Protecting Against Online Fraud with F5

Similar documents
Protect Your Business and Customers from Online Fraud

The F5 Intelligent DNS Scale Reference Architecture.

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution

Fight Malware, Malfeasance, and Malingering with F5

Filling the Threat Management Gateway Void with F5

F5 and Secure Windows Azure Access

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Deploying the BIG-IP LTM with IBM QRadar Logging

Oracle Database Firewall

Configuring a single-tenant BIG-IP Virtual Edition in the Cloud

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Document version: 1.3 What's inside: Products and versions tested Important:

Deploying the BIG-IP System for Microsoft Application Virtualization

Safely Extend the Enterprise to Personal Mobile Devices

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

How To Protect Your Online Banking From Fraud

Post-TMG: Securely Delivering Microsoft Applications

Deploying the BIG-IP LTM with IBM WebSphere MQ

F5 Data Manager Sample Report and Analysis

Prompta volumus denique eam ei, mel autem

The Shortfall of Network Load Balancing

Intelligent Layer 7 DoS and Brute Force Protection for Web Applications

F5 and VMware. Realize the Virtual Possibilities.

2012 Bit9 Cyber Security Research Report

Cloud: Bridges, Brokers and Gateways

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Meeting FFIEC Guidance and Cutting Costs with Automated Fraud Prevention. White Paper

Integrating F5 Application Delivery Solutions with VMware View 4.5

Payment Card Industry Data Security Standard

Deploying F5 Application Ready Solutions with VMware View 4.5

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Deploying F5 to Replace Microsoft TMG or ISA Server

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Building an Enterprise Cloud with F5 and IBM

Accelerating Mobile Access

Five Trends to Track in E-Commerce Fraud

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Secure iphone Access to Corporate Web Applications

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Operationalizing the Network: SDN

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Deploying the BIG-IP System v11 with DNS Servers

IBM Security Strategy

2015 CENTRI Data Breach Report:

Protecting against cyber threats and security breaches

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection

WHITE PAPER. Understanding How File Size Affects Malware Detection

Application Security in the Cloud with BIG-IP ASM

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Security Intelligence Services.

BUGAT TROJAN JOINS THE MOBILE REVOLUTION

INTELLIGENCE DRIVEN FRAUD PREVENTION

Evaluating DMARC Effectiveness for the Financial Services Industry

Teradata and Protegrity High-Value Protection for High-Value Data

Protecting Your Organisation from Targeted Cyber Intrusion

10 Smart Ideas for. Keeping Data Safe. From Hackers

Where every interaction matters.

Balancing Cloud-Based Benefits With Security. White Paper

Stop advanced targeted attacks, identify high risk users and control Insider Threats

The Key to Secure Online Financial Transactions

Countering Insider Threats Jeremy Ho

Stay ahead of insiderthreats with predictive,intelligent security

Microsoft s cybersecurity commitment

Prompta volumus denique eam ei, mel autem

Total Protection for Compliance: Unified IT Policy Auditing

Selecting the right cybercrime-prevention solution

Defending Against Cyber Attacks with SessionLevel Network Security

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments

Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT

WHITE PAPER Moving Beyond the FFIEC Guidelines

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

Driving Data Migration with Intelligent Data Management

Trust the Innovator to Simplify Cloud Security

COORDINATED THREAT CONTROL

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

F5 and Microsoft Exchange Security Solutions

High-Performance DNS Services in BIG-IP Version 11

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy

Advanced Threat Protection with Dell SecureWorks Security Services

SECURING IDENTITIES IN CONSUMER PORTALS

Under the Hood of the IBM Threat Protection System

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Transcription:

Protecting Against Online Fraud with F5 Fraud is a relentless threat to financial services organizations that offer online banking. The F5 Web Fraud Protection solution defends against malware, phishing attacks, and automated transactions to prevent asset loss and brand damage. White Paper

Contents Introduction 3 The Perils of Fraud 3 Asset loss 3 Damage to the brand 4 Overwhelmed anti-fraud teams 4 Introducing the F5 Web Fraud Protection Solution 5 Detect and mitigate to reduce asset loss 6 Limit breaches to protect the brand 6 Scale the anti-fraud teams 7 Conclusion 7 2

