Fraud

Bust Out Fraud: When a Legitimate Business Is Turned Into a Weapon

Bust‑out fraud is one of the most damaging forms of business fraud. Unlike schemes that rely on fictitious companies or obviously forged documentation, bust‑out fraud exploits real businesses with real credit histories, turning legitimacy itself into the fraudster’s most powerful tool.

We recently found records involving a bust‑out scheme while performing research in connection with a commercial lending transaction. While the specific circumstances are confidential, the pattern was familiar and increasingly common across industries.

What Is Bust‑Out Fraud?

Bust‑out fraud occurs when an individual or group gains control of an existing business, builds or exploits its creditworthiness, and then rapidly incurs debt with no intent to repay. Once the credit is exhausted, the perpetrators disappear, leaving lenders, vendors, and partners with the losses.

What makes bust‑out fraud especially dangerous is that it often looks like normal business activity, until it’s too late.

How Bust‑Out Fraud Typically Works

A classic bust‑out scheme unfolds in recognizable stages:

  1. Acquisition or Control
    The fraudster purchases a business, installs themselves as an officer, or otherwise gains operational control, sometimes through seemingly legitimate mergers, management changes, or filings.
  2. Quiet Period / Credit Grooming
    For months (or longer), the company operates normally. Bills are paid on time. Credit limits may even be modestly increased. The goal is to reinforce trust.
  3. Rapid Credit Expansion
    Once confidence is established, the business applies for additional loans, vendor credit, leases, or financing, often simultaneously and across jurisdictions.
  4. Cash‑Out Phase
    Assets, inventory, or loan proceeds are diverted. Payments suddenly stop. Executives resign or become unreachable.
  5. Collapse
    The company folds, files for bankruptcy, or simply goes dark, leaving creditors scrambling to unwind what happened.

Real‑World Examples of Bust‑Out Fraud

While every scheme differs in execution, the following examples illustrate common variants.

  • Example 1: The “Too Smooth” Acquisition

A mid‑sized services firm is acquired by a new holding company. The new leadership existing staff and contracts in place, pays vendors promptly, and even invests modestly in marketing. Within a year, the company secures multiple six‑figure credit lines, followed by a sudden wave of equipment purchases and short‑term loans. Three months later, the business defaults across the board and leadership vanishes.

  • Example 2: Vendor Credit Exploitation

A long‑standing distributor with excellent payment history begins placing unusually large orders with multiple suppliers at once, negotiating extended terms. The inventory is resold quickly, often below market, to generate immediate cash. Vendors discover the fraud only after invoices go unpaid and bankruptcy filings appear.

  • Example 3: Identity Leverage Across Borders

A legitimate company with international operations is acquired by new principals. Corporate records are updated in multiple jurisdictions. The firm then secures financing in countries where credit checks rely heavily on corporate registration rather than beneficial ownership. The debt accumulates rapidly and enforcement becomes complicated once the entity dissolves.

Why Bust‑Out Fraud Is Hard to Detect

Bust‑out fraud often evades traditional fraud controls because:

  • The business already exists
  • Credit histories appear legitimate
  • Documentation is often technically correct
  • Early behavior reinforces trust rather than raising alarms

In many cases, the change in intent, not the change in structure, is what transforms a normal business into a fraud vehicle.

Final Thoughts

Bust‑out fraud exploits legitimate businesses and may remain concealed without thorough due diligence. In this instance, background screening identified prior involvement by the loan applicants in a bust‑out scheme, underscoring the value of a risk‑based review in identifying fraud risks before material exposure occurs.

 

Disclaimer: This communication is for general informational purposes only and does not constitute legal advice. The summary provided in this alert does not, and cannot, cover in detail what employers need to know about the amendments to the Philadelphia Fair Chance Law or how to incorporate its requirements into their hiring process. No recipient should act or refrain from acting based on any information provided here without advice from a qualified attorney licensed in the applicable jurisdiction.

Business identity theft is alive and well

And it can happen to your business.

Criminals do not discriminate – any type of business or organization of any size or legal structure including sole proprietorships, partnerships, LLCs, trusts, non-profits, municipalities and county governments, school districts and corporations are all targets for business identity theft.

What exactly is business identity theft?  First, let’s clarify that we are not talking about an information security breach or an incident involving the loss or theft of confidential consumer information. Rather, business identity theft discussed here involves the actual impersonation of the business itself.

It happens when criminals pose as owners, officers or employees of a business in order to get their hands on cash, credit or loans, leaving the business on the hook to deal with the debt. A favorite tactic of identity thieves involves the theft of the tax identification number (TIN) or employer identification number (EIN) of the company or the owners’ personal information to use that data to open new lines of credit or obtain a business loan based on the company’s identity.

