乐鱼(Leyu)体育官网

Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That鈥檚 why 乐鱼(Leyu)体育官网 LLP established its industry-driven structure. In fact, 乐鱼(Leyu)体育官网 LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

From cyber to fraud

The evolving landscape of digital crime

Is it a cyber incident or a fraud investigation? The lines between cybercrime and fraud are increasingly blurring. For example, imagine this: Someone might break into your house (cybercrime) by pretending to be the delivery person (fraud). Bad actors are commonly leveraging digital identity-based attacks such as account takeovers, application programming interface (API) abuse, and social engineering as an entry point into a company鈥檚 system. These types of incidents are generally not sophisticated, the risk likely won鈥檛 ever fully be mitigated, and they simply act as the gateway for other malicious activities. It鈥檚 what happens next, what a bad actor may use that pretense for, that defines what type of incident you鈥檙e dealing with, the severity, and what your company鈥檚 response should look like.

In traditional cyber events, persistence is often a key factor, as attackers may attempt to maintain access to compromised systems for extended periods to maximize their gains. Attackers may then aim for extortion, demanding a ransom in exchange for returning stolen data or preventing further damage. Destruction can also be a goal, as attackers might seek to disrupt operations or damage a company鈥檚 reputation.

The reality is, from an attacker鈥檚 point of view, these types of traditional attacks are starting to be more risky and less fruitful. Why? To start, there have been many recent global law enforcement actions disrupting and deterring bad actors in engaging in these kinds of malicious activity. Secondly, companies鈥� investments in cybersecurity technology and talent are starting to pay off, raising the bar of difficulty for success. And lastly, when attacks are successful, the impact is less impactful as often companies have backups or are not interested in engaging with a bad actors.

In contrast, there has been a shift towards more sophisticated and hand-crafted schemes, moving away from commodity playbooks such as ransomware-as-a-service

Let鈥檚 examine a few examples of these modern fraud-first types of incidents:

1

Click fraud

Beyond automating fake clicks on online advertisements, hackers have refined their techniques to target specific industries and campaigns. For instance, they might focus on political advertisements during election cycles to manipulate public opinion or on e-platforms to inflate product prices or create inflated royalty payments.

2

Process fraud

Organized crime groups have become increasingly adept at exploiting controls in complex business ecosystems. They might, for example, create fake invoices and divert funds to fraudulent accounts or manipulate supply chain or account payables processes. This may also involve sophisticated social engineering such as the use of deep fake video and/or audio.

3

Market manipulation

Hackers have not only manipulated cryptocurrency markets but also targeted confidential insider information, specifically around merger and acquisition activity, for financial gain.

4

API abuse

Attackers have become more sophisticated in their use of API vulnerabilities. They might exploit APIs to gain unauthorized access to sensitive data, such as customer information or financial records, which can be used for identity theft, fraud, or other malicious purposes.

What does this mean for you?

While cybersecurity expertise remains essential, it鈥檚 no longer sufficient to address the multifaceted nature of modern digital fraud alone. This landscape demands a more comprehensive and integrated approach to risk management and is one reason we have started to see instances of the CISO reporting structure flow into the general counsel鈥檚 office.

Organizations must foster strong collaboration between cybersecurity, legal, compliance, and business functions regardless of the incident type categorization. This interdisciplinary approach ensures a cohesive response to incidents, leverages regulatory frameworks, and addresses the broader business implications of fraud.

Dive into our thinking:

From cyber to fraud

Download PDF

Meet our team

Image of David Nides
David Nides
Principal, Advisory, 乐鱼(Leyu)体育官网 US

Thank you!

Thank you for contacting 乐鱼(Leyu)体育官网.聽We will respond to you as soon as possible.

Contact 乐鱼(Leyu)体育官网

Use this form to submit general inquiries to 乐鱼(Leyu)体育官网. We will respond to you as soon as possible.

By submitting, you agree that 乐鱼(Leyu)体育官网 LLP may process any personal information you provide pursuant to 乐鱼(Leyu)体育官网 LLP\'s .聽

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services 乐鱼(Leyu)体育官网 can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the 乐鱼(Leyu)体育官网 International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline