Raiffeisen E-Banking The security of Raiffeisen E-Banking Security on the Internet



Similar documents
Security Evaluation CLX.Sentinel

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

.OR.AT.ATTORNEY.AUCTION.BARGAINS.BAYERN.BERLIN.BLACKFRIDAY.BOUTIQUE.BRUSSELS.BUILDERS

Protecting against Mobile Attacks

Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft

CERT-GOV-GE Activities & International Partnerships

Trends in Mobile Authentication. cnlab security ag, obere bahnhofstr. 32b, CH-8640 rapperswil-jona

The Key to Secure Online Financial Transactions

Joomla Admin Protection

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Top 10 Security Trends

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Information leakage from PC by P2P file-sharing application, Phishing and Spy ware

Practical guide for secure Christmas shopping. Navid

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Threat Events: Software Attacks (cont.)

Online Banking Risks efraud: Hands off my Account!

Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim

Preventing Corporate Account Takeover Fraud

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

Internet basics 2.3 Protecting your computer

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

Don t Fall Victim to Cybercrime:

An Analysis of the Online Banking Security Issues. Reported by Hole, Moen, and Tjostheim

Online Account Takeover. Roger Nettie

What are the common online dangers?

Information Security. Louis Morgan, CISSP Information Security Officer

Emerging Trends in Malware - Antivirus and Beyond

THE OPEN UNIVERSITY OF TANZANIA

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

BUGAT TROJAN JOINS THE MOBILE REVOLUTION

white paper Malware Security and the Bottom Line

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

MALWARE TOOLS FOR SALE ON THE OPEN WEB

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Security survey in the United States

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Stop DDoS Attacks in Minutes

Contents. McAfee Internet Security 3

Lecture 7-1 Computer and Network Security. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Top tips for improved network security

Innovations in Network Security

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

INTRODUCTION DEVELOPMENT AND PHENOMENA

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE)

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

Exposing the Money Behind the Malware

Realize Innovation of Cyber-Security with Big Data. Qi Xiangdong

NHS Information Governance:

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

TURNING SECURITY COSTS INTO PROFITS MANAGED SECURITY SERVICES FOR PROVIDERS.

Five Trends to Track in E-Commerce Fraud

Corporate Account Takeover & Information Security Awareness

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Ethical Hacking & Cyber Security Workshop

Personal Data Security. Grand Computers Club New Technologies SIG May 21, 2014

Hesperbot. Analysts at IKARUS Security Software GmbH successfully removed a self-locking Android Malware from an infected smartphone

Statistical Analysis of Internet Security Threats. Daniel G. James

The anatomy of an online banking fraud

US companies experience and attitudes towards security threats

Promoting Network Security (A Service Provider Perspective)

Win the Internet Security War. Keep Internet Criminals Out of Your Network and Protect Your Business

isheriff CLOUD SECURITY

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Online Cash Management Security: Beyond the User Login

THE RISK OF SOCIAL ENGINEERING ON INFORMATION SECURITY:

Streamlining Web and Security

What the Future of Online Banking Authentication Could Be

Cyber-Threats and Financial Institutions: Assume all networks are infected...is this the new normal? October Sponsored by:

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Securing mobile devices in the business environment

BEHIND THE SCENES OF A FAKE TOKEN MOBILE APP OPERATION

Perspectives on Cyber Security Strategies & Tactics

Countermeasures against Bots

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

A CFO s Perspective. Security. Walt Conway, QSA, CPISM

CERT-GOV-GE Activities & Services

WEB CONTENT SCANNER SDK

Are All High-Risk Transactions Created Equal?

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

SHORT MESSAGE SERVICE SECURITY

Information Security Summit 2005

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

User Guide for the Identity Shield

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

DDoS Attacks & Defenses

Challenges and Best Practices in Fighting Financial Fraud in Brazil

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Access Key for your UBS Online Services Instructions

Content Teaching Academy at James Madison University

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

Almost 400 million people 1 fall victim to cybercrime every year.

