PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY

Similar documents
PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment

FFIEC CONSUMER GUIDANCE

Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

WHITE PAPER Moving Beyond the FFIEC Guidelines

TELECOM FRAUD CALL SCENARIOS

Fraud Threat Intelligence

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Modern two-factor authentication: Easy. Affordable. Secure.

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers

PBX Fraud Educational Information for PBX Customers

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Guide to Evaluating Multi-Factor Authentication Solutions

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

Evaluating DMARC Effectiveness for the Financial Services Industry

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

OIG Fraud Alert Phishing

WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

Biometrics in Physical Access Control Issues, Status and Trends White Paper

The SIEM Evaluator s Guide

Tips for Banking Online Safely

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Information Security Field Guide to Identifying Phishing and Scams

Best Practices: Reducing the Risks of Corporate Account Takeovers

CCT Telecomm offers the following tips to ensure your protection from phone fraud at your home or business:

Internet threats: steps to security for your small business

Supplement to Authentication in an Internet Banking Environment

The Cloud App Visibility Blindspot

A strategic approach to fraud

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

WHITE PAPER Usher Mobile Identity Platform

Voice Authentication On-Demand: Your Voice as Your Key

WHITE PAPER Fighting Mobile Fraud

Strong Authentication for Secure VPN Access

Integrating MSS, SEP and NGFW to catch targeted APTs

I know what is identity theft but how do I know if mine has been stolen?

SOLUTION BRIEF PAYMENT SECURITY. How do I Balance Robust Security with a Frictionless Online Shopping Experience for Cardholders?

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

CA Arcot RiskFort. Overview. Benefits

Fraud Prevention Tips

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Securing Office 365 with Symantec

Protect Your Business and Customers from Online Fraud

SIP and VoIP 1 / 44. SIP and VoIP

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

WHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation

Protecting Online Gaming and e-commerce Companies from Fraud

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

Table of Contents. Page 2/13

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

End-user Security Analytics Strengthens Protection with ArcSight

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

How To Manage Security On A Networked Computer System

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Network and Host-based Vulnerability Assessment

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Stay ahead of insiderthreats with predictive,intelligent security

Dissecting Wire Fraud: How it Happens, and How to Prevent It WHITE PAPER

Top 5 Reasons to Choose User-Friendly Strong Authentication

Learn to protect yourself from Identity Theft. First National Bank can help.

IDENTITY THEFT: MINIMIZING YOUR RISK

X X X X X. Platinum Edition. Unlimited Extensions. Unlimited Auto Attendants. Unlimited Voic Boxes. ACD Features

NCUA LETTER TO CREDIT UNIONS

The Sophos Security Heartbeat:

Closing the Biggest Security Hole in Web Application Delivery

Transcription:

PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY

TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities Financial Institution Fraud Attacks Defenses Pindrop Security Technology... The Pindrop Ecosystem Accuracy 4 4 5 7 8 9 10 Pindrop Solutions... 10 Fraud Detection System Phone Reputation Service Phone Fraud Assessment Call Forward Protection About Pindrop Security... 11 11 12 13 14 PINDROPSECURITY.COM 404.721.3767

EXECUTIVE SUMMARY Phone fraud attacks increased by 30% in the first half of 2012. It is a growing problem for financial institutions due to its ease, low risk and low cost. It comes in many forms with attacks in the call center, in automated account management systems, and outbound verification systems. It costs financial institutions in terms of losses, call center time and expense and incident response. It also erodes trust with customers. This paper will explore the costs and issues around phone fraud and then explore a solution that can alleviate this issue for institutions. 3 PINDROPSECURITY.COM 404.721.3767

