Fighting wire fraud: An industry perspective

Similar documents
Fighting ACH fraud: An industry perspective

ACI Response to FFIEC Guidance

How To Protect Your Online Banking From Fraud

FFIEC CONSUMER GUIDANCE

ACH AND WIRE FRAUD LOSSES

Best Practices in Account Takeover

Supplement to Authentication in an Internet Banking Environment

Questions You Should be Asking NOW to Protect Your Business!

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

Electronic Fraud Awareness Advisory

ACI SELF-SERVICE BANKING

Protecting your business from fraud

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

Retail/Consumer Client. Internet Banking Awareness and Education Program

What the Future of Online Banking Authentication Could Be

Online Cash Manager Security Guide

location of optional horizontal pic Corporate and Investment Banking Business Online Information Security

Online Banking Risks efraud: Hands off my Account!

Online Account Takeover. Roger Nettie

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Guide to Preventing Social Engineering Fraud

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Best Practices: Reducing the Risks of Corporate Account Takeovers

Deception scams drive increase in financial fraud

Payment Fraud and Risk Management

Stay ahead of insiderthreats with predictive,intelligent security

Corporate Account Take Over (CATO) Guide

Avoid completing forms in messages that ask for personal financial information.

Don t Fall Victim to Cybercrime:

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

product flyer Single, full-featured solution flexible, personalized experience Highly extensible and secure

WHITEPAPER. V12 Group West Front Street, Suite 410 Red Bank, NJ

Five Trends to Track in E-Commerce Fraud

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

Protecting Against Online Fraud with F5

What are the common online dangers?

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Preventing Corporate Account Takeover Fraud

M&T BANK CANADIAN PRIVACY POLICY

Remote Deposit Quick Start Guide

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

ACCOUNT TAKEOVER TO IDENTITY TAKEOVER

Preventing, Insuring, and Surviving Fund Transfer Fraud... and Other Cyber Attacks

Internet Usage (as of November 1, 2011)

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

NATIONAL CYBER SECURITY AWARENESS MONTH

Top Fraud Trends Facing Financial Institutions

Market Intelligence Cell. Fighting Financial Crime

Cyber Security. Securing Your Mobile and Online Banking Transactions

TELECOM FRAUD CALL SCENARIOS

Driving License. National Insurance Number

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

ecommercial SAT ecommercial Security Awareness Training Version 3.0

Guide to Evaluating Multi-Factor Authentication Solutions

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

FFIEC CONSUMER GUIDANCE

Malware & Botnets. Botnets

Review of.au domain name policy framework Submission to.auda

Brainloop Cloud Security

WEB ATTACKS AND COUNTERMEASURES

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

We may collect the following types of information during your visit on our Site:

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD

CYBERCRIME AND THE HEALTHCARE INDUSTRY

IBM Counter Fraud Signature Solutions

BUSINESS ON-LINE BANKING AGREEMENT

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER

Fraud Trends. HSBCnet Online Security Controls PUBLIC

ITAR Compliance Best Practices Guide

Protect Your Business and Customers from Online Fraud

INTERNET BANKING SYSTEM AGREEMENT

Online Bank Services Agreement and Disclosure Statement INTRODUCTION GENERAL AGREEMENT AND DISCLOSURE

Transcription:

