APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
Insurance Fraud HATS · 13 min read

Cryptographic Fraud Detection
How Cross-Vendor Attestation Catches Staged Incidents

MFA downgraded. Backups deleted. Claim filed. Each event happens in a different system. No single security vendor sees the pattern. The identity provider logs the MFA change. The backup platform logs the schedule modification. The insurance carrier receives the claim. But nobody correlates across these three systems — until now. HATS sees the pattern because it attests state across multiple vendors simultaneously. The fraud signal is not in any single system. It is in the gap between them.

The Cross-Vendor Blind Spot

Modern enterprise security architectures are multi-vendor by design. The identity provider is Azure AD or Okta. The endpoint detection platform is CrowdStrike or SentinelOne. The email security system is Proofpoint or Mimecast. The backup infrastructure is Veeam or Rubrik. The cloud security posture management is AWS Security Hub or Microsoft Defender for Cloud. Each vendor provides best-in-class capability in its category. Each vendor provides comprehensive logging and alerting within its domain.

But each vendor is blind to what the other vendors see. CrowdStrike does not know that MFA was disabled on the CFO's account in Azure AD. Azure AD does not know that backup immutability was turned off in Veeam. Veeam does not know that an email forwarding rule was created in Microsoft 365. Each vendor's monitoring, alerting, and anomaly detection operates within its own silo. Cross-vendor correlation typically happens in a SIEM (Security Information and Event Management), but SIEMs are designed to correlate security events — alerts, incidents, and threats — not configuration state changes. A SIEM will alert on a malware detection. It will not alert on MFA being disabled for a single account, because that is an administrative action, not a security event.

This cross-vendor blind spot is the gap that sophisticated fraud exploits. The fraud pattern involves coordinated changes across multiple systems that, individually, appear to be normal administrative actions. Together, they create the conditions for a fraudulent claim. The pattern is invisible to any single vendor's monitoring because no single vendor sees all the pieces.

The Six Fraud Patterns

Based on analysis of cyber insurance claims data and carrier fraud investigation reports, including findings documented by the Coalition 2026 Cyber Claims Report, six distinct fraud patterns emerge that exploit the cross-vendor blind spot.

Pattern 1: The Staged Incident

The most direct fraud pattern involves deliberately creating the conditions for a "breach" and then filing a claim. The sequence: an insider disables MFA on a set of accounts (identity provider change), creates email forwarding rules to an external address (email security change), reduces backup retention from 90 days to 7 days (backup system change), and then waits 30 days. After the shortened backup window has passed and the evidence is limited, a "breach" is reported. An external attacker "compromised" the accounts without MFA, "exfiltrated" data through the forwarding rules, and the limited backup retention means forensic recovery is constrained. The claim is filed for business interruption, incident response, and notification costs.

No single vendor flags this sequence. The MFA change is logged as an administrative action in Azure AD. The forwarding rule is logged as a mailbox configuration change in Exchange Online. The backup retention change is logged as a policy update in Veeam. Each change is individually innocuous. The pattern emerges only when you correlate across all three systems and observe: three security-reducing changes in the same environment within the same time window, followed by a claim.

Pattern 2: Control Tampering

Control tampering involves modifying security controls to create a vulnerability that is then exploited — either by an external attacker who was invited through the gap, or by the insider who created it. The sequence: EDR agent is uninstalled from a specific server (endpoint detection change), firewall rules are modified to allow inbound access to that server (network change), and a "ransomware attack" encrypts data on the unprotected server. The claim is filed. The forensic investigation finds that the server lacked EDR and had an open firewall rule, but attributes this to "IT oversight" rather than deliberate tampering.

The cross-vendor correlation reveals the pattern: EDR removal and firewall modification on the same asset within the same time window, followed by a targeted attack on that specific asset. The probability of coincidence is negligible. The probability of coordination is high.

Pattern 3: Renewal Gaming

Renewal gaming involves temporarily improving security controls before the insurance renewal assessment and then reverting to the weaker configuration after the policy is bound. The sequence: 60 days before renewal, MFA is enabled across all accounts. EDR is deployed on all endpoints. Backups are configured with 90-day immutable retention. The renewal application is completed showing full compliance. The policy is bound at a preferred rate. 30 days after binding, MFA exceptions are created for executive accounts. EDR agents are removed from servers with "compatibility issues." Backup retention is reduced to save storage costs.

This pattern is not criminal fraud in most cases — it is organizational behavior driven by competing priorities. But it represents a material misrepresentation that affects the carrier's risk. Continuous attestation through HATS makes renewal gaming impossible because the control state is monitored throughout the policy period, not just at the point of application. The degradation is visible as it happens, not discovered during post-incident forensics.

Pattern 4: Inflated Claims

Inflated claims involve exaggerating the scope or impact of a legitimate security incident to increase the claim payout. An organization suffers a genuine BEC incident affecting three email accounts. The claim filed asserts that the attack affected the entire email system, requiring a full forensic investigation of all accounts, a system-wide password reset, and extended business interruption. The attested state from HATS shows that MFA was enabled on all accounts except the three that were compromised, that no other accounts showed signs of unauthorized access, and that the email system was operational throughout the incident. The scope of the claim is bounded by the attested evidence.

Pattern 5: Pre-Bind Misrepresentation

Pre-bind misrepresentation involves deliberately providing inaccurate information on the insurance application to obtain coverage at a lower premium. This differs from the unintentional inaccuracies discussed in the application liability analysis because it involves knowing misrepresentation. An organization knows that MFA is not deployed on shared service accounts but answers "yes" to the MFA question because they believe those accounts are low-risk. The premium is calculated assuming full MFA coverage. The breach occurs through a compromised service account.

With HATS connector verification at binding, the misrepresentation is impossible because the control state is derived from the identity provider, not from the applicant. The connector shows exactly which accounts have MFA and which do not. The applicant cannot misrepresent because they do not self-report.

Pattern 6: Backup Manipulation

Backup manipulation involves altering backup configurations before or during a ransomware incident to maximize the impact and the claim. The sequence: backup immutability is disabled. Backup retention is shortened. Online backups are deleted. A ransomware attack is reported. The organization asserts that all backups were destroyed by the ransomware. The claim covers full data reconstruction, extended business interruption, and replacement of encrypted systems.

HATS attestation records show the backup configuration at every attestation point. If the backup was immutable and 90-day retention on Monday, and the backup was non-immutable and 7-day retention on Wednesday, and ransomware was reported on Thursday, the configuration change timeline is cryptographically documented. The timestamps are signed with ML-DSA-65. They cannot be altered. The sequence speaks for itself.

How Cross-Connector Analysis Works

The HATS cross-connector analysis engine operates on the attested state data from all connected vendors simultaneously. At each attestation cycle, the engine receives the current control state from each connector: identity provider, endpoint detection, email security, backup, cloud security. It compares the current state to the previous attested state and identifies changes. It then correlates changes across connectors within configurable time windows.

The correlation logic is straightforward. Security controls can change for legitimate reasons. A new employee joins and receives an MFA-exempt temporary account. A server is taken offline for maintenance and the EDR agent is temporarily uninstalled. A backup retention policy is adjusted during a storage migration. Each of these changes is normal in isolation.

The correlation becomes significant when multiple security-reducing changes occur in the same time window across different vendors. The engine evaluates three dimensions: timing (how close together are the changes?), direction (are all changes reducing security, or is there a mix of increases and decreases?), and scope (do the changes affect the same systems or different systems?). Changes that are temporally clustered, uniformly security-reducing, and scoped to the same set of systems generate a high-confidence fraud signal.

The engine does not make fraud determinations. It generates signals that are evaluated by the carrier's claims or underwriting team. The signal includes the specific changes observed, the time window, the connectors involved, and the confidence score. The carrier decides whether to investigate further, adjust coverage, or take no action. The engine provides the data. The human provides the judgment.

Why Single-Vendor Monitoring Misses Coordinated Fraud

The limitation of single-vendor monitoring is fundamental, not implementation-specific. Even the most sophisticated SIEM or XDR (Extended Detection and Response) platform is limited to the data sources it ingests. Most organizations send identity logs, endpoint telemetry, and network events to their SIEM. Fewer send backup configuration changes. Even fewer send email security policy changes. The backup system's retention policy is not typically a SIEM event source.

More importantly, even when all relevant data sources are ingested, SIEM correlation rules are designed to detect attacks — not administrative fraud patterns. The SIEM rule "MFA disabled on account + failed login attempt from suspicious IP within 24 hours" detects an external attack. There is no standard SIEM rule for "MFA disabled on accounts + backup immutability disabled + email forwarding rule created within 7 days" because this is not a known attack pattern. It is a fraud preparation pattern, and it requires a different analytical framework.

HATS provides this framework by design. The attestation engine is specifically built to track configuration state changes across security controls from multiple vendors and to identify patterns that suggest coordinated degradation. This is not a repurposed security monitoring tool. It is a purpose-built attestation and anomaly detection system for insurance-relevant security state.

The Eight Anomaly Detectors

The HATS cross-connector analysis engine includes eight specific anomaly detectors, each designed to identify a distinct category of suspicious pattern.

1. Temporal clustering detector: Identifies when multiple security-reducing configuration changes occur across different connectors within a configurable time window (default: 7 days). The detector scores the cluster based on the number of changes, the severity of each change, and the diversity of connectors involved.

2. Pre-claim degradation detector: Identifies when security controls are degraded in the period immediately before a claim or incident report. The detector requires integration with the carrier's claims intake system. When a claim is filed, the detector examines the preceding 30/60/90-day attestation history for control degradation patterns.

3. Renewal anomaly detector: Identifies when security controls improve significantly in the 60–90 days before policy renewal and then degrade after binding. The detector compares the pre-renewal attestation trajectory to the post-binding trajectory. A significant positive-then-negative inflection point is flagged.

4. Scope correlation detector: Identifies when security changes across different connectors affect the same systems or user populations. MFA disabled for finance department accounts + email forwarding rules created on finance department mailboxes + EDR removed from finance department workstations = targeted degradation of a specific business unit's security.

5. Privileged account anomaly detector: Identifies when privileged accounts (domain admins, global admins, security admins) are involved in security-reducing changes. Changes made by privileged accounts carry higher fraud risk because privileged users have the access to execute coordinated changes across systems.

6. Backup integrity detector: Specifically monitors backup configuration for changes that would reduce recoverability: immutability disabled, retention shortened, offline copies eliminated, backup schedules reduced. Backup manipulation is a precursor to both ransomware attacks and staged incidents.

7. Reversion detector: Identifies when a security-reducing change is quickly reverted after a claim is filed. If MFA was disabled on Tuesday, a claim was filed on Wednesday, and MFA was re-enabled on Thursday, the reversion suggests the change was deliberate and temporary — consistent with staging.

8. Historical pattern detector: Compares the current anomaly to historical anomalies across the HATS attestation network (with privacy-preserving techniques). If the same pattern of changes has been associated with fraudulent claims in other tenant environments, the confidence score increases. This is the network effect: the more environments HATS monitors, the more patterns it can identify.

The Evidence Chain

The critical difference between HATS fraud detection and traditional fraud investigation is the evidence chain. Traditional fraud investigation occurs after the claim is filed, using logs that may be incomplete, tampered with, or ambiguous. Log entries can be deleted. Timestamps can be questioned. The investigation is retrospective, adversarial, and expensive.

HATS attestation creates a prospective evidence chain. Every control state is recorded at every attestation cycle. Every state change is captured in the attestation ledger. Every attestation is signed with ML-DSA-65. The signatures are post-quantum — they cannot be forged by any known or projected computing capability. The attestation ledger is append-only — entries cannot be removed without invalidating subsequent signatures. The evidence chain is continuous, tamper-evident, and independently verifiable.

For claims adjudication, this evidence chain transforms the process. Instead of reconstructing what happened from scattered logs and forensic analysis, the adjudicator reviews the attestation ledger. The ledger shows: "MFA coverage was 100% on March 1. On March 15, MFA coverage dropped to 85% (15 accounts removed). On March 22, backup immutability was disabled. On March 25, a BEC claim was filed." The timestamps are signed. The data sources are identified. The sequence is irrefutable.

The evidence chain also serves the policyholder. If the attestation ledger shows consistent, maintained security controls throughout the policy period, the policyholder has cryptographic proof that they fulfilled their control obligations. The carrier cannot use application discrepancy as a denial basis when the HATS Terminal was monitoring controls continuously and the attested state matched the application at every attestation point.

Making Fraud Signals Cryptographically Undeniable

The phrase "cryptographically undeniable" has specific meaning in this context. When a HATS attestation records that MFA coverage dropped from 100% to 85% on March 15, 2026, at 14:23:07 UTC, that record has the following properties:

Authenticity: The attestation was produced by the HATS Terminal connected to the policyholder's identity provider via authorized API access. The connector identity is bound to the attestation signature.

Integrity: The attestation data has not been modified since it was signed. Any modification — to the timestamp, the MFA coverage percentage, the account list, or any other field — invalidates the ML-DSA-65 signature. The modification is detectable by anyone with the public verification key.

Non-repudiation: The policyholder cannot deny that the MFA change occurred, because the attestation was derived from their own identity provider API and signed by the Terminal they authorized. The data came from their system. They cannot claim it was fabricated.

Temporal binding: The attestation timestamp is bound to the signature. The timestamp cannot be changed without invalidating the signature. The sequence of attestations is ordered and immutable.

Quantum resistance: The ML-DSA-65 signature cannot be forged by a quantum computer. The evidence chain will remain valid for the foreseeable future, regardless of advances in quantum computing.

Together, these properties make the fraud signal undeniable in a legal and evidentiary sense. The policyholder cannot claim the data is wrong. The carrier cannot claim the data was tampered with. The timestamps are fixed. The sequence is clear. The evidence speaks with the authority of mathematics, not the ambiguity of human testimony.

The Industry Impact

Cyber insurance fraud costs the industry an estimated $2–4 billion annually, according to industry estimates. Most of this fraud is undetected because the detection mechanisms are post-hoc forensic investigations that are expensive, slow, and limited to the data available after the claim. Cross-vendor attestation shifts fraud detection from post-hoc to real-time, from expensive to automated, and from limited to comprehensive.

For carriers, the value is direct: reduced fraudulent claims, lower loss ratios, and better pricing accuracy. Every fraudulent claim detected before payout saves the carrier the full claim amount plus investigation costs. At scale, the savings are significant — potentially 5–10% of total claims costs.

For honest policyholders, the value is equally direct: lower premiums. When fraud is reduced, the loss ratio improves, and competitive carriers pass the savings through to policyholders. Honest policyholders currently subsidize fraudulent claimants through their premiums. Fraud detection reduces this cross-subsidy.

For the industry as a whole, cross-vendor attestation creates a structural disincentive for fraud. When every security control change is recorded, signed, and correlated across vendors, the risk of detection increases dramatically. The rational fraudster (if such a person exists) calculates the probability of detection against the expected payout. When the detection probability is near-certain because the evidence chain is cryptographic and continuous, the expected value of fraud turns negative. The deterrence effect is the most valuable outcome — fraud that never happens costs nothing to investigate and nothing to pay.

The Bottom Line

The fraud signal is not in any single system. It is in the correlation between systems. MFA downgraded in the identity provider + backups deleted in the backup system + claim filed with the carrier = a pattern that no single vendor detects but cross-vendor attestation makes visible. HATS attests state across 12 connectors, correlates changes through 8 anomaly detectors, and produces cryptographically signed evidence chains that make fraud signals undeniable. The gap between vendors is where fraud lives. HATS closes that gap.

Learn more: HATS Terminal  |  FraudShield  |  Cyber Insurance  |  Contact Us