THE EVOLUTION OF BANK THEFT There are three ways to rob a bank and using a phone has become the most popular way. Robbing a bank in person is too hard you ll face guards, vaults, silent alarms, dye packs and other ingenious ways of making you regret your decision. Statistics show that you re likely to fail and to get caught. Hacking the web site is tough too - you ll run up against concentrated defenses and the best defenders the enterprise has available. Both areas are well resourced and highly protected. Which brings us to the third way to rob a bank - using the phone. Phone attacks against financial institutions (and anyone else with a call center or toll free number) are increasing rapidly. In just the first six months of 2012, phone-based fraud calls were up nearly 30% 1. Why? As opposed to physically robbing a bank or hacking into the network, the phone channel is quite vulnerable, with little defense in place. Phone Channel Vulnerabilities The phone system presents a perfect storm of characteristics, both new and old, that invite this malicious abuse. Caller ID is broken Caller ID (CID) and Automatic Number Identification (ANI), two systems designed to provide information on callers, actually have no security built-in or available. They originally were designed to be used internally by the phone companies no security needed. The result is that spoofing Caller ID data is very easy one smartphone app, Caller ID Faker, has over 1,000,000 downloads. The app includes voice-masking features. One person s practical joke app is another person s fraud tool. It s cheap and easy With the rapid spread in VoIP networks beginning in the 1990 s, the world of telecommunications changed significantly. The cost of long distance calls fell drastically, making it practical to call the US from anywhere in the world cheaply. VoIP allowed wide use of PC applications to perform a wide range of activities, many beyond the scope or intent of the phone network. This included automated dialing and easy-to-use spoofing technology. 1 Pindrop Security, State of Phone Fraud Report 4 PINDROPSECURITY.COM 404.721.3767

No metadata Every phone call traverses multiple networks, no two of which is exactly alike. In fact, if you use your cell to call your own landline while standing next to it, you re using at least two networks. Since phone networks are also very bad at sharing information with each other about the call, the only data to get through every network the call traverses is the actual call audio. There is no data shared that provides caller verification or origination. And even call audio suffers degradation we ve all experienced poor quality calls. The recipient of a phone call cannot count on any information about the caller coming through intact. Financial Institution Fraud Attacks Total bank fraud losses were around $4 billion last year and it s estimated that from 30% to 50% of fraud incidents is initiated with a phone call 1. Phone fraud is also frequently combined with online and in-person fraud, particularly to gather information or escalate privilege prior to the actual fund transfer attack. The main problem areas for financial institutions are: Call centers Talking to a call center representative presents a fraudster with several advantages. First, fraudsters are typically professional social engineers they are experts at manipulating people. Second, call center representatives rightfully prioritize being helpful they want the customer to get the password right or successfully complete the transaction. Third, despite the overall fraud call volume being high, the average call center representative will only be dealing with a fraudster once in approximately every 2000 calls. Identifying and handling a fraudster is not a core competency for that rep. Once on the phone, the fraudster may attempt a direct attack, stealing funds via a wire transfer. They may request a rush or replacement card and then max out the card with purchases. If they don t have all the credentials or access they need, they may opt to take more innocuous steps in order to set up a future attack. A change to the address, phone number or email allows them to transfer the point of contact to an asset they own. They can claim to be a customer who will be traveling oversees (known as travel strategy modification ) resulting in lower fraud alerting levels at the bank. 2 Identity Theft Tops FTC Complaints in 2011 5 PINDROPSECURITY.COM 404.721.3767

