not even exist
  • Posting some of these jobs on legitimate websites, including websites specifically for job seekers

Typical Money Mule Process

After an individual agrees to be a money mule, the schemes tend to follow a similar process:

  1. The “company” collects information from the “employee.” The information may include personal data such as the individual‟s Social Security number and bank account information. The company may also ask the employee to sign a seemingly official contract.
  2. The company (or the employee, under the direction of the company) creates a financial account 2 that the employee can use to collect and transfer funds.
  3. The employee receives funds or some type of merchandise.
  4. The employee is instructed to transfer the funds (usually keeping some percentage) to some other financial account or to deliver the merchandise to some third party.

This financial account or third party is associated with the criminal. Often, the company will instruct the employee to use wire transfers for the funds, and there may be another money mule on the other end of the transfer with instructions to cash those funds.

Through this process, the criminal receives the stolen money or merchandise while hiding his or her involvement.

Typically, a criminal will only use a money mule once. After the money mule performs his or her role in the transaction, the criminal usually dissolves the relationship completely and recruits someone else for the next scheme.

Consequences Can Be Severe

If caught and prosecuted, the criminal faces the most severe consequences. However, the other parties involved in the scheme may also face serious consequences.

Money Mule

The following are potential consequences for money mules: Inaccessible bank accounts – During an investigation, law enforcement officials may freeze a money mule‟s bank accounts. Being unable to access funds may create a significant financial burden. These activities may also have a long-term impact on credit scores.

  • Prosecution – Money mules may be prosecuted for their participation in these schemes.
  • Accountability for charges – In some cases, money mules are found personally responsible for repaying the losses suffered by the other victims.
  • Vulnerability of personal information – As described in the typical process, criminals often collect personal information from the money mules. It is possible that the criminals may use this information for other malicious purposes.

Targeted Individuals

If the fraud is designed to extract money from individuals, those individuals could experience the following consequences: Financial loss – An individual may pay for undelivered goods or have money deducted directly from one of his or her financial or credit card accounts. Depending on the forum used for the transaction and whether the scheme is identified, the individual may be able to recover at least a portion of these losses. Significant hassle to resolve issues – Identifying and reporting the fraud may require numerous steps, and the process could take a long time.

Targeted Organizations

If the fraud is designed to extract money from an organization, it may affect both the organization and its customers or constituents.

  • Financial loss – A criminal may be able to siphon significant amounts of money from an organization‟s financial accounts before the activity raises suspicions.
  • Compromise of sensitive data – If a criminal can access customer data, such as credit card information, he or she may be able to steal that information and use money mules to abuse the customers‟ financial or credit card accounts.
  • Damage to reputation – If an organization experiences fraud, they may lose the trust and loyalty of their customers or partners.
  • Significant hassle to resolve issues – Identifying and reporting the fraud may require numerous steps, and the process could take a long time.
  • Potential for future compromises – If a criminal uses malicious code to access information on an organization‟s computer, he or she may hide additional malicious code that would allow the criminal to regain access in the future. If an organization does not locate and remove this code, it may be susceptible to another compromise.

Take Steps to Protect Yourself

Be sure you read our 5 Steps Guide for Money Mules click here

Avoid Becoming a Money Mule

If an opportunity sounds too good to be true, it probably is. Look for common warning signs, and do some research before agreeing to participate. If you believe that you are participating in a money mule scheme, stop transferring money and merchandise immediately and notify the appropriate authorities. These authorities may include your bank, the service you used to conduct the transaction, and law enforcement.

Warning Signs

The following characteristics do not necessarily indicate a money mule solicitation, but they are commonly used in those solicitations. The position involves transferring money or goods.

  • The specific job duties are not described.
  • The company is located in another country.
  • The position does not list education or experience requirements.
  • All interactions and transactions will be done online.
  • The offer promises significant earning potential for little effort.
  • The writing is awkward and includes poor sentence structure.
  • The email address associated with the offer uses a web-based service (Gmail, Yahoo!,
    Windows Live Hotmail, etc.) instead of an organization-based domain.

Research Strategies Perform online searches using information from the offer:

  • The subject line of the email
  • The company supposedly offering the position
  • The person who signed the message or the name of the contact person mentioned in the offer

Look for indications that the offer might be a scam.

