Over the last year, there have been countless debates over the hows and whys of the massive retail breaches the world has witnessed—including those affecting major chains such as Target, Neiman Marcus and P.F. Chang’s, just to name a few. Undoubtedly, the 2014 Faces of Fraud Survey results were deeply impacted by these incidents as banking and security leaders are just starting to deal with the consequences. Read more
On Monday, the US-CERT (United States Computer Emergency Readiness Team) issued an updated advisory, warning that the ‘Backoff’ Point-of-Sale malware continues to evolve. And just today, UPS confirmed that it is the newest likely victim of Backoff. US-CERT has now seen five variants of ‘Backoff’, each with notable modifications, and the malware has been found in at least three separate forensic investigations. They note that the variants are largely undetected by AV vendors, and recommend that in lieu of such protection, organizations should monitor for ‘indicators of compromise’ (IOCs) to determine if they have been infected. Read more
The latest in a recent string of lawsuits between businesses and their commercial banks is the case of Tennnessee Electric Company vs. TriSummit Bank. In the complaint, Tennessee Electric alleges in six counts, from gross negligence to fraud, that TriSummit didn’t honor its agreement to protect the security of ACH initiated payroll transactions. Read more
The Snifula family of malware has been making a name for itself recently in Japan, targeting multi-national and smaller regional financial institutions alike. The effectiveness of this kind of malware is putting banks at risk in other parts of the world too, including North and South America. Our research indicates that most financial institutions in the Western hemisphere have already been attacked by some variant of Snifula.
Last week, reports flooded security forums and publications highlighting an increase in the rate of a fraud attack named Operation Emmental.
The threat type was first noticed by security companies approximately 5 months ago, but the recent rise in successful attacks against mobile banking users has been alarming and underlined the effectiveness of the attack. The fact that the majority of the successful attacks were aimed at Swiss banks led to the name of Operation Emmental, referring to the Swiss cheese containing holes, suggesting imperfections in security.
Over the last two years, we have seen a tremendous increase in mobile malware, which grew 167 percent in the past year, according to the June 2014 McAfee Labs Threat Report.
Here are two major reasons why mobile malware is increasingly the preferred method of attack for fraudsters:
1. As EMV technology is deployed in the US, the amount of fraud attributed to counterfeit cards will decrease.
2. Telecommunications providers will no longer allow premium text message services to bill customers, lowering the volume of fraud via premium SMS messages.
Cybersecurity risks remain the same for all financial institutions, regardless of size or resources. The FFIEC recently announced that examiners will be conducting “state of cybersecurity assessments” this summer, specifically targeting community banks. Examiners want to ensure that cybersecurity is engrained into the culture of all financial institutions, and that management is well aware of the risks. This webinar will provide cutting-edge insights into the latest fraud trends, and teach you how to strengthen your fraud program in a way that not only meets, but surpasses compliance.
What You Will Learn:
- Current fraud trends impacting community banks and credit unions, citing specific examples.
- Beyond financial loss, what are hard and soft costs incurred after a fraud incident?
- Available anti-fraud technologies to combat fraud and satisfy FFIEC compliance.
At Easy Solutions, we spend a lot of time anticipating fraud trends so that we can develop solutions quickly and ensure that our customers are always ahead of the game when it comes to fraud protection. This week, we added and enhanced several features to our anomaly detection solution, DetectTA, which now has the ability to monitor a wider range of transactions and provides increased flexibility in crafting rules and alerts. DetectTA’s extended capabilities result in an anomaly detection solution that’s even easier to use and much more powerful.
I write this post with mixed feelings about the adoption and use of crypto and digital currencies. For those who might not know, cryptocurrencies like Bitcoin, Dogecoin and others offer digital online wallets of virtual money. Initially envisioned as irreversible ‘peer-to-peer’ trustless exchanges, these currencies claim to offer the possibility of anonymous transactions between strangers, without the need for a historically trusted intermediary such as a financial institution or payment processor to back them up (and charge a fee for the privilege). Instead, these decentralized currencies rely on complex computer algorithms and a public ledger of all transactions (without identifying information about the people performing them) to keep the system honest.
One of the things that we do at Easy Solutions, to help protect banks from fraud, is perform passive monitoring on paste sites, social media sites, and the black market. We see all kinds of crazy things and we wanted to share this example. In the case below, we found what appeared to be source code for one of our client’s mobile banking apps. We pay attention to this kind of thing because evidence of publication of source code can lead directly to increased attacks-especially as they relate to mobile apps.