Another common form of business identity theft occurs when criminals file fake documents with the Secretary of State’s office to change company information such as its registered address or the names of directors, officers or managers. Once the records have been changed, the identity thieves can establish lines of credit or new accounts with the false information.

Other examples of the fraudulent use of a company’s information include current or former employees making use of their access to financial documentation; establishing a temporary office space or merchant accounts in a company’s name; going through a business’s trash and recycling bins to find account numbers or other sensitive data; using phishing attacks or other scams to get the business’s banking or credit information from employees; and filing for tax credits with stolen EINs.

Businesses are an attractive target for identity thieves. Generally speaking, a company will have higher credit limits than an individual, so opening a new account or line of credit in a business’s name will yield more cash for a criminal and larger purchases will receive less scrutiny. Perhaps most frustrating, companies are required by law to report certain identifiers (an address, EIN/TIN, and names of directors in most states), meaning the information is publicly available and easily accessible to anyone.

The invoicing and payment terms typically available to businesses can also work against them. Identity thieves may have a window of up to 30 days after a purchase to disappear before a company detects a problem – and even longer if the thieves use a different address.

Unfortunately, business identity theft is an underreported crime for a variety of reasons. Companies often have no idea their identity has been compromised until they begin receiving unfamiliar bills and collection notices when it is already too late to stop the thieves. Government agencies receive frequent requests for changes to company information and an address change is unlikely to raise red flags. Some businesses aren’t paying close enough attention or fail to caution employees about the possibility of phishing scams, while others may be embarrassed or concerned about their reputation with customers and don’t want to report what happened.

Given the underreporting problem, statistics on business identity theft can be hard to come by. However, the Internal Revenue Service (IRS) said it has seen the number of corporate tax returns flagged for potential business identity theft increase exponentially in recent years, from 350 in 2015 to 4,000 in 2016 with a jump to 10,000 in only the first six months of 2017. The cost of the damage has also risen dramatically, from $122 million in 2015 to $268 million the following year and $137 million for just the first half of 2017.

Importantly, these numbers reflect just one of the many forms of business identity scams.

What can companies do to protect themselves? Click here for a checklist of the most important steps for prevention and what to do if your business becomes a victim.

April 12th, 2018|Categories: Commercial Transactions Due Diligence|Tags: , |

SEC considers background check rule proposed by FINRA

Financial institutions could face expanded obligations to conduct background screening of applicants for registration pursuant to a rule proposed by the Financial Industry Regulatory Authority (FINRA) to the Securities and Exchange Commission (SEC).

As currently drafted, the National Association of Securities Dealers (NASD) Rule 3010(e), the Responsibility of Member to Investigate Applicants for Registration, provides that a firm “must ascertain by investigation the good character, business reputation, qualifications and experience of an applicant before the firm applies to register that applicant with FINRA,” the regulator explained.

Seeking to “streamline and clarify members’ obligations relating to background investigation, which will, in turn, improve members’ compliance efforts,” FINRA proposed the addition of background checks to the Rule for the SEC’s consideration.

The change would mandate that firms verify the accuracy and completeness of the information in an applicant’s Form U4 (Uniform Application for Securities Industry Registration or Transfer) for first-time applicants as well as transfers. Written procedures for conducting the background check – including a public records search – must also be established.

While the rule is prospective, FINRA announced that it would take a look at currently registered representatives. The financial regulator intends to begin its efforts with a search of all publicly available criminal records for the roughly 630,000 registered individuals who have not been fingerprinted within the last five years; going forward, FINRA will periodically review public records “to ascertain the accuracy and completeness of the information available to investors, regulators and firms,” the agency said.

To read the Federal Register notice: click here.

December 3rd, 2014|Categories: Criminal Activity, Risk Management|Tags: , , , |

Pennies add up to $18.7 million in allegedly illicit gains

A bit different from the billion dollar frauds that frequently made the headlines in the years past, a complaint filed on October 5, 2014 by the justice department in the federal district court in Manhattan accuses two former New York brokers of securities fraud and conspiracy for secretly adding a few pennies to the cost of securities trades they processed to generate $18.7 million in gains. The SEC also filed civil charges against the men, and added another broker as a defendant. The SEC’s complaint alleges that from at least 2005 through at least February 2009, the defendants perpetrated the scheme by falsifying execution prices and embedding hidden markups or markdowns on over 36,000 customer transactions. According to the SEC, the defendants charged small commissions—typically pennies or fractions of pennies per share; the scheme was devious and difficult to detect because they selectively engaged in it when the volatility in the market was sufficient to conceal the fraud. One of the defendants, who was in charge of entering the prices into the trading records and playing a critical role by controlling the flow of information, already pleaded guilty to securities fraud and conspiracy.

