F-Secure Scam Kill Chain

A definitive framework for scam tactics and techniques

Over $1 trillion was lost globally to scams in 2023. The internet, with no clear borders, is a hotbed for cyber crime, targeting consumers daily. The cyber threat landscape is overwhelmed with scam tactics, and until now, no framework has comprehensively described how scammers operate. That’s why we created the F-Secure Scam Kill Chain – a detailed breakdown of how modern online scammers operate.¹

A systematic analysis of the scam landscape

At F-Secure, we believe in the power of sharing knowledge. Our goal is to provide a comprehensive understanding of different types of scams. By doing so, we aim to build a rich and detailed knowledge base, breaking down both high-level tactics and more specific techniques. This framework serves as a formal foundation for researching and developing effective defenses against scams. ²

F-Secure Scam Kill Chain

A definitive framework for scam tactics and techniques

  • Personal interests

  • Online accounts

  • Email servers

    • Bulk email service

  • Domains/website

  • Cloud resources

    • Content delivery networks (CDNs)

    • Tunneling

  • C2 server

  • Phone numbers

    • VoIP

    • SIM/eSIM cards

  • Infrastructure for malware

  • Over the phone

  • Email

  • Messaging platforms

  • Phishing pages

  • Web server

  • Cloud-based

  • Messengers

  • SMS

  • Social media

    • Posts

    • Comments

    • Direct messages

  • Email

  • Bank transfers

  • Cryptocurrency

  • P2P payment

  • Web scraping

  • Social media

  • Custom malware

  • Website development

  • Bots

  • Automated scripts

    • Victim-side scripts

    • Adversary-side scripts

  • Genuine small payments

  • Psychological manipulation

  • Mobile malware

  • Computer malware

  • Screen sharing software

  • Email forwarders

  • Password reset

  • Linked accounts

  • Single Sign-On (SSO)

  • Rug pull

  • Ponzi scheme

  • Phone calls/vishing

  • Emails

  • Smishing

  • Social media and instant messaging

  • Websites

  • Human personnel

  • ‘XYZ’-as-a-Service

    • Phishing-as-a-Service

    • Malware-as-a-Service

  • Sim-swapping

  • Enterprise-level data breach

  • Admin access on social media

  • Financial information

  • General sale

  • Specific sale

  • Illegal marketplaces

  • People search databases

  • Insider help

  • Social media

  • Email accounts

  • Cryptocurrency wallets

  • Messengers

  • Fake legitimacy

  • Adversary-driven communication

  • Victim-driven discovery

  • Taking a loan in victim’s name

  • Purchase of non-liquid assets

  • SMS

  • Email

  • Content for websites

  • Human-language script

    • Direct messaging

    • Commenting

    • Phone call

  • Advertisements

  • Mobile apps

  • SEO poisoning

  • URL manipulation

    • QR codes

    • URL shortener

  • Advertisements

  • SEO poisoning

  • Misleading content

  • Legitimate online service or a game

  • Online gift cards

  • Websites

  • Mobile apps

  • Fake online accounts

Copyright F-Secure Corporation 2024. All rights reserved.

Effortlessly protect consumers from scams

The online scam landscape is extensive, making it challenging to anticipate and protect your customers from every potential threat. Partnering with F-Secure means you don’t have to face these challenges alone – our advanced scam protection technology works behind the scenes to mitigate the most prevalent online threats facing your consumers today.

Flexible integration options

Sources

¹ GASA The Global State of Scams 2023

² Inspired by the MITRE ATT&CK® framework, developed by the MITRE Corporation