Introduction Financial institutions have the most high-profile, high-value assets on the Internet: millions of bank accounts. The global nature of the Internet means that these assets attract ambitious attackers all around the world. Banks used to be frequent targets of robbery even in the days of brick and mortar, before the Internet. Back then, the maximum amount of loot taken was limited to the physical currency holdings of that branch. The bank robbers had to physically invade the branch office. If they were caught, they faced the legal framework of the jurisdiction around it. Those two restrictions (the limited asset exposure and the legal jurisdiction) no longer apply in the Internet age. It is as if every bank robber in the world can perform a heist anywhere and their total addressable loot has increased to the assets of the bank s worldwide clientele. If the virtual bank robber is based in a different country from the clientele, the chances of facing legal proceedings are slim to none, and slim just logged out. This thievery, broadly known as fraud, is a constant and persistent reality for online banking today. To effectively combat the perils of fraud, organizations that offer financial services over the Internet must defend their businesses with a combination of security technologies. The F5 Web Fraud Protection solution provides both the breadth and depth of coverage financial services organizations need to gain a full defense against asset loss due to fraud. The Perils of Fraud Instead of using masks and guns, today s bank robbers typically use spear phishing. This involves sending emails forged to look like they are from the target bank to trick users into installing malware (malicious software) that will compromise their account once they log in. The malware may simply record the username and password and then send it along to a drop zone for later pickup, or it may steal currency via hidden financial transactions. Asset loss While they are not compelled to do so, nearly all retail financial institutions cover these losses incurred by users when those users are robbed by an attackers malware. For many organizations, these asset losses amount to millions of dollars of per year, making them a high priority. Some banks tried to push these costs onto customers, but the resulting PR backlash was so severe that they retracted those efforts. The banks suffered the financial losses and the bad PR as well. 3

Organizations have had to evolve their own banking applications to provide better account protection (for example, by using SMS messages as two-factor authentication). This has helped, but given the potential rewards, attackers work to defeat new countermeasures. Organizations must continue to deploy multiple solutions to stay current, and those solutions must work together if online banking is to continue to scale. Damage to the brand The story isn t over even for banks that accept these financial losses. Forty-six U.S. states require financial institutions that have been compromised to publically disclose the breaches. This forced disclosure can help customers by notifying them of a higher-risk situation (perhaps causing them to more closely monitor their other bank accounts) but it also causes damage to the financial institution s brand. These breaches are common enough that a single event may not cause much brand damage, but a large one might and repeated breaches certainly will. Ultimately, repeated breaches to multiple brands in the retail banking sector will unsettle customers to the point where they may lose confidence in online banking, and by extension, perhaps even e-commerce. Overwhelmed anti-fraud teams Today, nearly all global retail financial institutions have an anti-fraud team and these teams are busy. First, they have to deploy a range of anti-fraud solutions to combat the various threats they face. Getting all of these solutions to work together can be complex and time-consuming. Anti-fraud teams also have to deal with the constantly evolving threat landscape. For example, there is a new and interesting twist on the financial mechanics of the fraud industry: extortion. When attackers steal account usernames and passwords, they may demand a ransom from the targeted bank. This can be an attractive approach because it means a single negotiation and lump-sum payment for the attacker. Often the victim will pay a reduced and negotiated ransom to make the problem go away. But this leaves the anti-fraud team with a dilemma: in addition to reporting the breach itself, should the team contact each end user individually, and if so, how? By phone? That would be costly and intrusive and could further damage the brand. The potential for asset loss and brand damage makes it critical for retail financial institutions to deploy the highest levels of security for their online banking transactions. At the same 4

time, busy anti-fraud teams are looking for solutions that can be deployed broadly and quickly, and that play well with other anti-fraud solutions. Introducing the F5 Web Fraud Protection Solution The F5 Web Fraud Protection solution has been developed specifically to address the challenges of online banking. It combines the best security with a frictionless experience and a proactive security posture. The solution protects against a full range of threats including man-in-the-browser attacks and man-in-the-middle attacks as well as evolving threats to help financial organizations reduce loss and exposure. And because attacks are always evolving, the solution includes both technological and services components to ensure real-time response to emerging threats. Legitimate Users Man-in-the- Browser Attacks Malicious Scripts/ Infected Users Copied Pages Phishing Users Automatic Transactions Centralized Alert System Malware Detection and Protection Anti-Phishing Real-Time Application-Layer Encryption Transaction Analysis Professional Services and Support Financial Services Figure 1: The F5 Web Fraud Protection Solution 5

