From Bazooka to Fake Nikes
ATT&CK techniques detected
T1657Financial Theft
71%
“from bazooka to fake nikes business impersonation is the hidden thread connecting old and new fraud. discover how the same core tactic is fueling both a surge in commercial check fraud and an explosion of ai - powered online shopping scams targeting younger consumers. tools like …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1657Financial Theft
54%
“catching example, fraudsters intercepted a commercial check destined for bubble - gum giant bazooka in 2022. a $ 1. 24 million check. over the next two weeks, they transferred and withdrew over half a million dollars. how ’ d they do it? you can ’ t just wash out the payee name o…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1684.001Impersonation
37%
“from bazooka to fake nikes business impersonation is the hidden thread connecting old and new fraud. discover how the same core tactic is fueling both a surge in commercial check fraud and an explosion of ai - powered online shopping scams targeting younger consumers. tools like …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
A deep dive into business impersonation fraud — from fake companies cashing stolen checks to AI-powered shopping scams — and why the same vulnerability enables both.