Sunday, May 18, 2025
HomeCyber Security NewsUnited States Secret Service Announces the Creation of Cyber Fraud Task Force

United States Secret Service Announces the Creation of Cyber Fraud Task Force

Published on

SIEM as a Service

Follow Us on Google News

The U.S. Department of Homeland Security is merging its Electronic Crimes Task Forces (ECTFs) and Financial Crimes Task Forces (FCTFs) into a single unified network known as Cyber Fraud Task Forces (CFTFs).

The (CFTFs) formed by U.S. Secret Service aimed to prevent, detecting, and mitigating complex cyber-enabled financial crimes.

Secret Service focused on investigating on disrupting and deterring criminal activity that could hinder an effective response to the pandemic and to recover stolen funds from Americans.

- Advertisement - Google News

Cyber Fraud Task Forces

The Secret Service focused on investigating efforts on disrupting and deterring criminal activity and to recover the stolen funds.

The Secret Service has successfully disrupted hundreds of online COVID19 related scams, investigated several cyber fraud cases, halted the illicit sales of online stolen COVID-19 test kits, prevented tens of millions of dollars in fraud from occurring, and is leading a nation-wide effort to investigate and counter a vast transnational unemployment fraud scheme targeting the U.S. state unemployment programs.

The creation of CFTF will offer a specialized cadre of agents and analysts, trained in the latest analytical techniques and equipped with the most cutting-edge technologies, said Michael D’Ambrosio, Assistant Director, U.S. Secret Service.

Through the creation of the CFTFs, the Secret Service aims to improve the coordination, sharing of expertise and resources, and dissemination of best practices for all its core investigations of financially motivated cybercrime reads the press release.

The Secret Service has successfully stopped hundreds of online COVID19 related scams, investigated several cyber fraud cases, halted the illicit sales of online stolen COVID-19 test kits, prevented tens of millions of dollars in fraud from occurring.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...