  1. If an online search does not produce any results, that may also be suspicious.
  2. Check the Better Business Bureau website.

Avoid Becoming a Victim

Individuals and organizations can both take precautions that minimize their risks.

Individuals

  • Try to investigate the person or company before doing business with them.
  • When transferring money, use a method that protects the transaction. For example, many banks, credit cards, and services such as PayPal may offer fraud protection.
  • Monitor the transactions, including checking for withdrawals from your bank account and tracking an order.
  • If you notice any problems, immediately contact the appropriate authorities. Depending on the circumstances, these authorities may include your bank, the service you used to conduct the transaction, and law enforcement.

Organizations

Criminals typically use stealthy methods to access an organization‟s data or finances. These methods may include using malicious code, such as a virus, to gain administrative access to a computer within an organization or relying upon a malicious insider to transmit data or create fake customer accounts.

By implementing the following precautions and practices, organizations may reduce their risk:

  • Use anti-virus and anti-spyware software, and keep the definitions up to date.
  • Limit access to sensitive data to authorized personnel.
  • Regularly check records, including employee lists and recent financial transactions.
  • Look for new employees that Human Resources staff does not recognize, or for unauthorized transactions.
  • Consider isolating the computers that perform banking and accounting functions. In small organizations, it may be feasible to use a separate laptop for these tasks. Larger organizations may be able to designate computers used to perform these tasks and apply stricter policies and access controls on those computers.
  • Watch for suspicious behavior or activities from employees.

If you notice any problems, immediately contact the appropriate authorities. Depending on the circumstances, these authorities may include your IT department, your accounting department, and law enforcement.

The Problem with Money Mules - a SCARS Infographic
The Basic Money Mules Model - a SCARS Infographic
MONEY-MULE-flow
MONEY-MULE-SPECTRUM
What Is A Money Mule
Understanding and Protecting Yourself Against Money Mule Schemes 1
Understanding and Protecting Yourself Against Money Mule Schemes 2
Understanding and Protecting Yourself Against Money Mule Schemes 3
Understanding and Protecting Yourself Against Money Mule Schemes 4
Understanding and Protecting Yourself Against Money Mule Schemes 5

Did You Receive Money From A Scammer, Or Give A Scammer Access To Your Accounts?

You may have become a Money Mule. This is a crime!

You may have been involved in money laundering or aiding and abetting transnational criminals. Do not try to hide from this – this is serious, and if you are discovered (and you will be) then you might be prosecuted.

You should report these crimes to your local police – however, we strongly recommend that you speak with a Criminal Defense Attorney immediately. You have no time to waste. You cannot avoid this, do it today!

SCARS is not a law firm and we are not attorneys. The information we provide is for educational purposes only. See additional disclaimer below.

To find a criminal defense attorney in the United States visit FindLaw here: Criminal Law – FindLaw  For other countries look for your local directory of criminal defense attorneys or solicitors.

Always Report All Scams – Anywhere In The World To:

Go to reporting.AgainstScams.org to learn how

U.S. FTC at https://reportfraud.ftc.gov/#/?orgcode=SCARS and SCARS at www.Anyscams.com
Visit reporting.AgainstScams.org to learn more!

PLEASE SHARE OUR ARTICLES WITH YOUR FRIENDS & FAMILY

HELP OTHERS STAY SAFE ONLINE – YOUR KNOWLEDGE CAN MAKE THE DIFFERENCE!
THE NEXT VICTIM MIGHT BE YOUR OWN FAMILY MEMBER OR BEST FRIEND!

SCARS the Society of Citizens Against Relationship Scams Incorporated

By the SCARS™ Editorial Team
Society of Citizens Against Relationship Scams Inc.

A Worldwide Crime Victims Assistance & Crime Prevention Nonprofit Organization Headquartered In Miami Florida USA & Monterrey NL Mexico, with Partners In More Than 60 Countries
To Learn More, Volunteer, or Donate Visit: www.AgainstScams.org
Contact Us: Contact@AgainstScams.org

The Issue Of Race In Scam Reporting
Click Here To Learn More!