Fraudasaurus

FRAUDASAURUS

FRAUD DETECTION FOR THE DIGITAL AGE

SCROLL TO START
MISSION BRIEFING
INCOMING TRANSMISSION...

Agent, we've detected suspicious patterns across ARFI's digital banking
platform. Someone is exploiting the gap between core and digital.

Your mission: Investigate fraud vectors and identify the mastermind
behind the operation known only as "CARMEG SANDIEGO."

THE STAKES: $17.9 MILLION in fraud exposure hiding in plain sight.
THE TARGETS: $13.9M structuring ring + $4M dormant abuse.
THE DATA: Already there. Just wasn't being queried.

Good luck, Agent. The institution is counting on you.

[TRANSMISSION END]
_
BEGIN INVESTIGATION
LEVEL 1

STRUCTURING

$13.9M BSA/AML Violation Ring

Six accounts making identical $7,980 transfers - just under the $10,000 CTR threshold - 4-5 times per day for 18+ months. The clearest fraud signal in the dataset. Transaction memos reference 'DEPOSIT AT ATM... JLASTNAME TX'.

THREAT ANALYSIS
6
Accounts
1,747
Transactions
$13.9M
Total Amount
$7,980
Avg Txn
Evidence Collected:
Account IDTxnsTotalAvgPattern
8d857485...351$2,800,980$7,980$7,980 x 351 (Member #39903)
db903a36...315$2,513,700$7,980$7,980 x 315 (Member #7000)
4d847cfd...291$2,322,180$7,980$7,980 x 291 (Member #33250)
cb9e5eca...277$2,210,460$7,980$7,980 x 277 txns
bd4f341d...260$2,074,800$7,980$7,980 x 260 txns
6e86aaaa...253$2,018,940$7,980$7,980 x 253 (Member #39903)
1
Detection Method: Repeating Amount + Daily Aggregation

STRUCTURING SENTINEL flags accounts with 3+ identical amounts ($3K-$9,999) in 7 days, or daily totals exceeding $10K with no single transaction above threshold. These 6 accounts were running since April 2024 - $31,920 to $39,900 per day per account - totaling $13.9M over 18 months.

LEVEL 1 COMPLETE
SCROLL TO CONTINUE
LEVEL 2

ACCOUNT TAKEOVER

Credential Attack Detection

Analysis of 2,144 login attempts revealed brute force patterns, credential stuffing, and suspicious IP velocity. CarMeg's own account 'ilovemlms' shows 25 failed logins from 5 IPs - managing too many fake identities.

THREAT ANALYSIS
47
Suspicious
114
Failed Attempts
42%
Avg Fail Rate
5
Shared IP Groups
Evidence Collected:
UsernameFailedSuccessFail %IPsActivity
bannowanda1599239%12Sustained brute force, 12 source IPs
ilovemlms25681%5CarMeg account - credential stuffing
brandygalloway06140100%114 failures in 2 min - brute force
jessica60100%6Each attempt from different IP - botnet
wandaa1101466%2525 distinct IPs - unusual for legitimate user
2
Detection Method: Login Velocity & IP Analysis

LOGIN GUARDIAN tracks failed login velocity and unique IP counts. 'bannowanda1' (JAMES EVANS on mposkey@ email - name mismatch!) shows 59 failures from 12 IPs. 'brandygalloway06' hit 14 consecutive failures in 2 minutes - textbook brute force. 'jessica' attempted from 6 different IPs - every attempt from a new source.

LEVEL 2 COMPLETE
SCROLL TO CONTINUE
LEVEL 3

DORMANT ABUSE

$4M Core-Digital Gap Exploit

By joining Symitar lastfmdate with Banno transactions, we found accounts appearing dormant in core banking but actively moving money through digital channels. The real owner isn't watching - and neither was the core system.