THOUGHT LEADERSHIP Fighting wire fraud: An industry perspective Volume 1 1

Introduction Introduction Mention wire fraud in a room full of bankers, and you are sure to get a reaction. The transaction may take place within minutes, but the effects of wire fraud can last for months, sometimes years in the form of protracted and costly litigation. When wire fraud strikes, the losses are normally considerable, while the client s reaction ranges from unfiltered anger to sheer disbelief that their bank allowed wire fraud to happen. Criminals like wire transactions for many of the same reasons that clients do. Initiating a wire requires minimal effort, and the funds appear within hours in the recipient s account, ready for immediate withdrawal. There is theoretically no limit on the amount of a wire. If the funds are available, a wire transaction is an option. Convenience, quick fund availability and no limit on the amount of the transaction cybercriminals would be foolish not to target this payment channel. Throughout the year, numerous examples of wire fraud appear in the business press, and several of those cases have made it to court. How big is the problem and what can banks do to minimize the risk? This paper provides an overview of wire fraud including the tools and tactics cybercriminals use, a review of recent court cases and general approaches to help financial institutions combat the threat. The cybercriminal: Tools and tactics Today s cybercriminal has an impressive arsenal available to commit bank fraud. Just like legitimate companies, criminals employ different approaches based on their core competencies, sophistication and available resources. Typically, wire fraud schemes fall into three main categories: Scenario #1 I am who I say I am. Given the vast amount of data captured by companies around the globe, coupled with the frequency of data breaches many of which do not make the news criminals often have the data they need to take over a customer s bank account entirely. When the criminal initiates a wire transfer request, they have all of the information they need to pass the call back test, where a bank employee calls to verify the legitimacy of the transaction. Not only can the fraudster intercept or divert the call, he or she can also impersonate bank officials or a customer, allowing him or her to authenticate the payment instructions. Once the bank employee verifies data provided by the criminal as accurate, the bank sends the wire transaction, Convenience, quick fund availability and no limit on the amount of the transaction cybercriminals would be foolish not to target this payment channel. 2

Please verify your information which is subsequently layered (a series of complex transactions, designed to eradicate traces of the original source) with the funds, eventually finding their way to the fraudster s account. Retracing the money laundering process is impossible since the cybercriminals deliberately move funds to and within banking systems that provide legal protections designed to shield the identity of account holders and their banking activity. Scenario #2 Please verify your information. When it comes to stealing or tricking individuals into providing their personal information, cybercriminals are highly adept at leveraging all manners of technology for the purpose. The following tactics represent some of the more frequently used approaches that fraudsters use to gather data to commit wire fraud: Phishing: Emails purporting to be from legitimate companies with the goal of tricking recipients into providing personal information. To provide information, the email normally redirects the recipient to an official looking site controlled by cybercriminals. Many individuals are often fooled into accepting fraudulent wire transfers and end up becoming money mules, which includes moving money on behalf of the fraudster. Other email scams trick individuals into thinking they are making investments (through wire transfers) with legitimate investment companies. These companies often look legitimate and trustworthy. In some cases, the recipient is just plainly tricked into providing personal information on the promise of getting money (think Nigerian 419 advance fee email scams: send me a processing fee and you ll get lots of money as a payout ). Spear phishing: Emails targeting specific companies, departments or individuals requesting that the recipient share their personal information. To add legitimacy, cybercriminals may show a senior executive within the company as the author. Denial of service/distributed denial of service: Denial of service and distributed denial of service both attempt to overwhelm a bank s servers, therefore blocking legitimate users from accessing the site. Whether fraud or data theft results before, during or after an attack is the subject of debate. Watering holes: A cybercriminal compromises a third-party site with malware. Visitors to the site inadvertently download the malware, which in turn enters their employers IT environment and infects its machines. The presence of malware may allow criminals to capture personal information, banking credentials or the company s intellectual property. Insiders: A well-placed employee within a bank can do untold damage. Frontline tellers, for example, typically have unfettered access to customer information, including their current balance, contact information and normal account activity. In addition, bank employees often have the ability to change the customer contact information without additional oversight or approval from a member of management. Scenario #3 You re the only one that can help. / I m about to make you rich. A customer receives an email from a friend, or at least someone they know that apparently is in trouble. Typically, the friend is facing a life-threatening event that they can avoid if the customer wires them money. Since the email is supposedly from a friend and includes a sense of emergency, customers do fall for this type of fraud and wire the money. 3