October 15th, 2014|Categories: Criminal Activity|Tags: , , |

FTC halts high school diploma mill

As the request of the Federal Trade Commission (the “FTC”), on September 16, 2014, the U.S. District Court for the Southern District of Florida imposed a temporary restraining order to halt the business operations of Diversified Educational Resources, LLC (DER), and Motivational Management & Development Services, Ltd. (MMDS), and freeze their assets. The FTC’s lawsuit seeks a permanent injunction to stop the defendants’ deceptive practices and to return ill-gotten gains to consumers, which according to a preliminary review of bank records referenced in the lawsuit were more than $11,117,800 since January 2009.

The complaint alleges that the defendants violated the FTC Act by misrepresenting that the diplomas were valid high school equivalency credentials and that the online schools were accredited. The FTC charges that the defendants actually fabricated an accrediting body to give legitimacy to their diploma mill operation. DER and MMDS allegedly sold the diplomas since 2006 using multiple names, including jeffersonhighschoolonline.com, jeffersonhighschool.us, enterprisehighschool.us, and ehshighschool.org, which purport to describe legitimate and accredited secondary school programs such as “Jefferson High School Online” and “Enterprise High School Online.” The websites claim that consumers can become “high school graduate[s]” and obtain “official” high school diplomas by taking an online exam and paying between $200 and $300. In numerous instances, consumers who attempt to use their Jefferson or Enterprise diplomas to enroll in college, enlist in the military, or apply for jobs are rejected because of their invalid high school credentials.

September 19th, 2014|Categories: Commercial Transactions Due Diligence|Tags: , , , |

The SRA issues warning about a fake website

The Solicitors Regulation Authority (the “SRA”) in the United Kingdom issued a bulletin that it received a report that a website “dovernorchambers.com is operating which refers to the firm Dovernor Chambers” and that the wording on the website appears to have been cloned from the websites of genuine law firms without their knowledge or consent. The SRA says that it is identifying a new fake law firm on an almost daily basis. Some scammers reportedly are stealing a law firm’s entire web page, and then changing the contact information to redirect traffic elsewhere.

September 19th, 2014|Categories: Criminal Activity|Tags: , , , , |

Insider trading enforcement actions continue as SEC’s top priority

Illegal insider trading generally occurs when a security is bought or sold in breach of a fiduciary duty or other relationship of trust and confidence while in possession of material, nonpublic information. In recent years, the SEC has filed insider trading cases against hundreds of entities and individuals, including financial professionals, hedge fund managers, corporate insiders, attorneys, and others. In 2014, examples of noteworthy cases include enforcement actions against the following:

Two husbands on March 31, 2014 – In two unrelated cases, the SEC charged two men with insider trading on confidential information they learned from their wives about Silicon Valley-based tech companies. Each agreed to financial sanctions to settle the charges.

Stockbroker and law firm clerk on March 19, 2014 – SEC charged two individuals who were linked through a mutual friend, with insider trading for $5.6 million in illicit profits based on nonpublic information that the clerk obtained by accessing confidential documents in law firm’s computer system.

Wall Street investment banker on February 21, 2014 – SEC charged an investment banker with making nearly $1 million in illicit profits by insider trading in a former girlfriend’s brokerage account to pay child support.

Chicago-based accountant – SEC charged an accountant with insider trading ahead of the release of financial results by the company where he worked. The individual made more than $250k in illicit profits.

May 14th, 2014|Categories: Criminal Activity|Tags: , , |

FINRA has some common sense advice for avoiding investment scams

  1. Guarantees: Be suspect of anyone who guarantees that an investment will perform a certain way. All investments carry some degree of risk.
  2. Unregistered products: Many investment scams involve unlicensed individuals selling unregistered securities, ranging from stocks, bonds, notes, hedge funds, oil or gas deals, or fictitious instruments, such as prime bank investments.
  3. Overly consistent returns: Any investment that consistently goes up month after month, or that provides remarkably steady returns regardless of market conditions, should raise suspicions, especially during turbulent times. Even the most stable investments can experience hiccups once in a while.
  4. Complex strategies: Avoid anyone who credits a highly complex investing technique for unusual success. Legitimate professionals should be able to explain clearly what they are doing. It is critical that you fully understand any investment that you are considering, including what it is, what the risks are and how the investment makes money.
  5. Missing documentation: If someone tries to sell you a security with no documentation, such as a no prospectus in the case of a stock or mutual fund, and no offering circular in the case of a bond, he/she may be selling unregistered securities. The same is true of stocks without stock symbols.
  6. Account discrepancies: Unauthorized trades, missing funds or other problems with your account statements could be the result of a genuine error or they could indicate churning or fraud. Keep an eye on account statements to ensure that activity is consistent with your instructions, and know who holds your assets. For instance, is the investment adviser also the custodian? Or is there an independent third-party custodian? It can be easier for fraud to occur if an adviser is also the custodian of the assets and keeper of the accounts.
March 28th, 2014|Categories: Criminal Activity|Tags: , , |