THREAT ANALYSIS
2
Compromised
8+ yrs
Avg Dormancy
$4.2M
Suspicious Amt
12 YEARS
Detection Gap
Evidence Collected:
Member #Last CoreDigitalTxnsAmountRisk
00000000062012-10-262024-03-153120$4,094,081CRITICAL
00000349962019-10-012024-03-151113$145,736HIGH
3
Detection Method: Core vs Digital Activity Correlation

DORMANT WATCHER joins symitar.account_v1_raw.lastfmdate with banno transactions_fct. Member #6 shows last core activity in October 2012 - over 12 years ago - yet has 3,120 digital transactions totaling $4.09M. This is exactly the kind of account CarMeg targets: abandoned by its owner, unmonitored by the core system.

LEVEL 3 COMPLETE
SCROLL TO CONTINUE
WARNING: BOSS ENCOUNTER
FINAL BOSS

CARMEG SANDIEGO

The mastermind behind the fraud ring

WANTED
REWARD: $13,941,060
Meg Bannister
Meg Bannister
a.k.a. "CarMeg SanDiego"
CHARGES:
  • Structuring (BSA Violation)
  • Multi-Identity Fraud
  • Account Takeover Attempts
  • Synthetic Identity Creation
  • Money Laundering
11
ACCOUNTS
8
ALIASES
CRIMINAL PROFILE
11
Linked Accounts
8
Known Aliases
18+ months
Duration
$13.9M
Est. Loss
Linked Accounts:
mbannister@jackhenry.com
mbannister@symitar.com
mbannister@gmal.com
Member #39903
Member #7000
Member #33250
LULA ROE
ANNA MARIE
GREGORY HOUSE
Lula Local
MEG BANNISTER
Known Usernames:
@ilovemlms
@iloveroe
@xroguex
@lularoe
@megatoptimus
@studentmeg
@ghouse
@A3ZXNHPWONQ6
TARGET IDENTIFIED
VIEW SOLUTION
YOU WIN!

FRAUD RING IDENTIFIED - DEFENSE SYSTEM DEPLOYED

MISSION RESULTS
4
Detectors
248
Alerts
204
Cases
$17.9M
Prevented
The 4-Detector Defense System
STRC
STRUCTURING SENTINEL

Detects repeating sub-$10K amounts and daily aggregation patterns. Found 6 accounts making identical $7,980 deposits.

Caught: $13.9M in exact $7,980 transactions
Pattern: 4-5 transactions/day for 18 months
Daily aggregation > $10K with no single txn > $10K
AUTH
LOGIN GUARDIAN

Monitors failed login velocity, IP diversity, and brute force patterns. Flagged 47 suspicious accounts.

Brute force: 5+ failures in 5 minutes
IP velocity: >5 distinct IPs per account
Credential stuffing: >50% failure rate
DORM
DORMANT WATCHER

Joins Symitar lastfmdate with Banno transactions to find core-dormant/digital-active gaps.

Found: Member #6 dormant 12 years, $4M digital activity
Core activity cutoff: >12 months dormant
Reactivation spike detection
LINK
MULTI-IDENTITY DETECTOR

Clusters accounts by shared email bases, IPs, and login timing. Unmasked CarMeg's 11 accounts.

Email clustering: mbannister@ across 3 domains
Shared IP: 7 usernames in 30-min window
Rapid account creation velocity
Risk Scoring System:
LOW
Score: 1-24
Watchlist
MEDIUM
Score: 25-49
48h Review
HIGH
Score: 50-79
24h Investigation
CRITICAL
Score: 80-100
Freeze + SAR
MISSION DEBRIEF
MISSION COMPLETE!

CarMeg SanDiego has been UNMASKED as Meg Bannister.
The 4-detector defense system is now operational.

FINAL STATS:
- Total Fraud Exposure: $17.9M
- $7,980 Structuring Ring: $13.9M (6 accounts, 1,747 transactions)
- Dormant Account Abuse: $4M (Member #6, dormant 12+ years)
- CarMeg's Accounts: 11 under 6 aliases
- Alerts Generated: 248 across 204 accounts
- CRITICAL: 2 | HIGH: 16 | MEDIUM: 181 | LOW: 5

The data was always there. Now it's being watched.

THE DINOSAUR CAUGHT THE THIEF.
Created By
Dylan Martinez
Don Nguyen
Alan Bixby
Kyle Greer
Mary Ann Wood
JACK HENRY DEVCON 2026 HACK-A-THON