The financial institution s perspective There are a number of variations on this type of fraud, including schemes from apparently respectable members of society in foreign countries with the ability to secure vast sums of wealth if the email recipient provides a modest investment to start the process. Fighting wire fraud: The financial institution s perspective Customers demand convenience. They expect that their financial institution will allow them to access their account whenever needed, from whatever device they choose. Whereas 10 years ago, most customers appreciated logging on via their personal computer, today they expect to access their account from their personal computer, as well as their mobile device, including their phone and tablet such as an ipad. As the number of devices that a customer uses increases, so too does the inherent complexity of verifying that the individual accessing their account online is the actual customer, and not a member of an organized crime syndicate. For example, if a customer uses their new phone to access their account, but mistypes their password several times and requests a new password, how can the bank know for sure that the customer initiated the request? As we learned earlier, cybercriminals possess an array of tools to gather a customer s personal data. The fraudster s ability to gather the information they need appears to be as limited as their imagination. Although their use of the information is criminal and not to be condoned, their ingenuity is certainly astounding. To complicate matters further, not all fraudsters employ the same techniques. Yet, financial institutions must have the people, processes and technology in place to respond to attacks, regardless of their origination, sophistication and frequency. Although harsh, there is no defense in the eyes of the customer for allowing fraudsters to steal. Additionally, some cybercriminals specialize in acquiring data, while others focus their efforts in using the data to commit fraud, while others handle the entire operation from data gathering, usage and subsequent laundering of the proceeds. Just like regular companies, fraudsters develop core competencies that they use to create sustained competitive advantage, or in this case, the ability to overcome a bank s fraud defenses. In fact, criminals often seek to move money offshore or to other jurisdictions, knowing this makes recovery expensive and difficult for banks and law enforcement, as they have to work within legal boundaries. Organized crime does not have these same constraints. Civil actions by customers and banks are also expensive. Recovery of funds or related assets purchased through the fraudulent activity is usually drawn out and there is no guarantee that any money will be recovered. This only exacerbates the complexity of the issue. Legal landscape Not surprisingly, given the inherent complexity of detecting and preventing wire fraud, when losses result, the customer and the bank often disagree as to who is at fault, and ultimately facilitated the fraud. To avoid adverse publicity and the alienation of profitable clients, behind the scenes financial institutions may elect to reimburse the client for their losses. By doing so, banks avoid the cost and adverse publicity associated with litigation, as well as avoid the disclosure of the points of failure within the bank s walls that may have allowed the fraud to take place. 4

Legal landscape However, making clients whole for wire-related fraud losses is a short-term solution that does not address the root cause of the loss. In most cases, cybercriminals took advantage of weaknesses on both the bank s and the customer s systems and online banking practices. Deciding which entity should shoulder the blame, and consequently the loss, is the job of the courts. In the following cases, the respective courts viewed the cases and arrived at differing opinions. Choice Escrow and Land Title LLC vs. BancorpSouth Inc. 1 In a dispute dating back several years involving an unauthorized wire of $440,000, the court sided with BancorpSouth. Cybercriminals stole the company s login credentials and sent the wire to a corporate account in Cyprus. The bank previously offered the company dual control (two individuals must login and approve the sending of a wire), and the company declined. In addition, the company also declined imposing restrictions on the amount and frequency of wires permissible each day. Verdict: The bank wins the case, primarily due to the customer s refusal to implement additional security controls. Patco Construction Company, Inc. vs. People s United Bank 2 Several years ago, fraudsters captured a Patco employee s login, password and answers to security-related questions. Via six wires, cybercriminals withdrew $588,851, of which $243,406 was recovered. The parties settled after protracted litigation. People s United agreed to pay Patco for losses it suffered. Originally, Patco sued for losses, damages and legal fees. Verdict: The company settles with the bank after years of costly litigation for both sides. Village View Escrow vs. Professional Business Bank 3,4 After suffering a $393,000 net loss associated with 26 fraudulent wires, Village View Escrow sued Professional Business Bank. The owner of Village View Escrow stated that the bank normally notified her via email of each wire transfer associated with her account. The fraudsters apparently disabled this service before launching their attack. Prior to the attack, the owner of Village View Escrow, Michelle Marisco, received an unsolicited email regarding an undelivered UPS package. When she opened the attachment included in the email, nothing happened. She subsequently sent the email to her assistant, who also opened the attachment. The attachment was a Trojan horse that captured Marisco s bank login credentials as well as her assistant s. Using the captured passwords, the fraudsters provided two levels of approval required by the bank to release a wire. In order to allow access to its online banking channel, Professional Business Bank reportedly used single-factor authentication instead of multi-factor authentication. Verdict: The bank agrees to reimburse the company for the loss and pay its legal fees 5. Experi-Metal vs. Comerica 6 District Court in Michigan rules in favor of Experi-Metal for $561,399 in losses associated with a phishing attack. The judge determined that Comerica had not operated in good faith with respect to its online banking protections. Verdict: Comerica reportedly settled with Experi-Metal for an undisclosed amount 7. As with any legal dispute, the application of the law to complex matters is an inexact science. Normally, both parties believe that the facts are on their side, yet for one party to prevail, the other must lose in some shape or form. 5