SEC’s whistleblower program gains momentum

On November 15, 2013, the SEC released its third annual Whistleblower Report to Congress. According to the report, In the fiscal year 2013, the SEC paid four major awards, one of which was for over $14 million for information leading to an enforcement action that recovered substantial investor funds. Three other payments totaling $832k were made for information regarding a bogus hedge fund.

The report states that the number of complaints and tips increased from 3,001 in the 2012 fiscal year to 3,238 in 2013. The three most common complaints or tips were about corporate disclosures and financials, offerings fraud, and manipulation.  The number of FCPA-related tips also rose, from 115 to 149.

December 9th, 2013|Categories: Criminal Activity|Tags: , , |

13 Things to Know About Investing

The Securities & Exchange Commission (the “SEC”) recently released an educational bulletin to help investors make informed financial decisions and avoid common scams. Its 13 points include:

  1. Check the investment professional’s background.
    Details about experience and qualifications are available through the Investment Adviser Public Disclosure website and FINRA BrokerCheck.
  2. Be mindful of fees associated with buying, owning, and selling an investment product.
    Expenses vary from product to product, and even small differences in these costs can translate into large differences in earnings over time. An investment with high costs must perform better than a low-cost investment to generate the same returns.
  3. Diversification can help reduce the overall risk of an investment portfolio.
    By picking the right mix, you may be able to limit losses and reduce the fluctuations of investment returns without sacrificing too much in potential gains. Some investors find that it is easier to achieve diversification through ownership of mutual funds or exchange-traded funds rather than through ownership of individual stocks or bonds.
  4. Paying off high-interest debt may be the best “investment” strategy.
    Few investments pay off as well as, or with less risk than, eliminating high-interest debt on credit cards or other loans.
  5. Promises of high returns, with little or no associated risk, are classic warning signs of fraud.
    Every investment carries some degree of risk and the potential for greater returns comes with greater risk. Ignore the so-called “can’t miss” investment opportunities or those promising guaranteed returns or, better yet, report them to the SEC.
  6. Any offer or sale of securities must be either registered with the SEC or exempt from registration.
    Otherwise, it is illegal. Registration is important because it provides investors with access to key information about the company’s management, products, services, and finances.
  7. Do not invest in a company about which little or no information is publicly available.
    Always check whether an offering is registered with the SEC by using the SEC’s EDGAR database or contacting the SEC’s toll-free investor assistance line at (800) 732-0330.
  8. Investing heavily in shares of any individual stock can be risky.
    In particular, think twice before investing heavily in shares of your employer’s stock. If the value declines significantly, or the company goes bankrupt, you may lose money and there’s a chance you might lose your job, too.
  9. Active trading and some other common investing behaviors actually undermine investment performance.
    According to researchers, other common investing mistakes include focusing on past performance, favoring investments from your own country, region, state or company, and holding on to losing investments for too long and selling winning investments too soon.
  10. Con-artists are experts at the art of persuasion, often using a variety of influence tactics tailored to the vulnerabilities of their victims.
    Common tactics include phantom riches (dangling the prospect of wealth, enticing with something you want but can’t have), source credibility (trying to build credibility by claiming to be with a reputable firm or to have a special credential or experience), social consensus (leading you to believe that other savvy investors have already invested), reciprocity (offering to do a small favor for you in return for a big favor) and scarcity (creating a false sense of urgency by claiming limited supply).
  11. Some investments provide tax advantages.
    For example, employer-sponsored retirement plans and individual retirement accounts generally provide tax advantages for retirement savings, and 529 college savings plans also offer tax benefits.
  12. Mutual funds, like other investments, are not guaranteed or insured by the FDIC or any other government agency.
    This is true even if you buy through a bank and the fund carries the bank’s name.
  13. The key to avoiding investment fraud is using independent information to evaluate financial opportunities.
    Many investors may have avoided trouble and losses if they had asked questions from the start and verified the answers with sources outside of their family, community, or group. Whether checking the background of an investment professional, researching an investment, or learning about new products or scams, unbiased information is a significant advantage for investing wisely.
February 13th, 2013|Categories: Commercial Transactions Due Diligence|Tags: , , , |
Go to Top