The only defense against these fraudsters is the asking of a few personal questions (known as knowledge-based authentication). If a fraudster can provide that information, the ability to move funds is practically unrestricted. Automated phone systems Fraudsters can also steal from you and your customers without talking to a representative. Automated systems or IVR s (interactive voice response) systems allow a wide range of account activities that allow a fraudster to make substantial inroads to taking over an account. As with a live rep, getting an account address, email or phone number changed can allow a fraudster to order a replacement credit or debit card and then clean funds out of an account. And they only need access to the account for a few hours prior to detection to be successful. In addition, fraudsters will check account balances on accounts to identify high value targets. Even high dollar transactions can be completed using automated systems and the website but with an additional out-of-band step for verification. Typically, this is a phone call to the number registered to the account that asks for a code provided by the website to be entered. The weakness in this system is if the registered phone number has been forwarded or otherwise redirected to a different number. New accounts Many fraud schemes require a legitimate account at the targeted bank. These include both phone-based and online attacks. When accounts are set up, the fraudster will likely use a real phone number as it may be required to verify the account owner. These accounts are lurking in banks now. They took time and money to set up and they are ready to be used to support fraud schemes. After-action incident response and forensics When fraud has occurred or is suspected, fraud teams go into action. Most phone fraud investigations, whether formal or informal, start by looking up the phone number in a search engine, number lookup site or official records database. None of these sources is particularly helpful - the information available is inconsistent and anecdotal. From there, analysts may need to call the number or contact third parties such as telco s. Again, results tend to be unsatisfying and the process is time-consuming, expensive and frustrating. 6 PINDROPSECURITY.COM 404.721.3767

Telecommunication costs A novel attack that is impacting financial institutions and other industries that combine toll-free numbers with extensive automation of call systems, traffic pumping costs banks money for nonbusiness calls. Specifically, calls are made to a banks automated, toll-free line and then continued through maximization of pauses and automatic transfers, to use as much time as possible before a live agent finally realizes the call is bogus and terminates. The local exchange carrier that originated the call is entitled to intercarrier transfer fees from the bank s telecommunication provider, which, in turn, is charging the bank. Typically, the local exchange carrier has commissioned the attack. There are a many points of vulnerability. What can be done to protect them? Defenses We re all familiar with the leading deterrent to phone fraud - companies grill customers with questions. Known as knowledge-based authentication (KBA), examples include asking for your mother s maiden name, high school mascot, pet s name. It s not very sophisticated, it s very expensive (in excess of $10 billion a year) and it s not very effective. Not only are many of the answers easy to guess or bluff but call center reps who are focused first on customer service actively help callers answer the questions correctly. A variety of technologies have been developed to address this problem. Analyzing the caller s voice, which is known as voice biometrics, focuses on authenticating callers to detect known bad actors and to positively identify bank customers. This is useful for authentication of customers but not for detecting fraud. Call verification tries to confirm if the caller is who they claim to be using call signaling information. This method is highly inconsistent, depending heavily on the originating callers provider network and device type. While each of these methods has value, as stand-alone solutions their value doesn t justify the cost of deployment. Combined, they start to add up to an answer to the problem. 7 PINDROPSECURITY.COM 404.721.3767

A Viable Solution In order to justify the time and cost of deployment, a solution would need to be able to do the following: Identify new attackers before they can do damage. Identify attackers in all parts of the phone infrastructure: live calls, recorded calls, automated answering systems and outbound calling systems. Use both phone number or call audio to identify and quantify fraud risk. PINDROP SECURITY TECHNOLOGY At Pindrop Security, our mission is to restore trust in the phone channel by providing a set of solutions that deliver the protections we ve outlined above. To do this, we ve taken a very different approach to the problem we analyze the audio content of the call itself. Pindrop analyzes call audio with our unique phoneprinting technology. It is able to isolate and analyze over 140 characteristics of each call and, from this, determine the caller s geography and the calling device type and therefore identify spoofing. At a Top 5 bank customer, this analysis alone revealed over 80% of fraud calls immediately upon receipt of the first call. In addition, Pindrop Security s technology creates a unique fingerprint tied to the call. This fingerprint will identify a fraudster (or legitimate customer) regardless if the voice is manipulated, the number is changed or spoofed, or even if the caller is changed (as in a fraud ring or fraud call center). No other solution can do this. 8 PINDROPSECURITY.COM 404.721.3767