Multi-Factor Authentication Reference Guide

Transcription:

Security on the Internet Seite 1

Who is it? Michael Mäder Business Analyst Raiffeisen E-Banking michael.maeder@raiffeisen.ch Background 20 years experience of computer science (programming, project management, training) Infected since the beginning of the (commercial) Internet era in Switzerland at 1995 Seite 2

Security on the Internet says: The Internet is contaminates! 10% of the investigated 4.5 million websites contain trojans!!! Seite 3

Melde- und Analysestelle Informationssicherung MELANI Information about IT-Security Situation in Switzerland and International www.melani.admin.ch Seite 4

Security on the Internet > Kinds of infection Spam / Phishing Download Drive-by Infection: E-mail with infected attachments or links to infected software Protection: awareness spam/phishing filters updated security software Infection: Download of infected software or something others (images, movies, mp3, pdf, etc.) Protection: awareness updated security software Infection: By pure viewing a website! Protection: : Setting up a user with restricted rights! Seite 5

Security on the Internet > Drive-by-Infection The hacker takes control of the PC Infection: By pure viewing the website (IKEA just as a example) Seite 6

Security on the Internet > What happens to the infected PCs? Infection Spying / fraud BotNet Seite 7

Security in the E-Banking Seite 8

Security in the E-Banking Phishing Man-in-the-middle Man-in-the-browser Typ: Attack of the 1st Generation Typ: Trojans of the 2nd Generation Typ: Trojans of the 3rd Generation Threat rating: low Threat rating: medium Threat rating: high Seite 9

Security in the E-Banking > Phishing Seite 10

Security in the E-Banking Phishing Man-in-the-middle Man-in-the-browser Typ: Attack of the 1st Generation Typ: Trojans of the 2nd Generation Typ: Trojans of the 3rd Generation Threat rating: low Threat rating: medium Threat rating: hoch Seite 11

Reguläre E-Banking Zahlung Client PC Internet E-Banking Raiffeisen Customer makes a payment Seite 12

Infected client PC Internet E-Banking Hacker "Man-in-the-Middle" Hacker The hacker pretends logs informs to itself be with an e-the banking customer received site access that the Client data e-banking by transmitted the site client is PC the overloaded and access make data to payments the hacker Seite 13

Security in the E-Banking Phishing Man-in-the-middle Man-in-the-browser Typ: Attack of the 1st Generation Typ: Trojans of the 2nd Generation Typ: Trojans of the 3rd Generation Threat rating: low Threat rating: medium Threat rating: high Seite 14

Man-in-the-Browser! Infected client PC "Man in the Browser" Internet E-Banking Raiffeisen Customer makes a payment Payment details will be manipulate Seite 15

Different approaches, same goal Separate release for payment Separate customer equipment Seite 16

Security in the E-Banking > confirmation of payment Bankzahlung Schweiz 120.00 CHF Steueramt St. Gallen, 9001 St. Gallen E-Banking Zahlung: 15'000.00 USD zugunsten von Konto RUS-93-BÖS Freigabe- Code A1B2 Seite 17

Security in the E-Banking > confirmation of payment Seite 18

Security in the E-Banking > protection measures Awareness Using an updated internet security suite Allways OS updates www.raiffeisen.ch/sicherheit Login with mobile phones (SMS) Protection measures Fraud Detection Duplicate payment controls Ongoing security considerations Seite 19

Sicherheitsvorteile des Raiffeisen E-Banking 1. Raiffeisen Schweiz: secure and constantly monitored system trained staff (IT security experts, Call Center) closed cooperation with security companies, Federal government and other banks (secured and early knowledge) 2. Raiffeisenbank: Control and release of payments according to defined rules and regulations The customer consultant knows his customers Seite 20

And finally... Thank you for your attention and still enjoy yourself! Seite 21