Security & Infrastructure Tools
They don’t hack, they borrow: How fraudsters target credit unions
Flare researchers reveal a structured loan-fraud technique that targets small to mid-sized credit unions by borrowing identities rather than hacking systems. Attackers assemble stolen personal data, KBA answers, and credit histories to pass identity verification and loan checks, then move funds out quickly through intermediaries. The fraud workflow unfolds in eight steps—from identity acquisition to cash-out—designed to exploit weaknesses in onboarding and lending processes rather than software vulnerabilities. The report highlights higher risk for smaller lenders and urges proactive monitoring of exposed data sources to thwart such schemes.

THEY DON’T HACK, THEY BORROW: HOW FRAUDSTERS TARGET CREDIT UNIONS
IntroductionAcross underground forums and real‑time chat groups, threat actors are moving away from flashy heists and toward methodical, process‑driven fraud. Their aim is not to break software but to walk through legitimate onboarding and lending workflows as if they were real borrowers. In particular, smaller and mid‑sized credit unions have become attractive targets because they often rely on traditional identity checks and may lack the mature fraud prevention tools found at larger institutions. The result is a coordinated approach that combines stolen identity data, social engineering, and a deep understanding of how lending processes work.
A PROCESS BUILT ON IDENTITY, NOT INTRUSIONAt the core of this fraud strategy lies the ability to convincingly impersonate an actual borrower. Rather than exploiting a software vulnerability, attackers rely on a carefully assembled digital identity—names, addresses, dates of birth, and, in some cases, credit histories or related data. The key insight is that verification checks can be anticipated and navigated rather than treated as hard barriers.
- Identity as the currency: Access to sufficient personal data enables attackers to pose as legitimate applicants.
- Knowledge-based authentication (KBA) as a controllable gate: KBA questions typically revolve around past residences, credit or loan histories, and employment or family connections.
- Reconstructing the puzzle: Much of the information needed to answer verification questions can be inferred from publicly available records, social media footprints, leaked datasets, and compiled identity files.
What makes this approach dangerous is its predictability. By studying how identity checks are designed, attackers tailor their preparations to match expected questions and data patterns. This turns verification from a robust gate into a calibrated pathway that can be manipulated with stolen or assembled details.
FRAUD STARTS BEFORE THE FIRST FORM IS FILLED OUTThe real work happens long before an application ever lands in a queue. Attackers source:
- Stolen identities and background data from dark web markets and forums.
- Answer sets for identity verification questions (KBA) that increase the odds of passing checks.
- Credit histories and financial footprints that support loan eligibility claims.
Defensive teams should look not only at live transactions but at the sources of data used to construct believable applicant profiles. Continuous monitoring across widely used data streams helps identify when exposed or compromised information appears in the wild, allowing institutions to tighten scrutiny before a fraudulent application is submitted.
THE FRAUD WORKFLOW – STEP BY STEPA structured, repeatable sequence underpins this form of loan fraud. Understanding the workflow helps institutions design controls that disrupt the chain at any point.
1) Identity Acquisition
- The attacker collects full personal details and supporting background information sufficient to convincingly impersonate a real borrower.
2) Credit Profile Assessment
- The attacker reviews the victim’s financial profile to gauge loan eligibility and the likelihood of approval.
3) Verification Preparation (KBA Readiness)
- Additional personal details are gathered to anticipate and correctly answer identity verification questions.
4) Target Selection
- Small to mid‑sized credit unions are chosen based on perceived weaknesses in verification processes and fraud detection maturity.
5) Loan Application Submission
- A loan application is filed using the stolen identity, ensuring internal consistency across all provided data.
6) Identity Verification Passed
- KBA and standard checks are satisfied, creating an appearance of legitimacy.
7) Loan Approval and Fund Release
- The lending process proceeds as if the applicant were real, with funds released through normal channels.
8) Fund Movement and Cash-Out
- Funds are moved quickly to controlled or intermediary accounts, enabling withdrawal or conversion to monetized value.
Why small/mid credit unions are targetedThis fraud variant deliberately centers on institutions perceived to be more vulnerable to identity‑based schemes.
- Reliance on traditional identity checks: Smaller institutions may depend more on static verification methods.
- Gaps in behavioral fraud detection: Advanced, behavior‑based analytics are less common in smaller networks.
- Accessibility emphasis over strict controls: Accessibility can sometimes be prioritized to serve customers, inadvertently lowering friction for fraudsters.
- Perceived ease of monetization: When attackers believe a particular institution is less vigilant, they may pursue higher‑probability targets there.
These dynamics drive attackers toward institutions believed to offer a higher success rate, even if that assumption isn’t universally true.
CASH-OUT AND MONETIZATIONOnce a loan is approved under a stolen identity, the real work begins: converting the loan into usable money while minimizing traceability.
- Speed over sustenance: Funds are moved rapidly to distance the source from the final recipient.
- Use of intermediary accounts: Money flows through multiple accounts to fragment the trail and complicate tracking.
- Mirroring normal activity: Transfers and withdrawals resemble legitimate customer behavior, making them harder to flag in isolation.
- Layered monetization: Funds may be split, routed through various channels, or converted into other assets to reduce the likelihood of early detection.
The effectiveness of this phase lies in the seamless appearance of routine banking actions. When activity looks ordinary in isolation, it becomes the “choreography” that hides deception in a compressed time window.
WHO IS MOST AT RISK?The fraud model yields insights into who is most exposed to identity theft and loan fraud.
- Individuals with established credit histories: Strong profiles are more likely to be approved for larger or new credit lines.
- Digitally exposed individuals: Those with extensive online footprints can inadvertently reveal information that helps bypass verification steps.
- Customers of smaller financial institutions: Users of credit unions with less‑madvanced fraud defenses may face greater risk.
This evolving landscape shows that fraud is no longer a one‑off breach but a sequence of orchestrated steps designed to exploit the spaces between systems and human judgment. The line between legitimate activity and criminal deception has grown blurrier, demanding defensive approaches that adapt to the changing playbook.
Defensive considerations (without recommendations)
- Strengthen identity verification: Move beyond traditional KBA by incorporating multi‑factor authentication, geolocation checks, and device fingerprints to add layers of assurance.
- Elevate data monitoring: Implement continuous monitoring for exposed data and compromised credential usage, particularly for identity data related to loan applications.
- Improve fraud analytics: Deploy behavioral analytics that examine applicant behavior across the lending workflow, not just individual events.
- Partner with data‑sharing networks: Engage with trusted partners to validate identity data in real time and to detect discrepancies early.
- Audit small‑institution workflows: Regularly review onboarding and loan approval processes for potential gaps where a stolen identity could slip through.
ConclusionThe latest trends in fraud show attackers increasingly prioritizing the craft of impersonation over the exploitation of software weaknesses. By assembling credible digital identities and exploiting predictable verification steps, they manipulate the lending process in ways that look legitimate to human reviewers and automated systems alike. Small and mid‑sized credit unions remain enticing targets exactly because their processes are more transparent and their resources for advanced fraud detection can be more limited. As fraud evolves toward identity‑driven, process‑based schemes, defensive strategies must rise to meet the challenge with layered verification, proactive data intelligence, and analytics that illuminate patterns across the full journey from identity acquisition to cash‑out. In this landscape, staying ahead means not just watching for red flags in a single transaction, but understanding and interrupting the end‑to‑end path that fraudsters follow to borrow, and ultimately monetize, stolen identities.