Detect and mitigate to reduce asset loss The technological component of the F5 Web Fraud Protection solution detects targeted and generic malware, man-in-the-browser attacks, man-in-the-middle attacks, zero-day attacks, phishing attacks, and other threats that occur in the online channel. It applies a variety of identification techniques to recognize malware patterns such as changes in HTML code, injection of malicious script, or attempted automated transfers. The solution: Detects malware targeted at financial applications Prevents malware from stealing user credentials Mitigates automated transactions with behavioral analysis of the end user Protects against phishing with real-time feedback Focusing on malware and phishing together reduces the number of compromised accounts. Fewer compromised accounts and protection from automated transactions equates directly to fewer asset losses on the bottom line. Limit breaches to protect the brand It s not just about asset loss. Even a breach that grabs no loot can cause damage to the brand by requiring breach notification. The F5 Web Fraud Protection solution reduces the number breaches, the number of users affected, and the number of requisite breach notifications. This is possible because the F5 Web Fraud Protection solution has a clientless security model. Client-based solutions require the end user to download special software to monitor the security of the endpoint device and to launch a secure browser. Only a fraction of users actually do this; in fact, today s users are trained not to download software in case it is a Trojan. Instead of relying on user-installed software, the F5 solution resides at the Application Delivery Controller. From this strategic point of control in the network, the Web Fraud Protection solution is injected into the application as it being delivered to the end user. Organizations appreciate the fact that no client software is required. This approach provides much broader security coverage for the user base than anti-fraud technologies that rely on user behavior to protect the endpoint device. An additional benefit of the clientless security model is that the user experience is unchanged. Because the solution is injected from the Application Delivery Controller 6

and there are no changes to the application, organizations do not need to retrain their users; indeed, those users are not even aware that they are being protected. Scale the anti-fraud teams In order for busy anti-fraud teams to be effective, they need tools that: Play nicely with other anti-fraud tools Provide proper alerting when attacks are detected Leverage community malware expertise Today s retail financial institutions know that tools that meet these criteria must be designed specifically for the most rigorous security environments in the world. Environments like these will have multiple anti-fraud solutions deployed, such as two-factor authentication, geolocation, and adaptive authentication. The F5 Web Fraud Protection solution cooperates with all of these complementary solutions and supports most organizations SIEM solutions. To ensure rapid and efficient response to the latest malware, zero-day, and phishing attacks as they evolve, the F5 Web Fraud Protection solution includes a critical services component through the F5 malware analysis team. This group of experienced threat and attack researchers operates the Security Operations Center, which provides detection, real-time alerting, analysis, and mitigation to organizations anti-fraud teams through a central dashboard as well as via email and SMS. The Security Operations Center monitors current malware and phishing sites and works with law enforcement and ISPs to get malicious sites taken down when possible, benefiting the community as a whole. Conclusion The perils of fraud are not going away. Moving forward, banking functions will continue to migrate online and fraudsters will continue to evolve their attacks. Financial services organizations must meet these challenges in order to protect the bottom line, defend the brand, and enable their staff. The F5 Web Fraud Protection solution is designed specifically to provide the high-profile online banking environment with deep security coverage to protect end users from malware, phishing attacks, and automated transactions. Fewer compromised accounts translates directly into fewer asset losses. 7

The most agile organizations will be able to deploy a suite of security services to maximize their security posture. The Web Fraud Protection solution delivers security from a strategic point of control in the network, which is key to helping organizations easily deploy it with other solutions in their current architecture. Additionally, the F5 Security Operations Center ensures that organizations receive the best, most current threat intelligence available. Working together, these services give organizations a full defense to keep their business, their brand, and their users secure from the threat of fraud. F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com F5 Networks, Inc. Corporate Headquarters info@f5.com F5 Networks Asia-Pacific apacinfo@f5.com F5 Networks Ltd. Europe/Middle-East/Africa emeainfo@f5.com F5 Networks Japan K.K. f5j-info@f5.com Solutions for an application world. 2014 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. 02/14 WP-SEC-16403-web-fraud-protection