PHONE FINGERPRINTING CALL AUDIO 147 audio features in each fingerprint LOSS Packet loss Robotization Dropped frames SPECTRUM Quantization Frequency taggers Codec artifacts NOISE Clarity Correlation Signal-to-noise ratio 86 PHONE TYPE GEO-LOCATION RISK SCORE The Pindrop Ecosystem The audio fingerprint is the key to Pindrop Security s solutions. By analyzing less than 20 seconds of audio, we can match the fingerprint and identify fraudsters. Or, if all you have is a phone number, we can identify if that number has ever been attached to a suspicious fingerprint. We can tell you if a number or caller has ever spoofed a number, if they are calling from a fraud-prone country, region or county and if their telecommunication provider is considered risky. All of this is presented within an overall risk score. Phone honeypots (phoneypots) collect fraud numbers from robo-dialers and automated calling systems. Email spam traps gather phone numbers used in fraud emails. Fraud reconnaissance aggregates data from hundreds of complaint sites, online communities and web forums on suspicious numbers. 9 PINDROPSECURITY.COM 404.721.3767

INPUTS AUTOMATED ANALYSIS PRODUCTS ENTERPRISE TRAFFIC PORTAL Reputation lookup Call Centers Recorded Calls Web-based access PindropSecurity.com Anti-Fraud Teams CONSUMERS Complaints Web Phones ATTACK DATA Active Recon Reputation Analysis Acoustical Fingerprinting ENTERPRISE API Reputation lookup Application integration FRAUD DETECTION Live call analysis Recorded call analysis IVR call analysis IDENTITY VERIFICATION Authentication Phoneypots Spam/Phishing Social Networks MOBILE PROTECTION Smartphone apps Caller ID integration Accuracy Pindrop s phoneprint technology is highly accurate. It is able to determine the location of the caller and the type of device being used to originate the call (VoIP, Cell, Land) even the network type for VoIP calls (Skype, etc.) with over 90% accuracy. While this information alone is enough to determine fraud, we go further by then matching the fingerprint to our database of fraud rings and repeat fraudsters. Typically, a fraudster will have a large number of phone numbers and will have targeted many institutions. This information is made available as well, to assist fraud and incident response teams. Our fingerprint matching is over 99% accurate. PINDROP SOLUTIONS Pindrop offers several solutions; each designed to address specific fraud risk areas within financial institutions. Together, they provide a complimentary and complete solution for financial institution phone fraud. 10 PINDROPSECURITY.COM 404.721.3767

Fraud Detection System Pindrop Security s Fraud Detection System (FDS) is at the core of Pindrop s technology. FDS analyzes live or recorded call audio to identify call spoofing and other indicators of fraud by providing a highly accurate call risk score. It verifies location and call type and matches it against Caller ID or ANI data to identify spoofing. It also creates a unique fingerprint for the caller and compares the fingerprint to our database of known fraud rings and repeat fraudsters regardless of the real or spoofed number they are using (VoIP, Cell, Land) even the network type for VoIP calls (Skype, etc.) with over 90% accuracy. What Does FDS Provide? Call analysis technology that can determine the actual location and device type used by a caller and compare it to Caller ID or ANI information to determine spoofing and fraud. Unique call fingerprint that allows you to match the caller to other fraud attempts and examine their fraud history. Non-intrusive validation of customers through transparent location and device type verification. How Do Financial Institutions Use FDS? FDS is deployed widely across financial institutions to address a variety of problems. It is used by call centers, fraud investigators, incident response teams and automated systems, to quickly evaluate callers as part of their anti-fraud and transaction approval processes. FDS finds fraudsters already active in your account-base, as well as both known and unknown fraudsters at first contact blocking them before they ever consume your time or resources, let alone steal from you. FDS also allows financial institutions to reduce the burden of proving identity on their customers while improving their prevention of fraud through identification of deception techniques such as call spoofing. Phone Reputation Service For situations in which call audio is not available, we offer Pindrop Security s Phone Reputation Service (PRS), the world s largest and most accurate database of fraudulent phone numbers. 11 PINDROPSECURITY.COM 404.721.3767

