Reconnaissance & Planning

Systematically gathering intelligence about targets, processes, and vulnerabilities, then refining strategies for the upcoming fraud operation. Fraudsters are looking for weak links, data, or organizational blind spots to exploit.

Examples:

  • Scanning financial institution websites to find disclosure of security measures.

  • Researching publicly available victim data on social media for phishing.

  • Mapping payment authorization thresholds or fraud detection measures.

[
Matrix
Fraud
]
[
Name
Reconnaissance & Planning
]
[
Version
1.0
]
[
Created
2025-04-07
]
[
Modified
2025-04-08
]