April Fullz - A Look Into the Latest Carding Methodologies in Dark Chatrooms

April Fullz - A Look Into the Latest Carding Methodologies in Dark Chatrooms

In the recent weeks, Cyberint has detected a rise in the dark web trade of ‘fullz’, for use in the fraudulent application of disaster loans. This report will focus on a case example affecting the US Small Business Administration (SBA), which is operating a Targeted Economic Injury Disaster Loan (EIDL) Advance program designed to assist small business owners with up to $10,000 in grants.

background

April Fullz Blog_1

Figure 1 Cyberint's detection of fullz posted on a deep web fraud forum

‘Fullz’ is Internet slang for “full information”, a term used in the carding and financial fraud dark web markets to pertain to a comprehensive data set of personally identifiable information usually retrieved from phishing operations, web skimming activities on eCommerce platforms, infected endpoint devices with malware, and botnets.

Typically, fullz are most valuable on dark web markets, and useful to threat actors, when they include payment information and logs (See Figure 1). They are commonly utilized to cash out money from the victims’ accounts, as the complete PII in possession of the threat actor can be exploited to bypass online banking verification processes.

For this reason, fullz are typically sold by vendors along with ‘logs’, a term for login information and/or web activities history (See Figure 2), and card cloning services (See Figure 3).

April Fullz Blog_2

Figure 2 A screenshot depicting how fullz are sold on dark web chatrooms

April Fullz Blog_3

Figure 3 Card cloning services as advertised on dark web chatrooms

In the recent weeks, however, Cyberint has detected threat actors using fullz to apply for fraudulent grants. No payment information needed.

SBA LOAN FRAUD USING FULLZ

 April Fullz Blog_4

Figure 4 An excerpt of the SBA loan fraud tutorial detected by Cyberint

Various threat actors online are providing complete tutorials on how to exploit the SBA program using fullz:

  • They collect PII of victims that include their social security number (SSN).
  • They apply as a sole proprietor or independent contractor (See Figure 5)
  • They provide a drop account for electronic disbursement of the grant.

This is possible because the SBA program is currently doing direct deposit on prepaid cards, online wallets, and cash apps.

 April Fullz Blog_5 png

Figure 5 Threat actors advise to apply as sole proprietor for higher chances of success

April Fullz Blog_6 png

Figure 6 The SBA account appears to allow threat actors to enter drop accounts for the electronic disbursement of the grant

RECOMMENDATIONS

  • Harden verification mechanisms in the registration of online banking accounts to government loan programs.
  • Enable two-factor authentication when integrating cash apps and online banking with online economic injury loan platforms.
  • Disallow the electronic disbursement to prepaid debit accounts and other unverified wallets.

    Chat with an analyst about threat intelligence