PRS assigns a unique risk score to every number and provides detailed information, including geography, phone type, and, if a fraud number, specific institutions targeted, attack frequency and other numbers used by the attacking entity. The PRS is either accessed via a web-based interface or directly integrated into your application via an API. PRS displays fraud activities and trends, provides actionable intelligence on suspect numbers, and allows the creation of fraud alerts. What Does PRS Provide? Access to the largest, most comprehensive phone number database with geographic locations, network providers, phone types and any fraud activity history. Aggregated intelligence from our phone honeypots ( phoneypots ), email spam traps and complaint collectors as well as intelligence from our customer base. Configurable alerting on numbers that are currently targeting enterprises or their customers. How Do Financial Institutions Use PRS? PRS serves two major groups within banks. First, PRS is used by fraud investigation and incident response teams. It allows financial institutions to proactively identify numbers that are targeting the enterprise or customers of the enterprise and to investigate a number or create a report based on a set of numbers. The second set of groups to use PRS are new account and online banking teams. They integrate PRS into their applications to do a quick and easy reputation lookup upon new account creation, account phone number changes and for enrollment in phone-based out-of- band verification systems. Phone Fraud Assessment The Phone Fraud Assessment is a service wherein Pindrop will evaluate some or all of your existing recorded calls to identify fraudsters already present in your call centers or account base. It also provides an overall assessment of your current fraud volume and identifies potentially undiscovered fraud schemes such as traffic pumping which may be increasing cost to your call center. The assessment takes approximately two weeks to complete. 12 PINDROPSECURITY.COM 404.721.3767

What does the Phone Fraud Assessment Service provide? Determine and quantify the volume of suspicious call activity targeted at your institution. Provide visibility into trends including call types and actual call origin. Identify fraudulent callers. Call Forward Protection Two-factor authentication is widely deployed across financial institutions to verify customers and prevent identity theft and fraud. One of the most popular methods is to use an outbound phone call to provide out-of-band verification of the customer. This can be done automatically, which is easier for customers and cheaper for banks. Unfortunately, the integrity of these systems is at risk due to fraudster attacks that cause the phone to be redirected, typically through call forwarding. Pindrop Security s Call Forward Protection provides the security needed to use phonebased out-of-band verification with confidence. Pindrop can integrate with your existing out-of-band verification solution or can stand alone to provide a complete solution. Pindrop will detect if the call has been forwarded, redirected or otherwise hijacked. And Pindrop is the only solution available that will detect deception at the time of enrollment, allowing you to monitor or shut down the attacker well before the fraud occurs. Pindrop Security Call Forward Protection puts the trust back in the phone. How Do Financial Institutions Use Call Forward Protection? Automated transactions are easy and inexpensive for banks to offer and improves the customer s experience. Vulnerability to call forward attacks during the out-of-band verification step has been the primary downside to their deployment. Call Forward Protection allows institutions to determine in real-time if the call has been forwarded and delay or stop the transaction by authenticating legitimate, enrolled customers in an easy, automated fashion. 13 PINDROPSECURITY.COM 404.721.3767

FRAUD IVR CSR RECORDED CALL STORE FULL PINDROP SECURITY SOLUTION Phone number lookup Audio checked during CSR call Audio checked after call stared Detect Fraud at IVR Detect Fraud during active call Detect Fraud after call completed Phone Reputation System Fraud Detection System Fraud Detection System ABOUT PINDROP SECURITY Pindrop Security, headquartered in Atlanta, Ga., is a privately-held company that provides enterprise solutions that help prevent phone-based fraud. Its breakthrough phoneprinting technology can identify phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as authenticating legitimate callers. We have helped enterprises eliminate financial losses and reduce operational costs on their phone channel. Pindrop s customers include two of the top five banks and one of the leading online brokerages. Recently named a Gartner Cool Vendor in Enterprise Unified Communications and Network Services for 2012, and recognized with an SC Magazine Excellence Award, Pindrop s solutions help companies feel more confident in the security of phone-based financial transactions. pindropsecurity.com 14 PINDROPSECURITY.COM 404.721.3767