Shoring up the defenses Legal action can result in compromise in the form of agreed upon settlements that take the matter out of the hands of the judge and jury to decide. However, regardless of the final verdict, both sides will undoubtedly spend considerable time and expense in and out of court pursuing the issue. To complicate matters further, security measures available and commonly in place to protect consumer versus commercial accounts differ, as do the banking rules and regulations governing each type of account, and the corresponding liability for fraudulent transactions. Ultimately, when a customer sues its bank, no one really wins. Litigation of this type is rarely a for profit pursuit, and as these cases show, winning in a court of law is never a sure thing. Shoring up the defenses Like most types of bank fraud, combating wire fraud requires a proactive and vigilant multipronged approach, which acknowledges that certain elements of a bank s defenses will fail, while the cybercriminal will overcome others. Relying on one control or set of controls to stop all wire fraud attempts is unrealistic and destined to failure. Banks must continually adapt and readapt to the threat of wire fraud. Just because today your bank s wire fraud losses are low is no guarantee that they will remain so. Cybercriminals pursue the path of least resistance. If your bank s defenses are more robust than a competitor, and consequently more time consuming to overcome, chances are that fraudsters will focus their immediate efforts on your competitors that have weaker controls in place. However, complacency will invite fraud in the future. Cybercriminals will continue to invest the time, energy and expense probing your bank s defenses for weaknesses. Once uncovered, they will arrive in force and disappear as quickly and quietly as they arrived. Fraud prevention tools typically focus on one or more of the following components associated with a customer s account activity: Authentication: Involves the comparison of data gathered from the customer such as user name, password and something only the user knows (their dog s name, for example) against information previously provided during the account opening phase, or at some point during the life of the account. Additional factors may include tokens that generate random numbers the customer inputs, a USB device that contains login credentials, or information about the customer s computer device that the bank captures and associates with the account. Account maintenance: To open a new account as well as comply with Know Your Customer requirements, banks capture data regarding the customer such as name, address, phone number, email address, date of birth, etc. In the event that a customer changes elements of their data, such as their phone number or email address, the bank initiates a process using previously designated communications methods such as mobile phone or secondary email address to confirm the customer did in fact make the request. The message sent may include a one-time password or a prompt to provide a factor, such as the information captured during login. In limited circumstances, the bank may call the customer to confirm the change. User behavior: How a customer interacts with a bank s online site can follow patterns. For example, consider a retail customer that normally checks their account balances in a certain order, never initiates transaction online and always logs in from their desktop based in their home. In the event that they log in and initiate 10 ACH transactions using an unrecognized device that appears to be in France, software flags the account for further review. Similar behavioral profiling can be applied to monitoring business or corporate accounts. 6

Conclusion Transaction monitoring and authentication: Software reviews a customer s comprehensive banking activity regardless of the channel used by a customer for red flags indicative of fraud. For example, a wire request to send money from a retail account with a large balance and very little transaction volume to the Caribbean may signal fraud. In addition to the destination for the funds, anomaly detection software captures considerable data corresponding to the transaction including the date and time requested by the customer, the payee account and name, the account number, the method used to initiate the wire and the level of authentication received by the bank. If, for whatever reason, the bank suspects that the wire may be fraudulent, they may contact the customer directly to confirm the request. Unfortunately, the individual they reach may in fact be the fraudster that changed the customer contact information to their own to commit fraud. Analytics: Sophisticated fraud threats often require sophisticated detection techniques. As fraudsters get more creative and bold, modeling techniques today are adapting to a tremendous increase in possible counter-measures. Financial institutions often turn to advanced predictive analytic techniques to detect virtually all types of financial crime. Custom built (using the institutions own known fraud data) or consortium (using the collective data of many institutions) approaches can provide extra protection in preventing such fraudulent activity. Conclusion For as long as banks offer their clients the ability to wire funds, cybercriminals will continue their efforts to commit fraud. When banks and their customers disagree as to which entity should bear the burden of the loss, the dispute can end up in court. How courts apply the law relating to online fraud is open to wide interpretation. Consequently, neither party to a lawsuit can predict with any degree of certainty the chances of proving their case and receiving a judgment in their favor. As with most types of fraud, prevention and detection requires a detailed understanding of the schemes fraudsters employ, and multiple layers of security that slow, frustrate and ultimately repel attempts to steal funds. 1 Krebs on Security, Missouri Court Rules Against $440,000 Cyberheist Victim, March 13, 2013 http://krebsonsecurity.com/2013/03/missouri-court-rules-against-440000-cyberheist-victim/ 2 Bankinfosecurity.com, PATCO Fraud Dispute Settled, November 27, 2012 http://www.bankinfosecurity.com/settlement-reached-in-patco-case-a-5313/op-1 3 Krebs on Security, Bank Settles with Calif. Cyberheist Victim, June 12, 2012 http://krebsonsecurity.com/2012/06/bank-settles-with-calif-cyberheist-victim/ 4 Krebs on Security, e-banking Bandits Stole $465,000 from Calif. Escrow Firm, June 10, 2010 http://krebsonsecurity.com/2010/06/e-banking-bandits-stole-465000-from-calif-escrow-firm/ 5 Insideprivacy.com, Settlement Reached in Data Security Breach Lawsuit Against Bank, June 20, 2012 http://www.insideprivacy.com/united-states/litigation/settlement-reached-in-data-security-breachlawsuit-against-bank/ 6 Bankinfosecurity.com, Court Favors EMI in Fraud Suit, June 16, 2012 http://www.bankinfosecurity.com/court-favors-emi-in-fraud-suit-a-3750 7 American Banker, Comerica Settles After Updated Security Rules Weaken Its Case, August 11, 2011 http://www.americanbanker.com/issues/176_150/comerica-security-rules-1040875-1.html?zkprintable =1&nopagination=1 7

8 ACI Worldwide Offices in principal cities throughout the world www.aciworldwide.com Americas +1 402 390 7600 Asia Pacific +65 6334 4843 Europe, Middle East, Africa +44 (0) 1923 816393 Copyright ACI Worldwide, Inc. 2013 ACI, ACI Payment Systems, the ACI logo and all ACI product names are trademarks or registered trademarks of ACI Worldwide, Inc., or one of its subsidiaries, in the United States, other countries or both. Other parties trademarks referenced are the property of their respective owners. ATL5143 06-13 About ACI Worldwide ACI Worldwide powers electronic payments and banking for nearly 1,750 financial institutions, retailers and processors around the world. Through our integrated suite of software products and hosted services, we deliver a broad range of solutions for electronic payments; transaction banking; mobile, branch and voice banking; fraud detection and trade finance. To learn more about ACI and understand why we are trusted globally, please visit www.aciworldwide.com. You can also find us on Twitter @ACI_Worldwide.