Working with the banking sector to prevent and detect criminal money flows on the Internet Dave O’Reilly, Chief Technologist, FTR Solutions Co-funded by.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Unit 28- Website Development Assignment 1- THEORY P3
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Global Treasury Services Latin America Operating Risk.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
IT Security/Online Loss Prevention Bill Finnerty Assistant Director of Information Technology Cumberland County.
7 Information Security.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Get Safe Online Expert advice for everyone In association with.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
Cybercrime What is it, what does it cost, & how is it regulated?
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
FFIEC Cyber Security Assessment Tool
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Securing Information Systems
3.6 Fundamentals of cyber security
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Public Facilities and Cyber Security
Securing Information Systems
Partnering to Minimize the Impact of Data Compromises
8 Building Blocks of National Cyber Strategies
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Threat landscape financial sector
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Chapter 9 E-Commerce Security and Fraud Protection
Cybercrime and Canadian Businesses
Business Compromise and Cyber Threat
Information Security – Sep 18
Internet Safety By: Ayana Shiggs.
Internet Safety By: Ayana Shiggs.
Presentation transcript:

Working with the banking sector to prevent and detect criminal money flows on the Internet Dave O’Reilly, Chief Technologist, FTR Solutions Co-funded by the Justice Programme of the European Union

Introduction The mission of FTR Solutions is to increase the security of financial services. Established by Dave O’Reilly in Anti-fraud/security technology evaluation and selection. Online banking (authentication/authorisation solutions), mobile banking solutions, ATMs (skimming, card trapping, malware solutions). Also expertise in IT/information security and data protection.

WORKING WITH FINANCIAL INSTITUTIONS

Working with Financial Institutions Who? –Different public institutions will engage with financial institutions in different ways. Some examples: Crime prevention or investigation Intelligence gathering Compliance reporting or investigation “Working with financial institutions to prevent and detect criminal money flows on the Internet”

Working with Financial Institutions Who? –Different financial institutions will require different types of engagement. Some examples: Banks Card schemes Payment service providers Foreign financial institutions “Working with financial institutions to prevent and detect criminal money flows on the Internet”

Working with Financial Institutions “Working with financial institutions to prevent and detect criminal money flows on the Internet” AwarenessPreventionDetectionResponse Public-private information sharing and analysis. Awareness campaigns for financial institutions. Public-public, public-private and private- private cooperation and information exchange Joint public awareness campaigns. Regulatory and supervisory measures. Appropriate legal framework. Reporting requirements. Analysis for criminal money on the Internet red flags. Specialised high-tech crime units. Appropriate legal framework. Specialised high-tech crime units. Public-public, public-private and private- private response coordination.

UNDERSTANDING THE PROBLEM: CRIMINAL MONEY FLOWS ON THE INTERNET

Criminal Money Tools and Infrastructure Predicate Offences Laundering Typologies

Example Predicate Offences Identity Theft Payment Card Fraud Online Banking Attacks, Misuse and Account Take- Over Confidence Fraud, Including Advance- Fee Fraud and Auction Fraud Investment Fraud, Including Stock Market Manipulation Pyramid and Other Multi-Level Marketing Schemes Child Abuse Materials Sale of Counterfeit Pharmaceuticals Violation of Copyrights and Related Rights Online Extortion

Laundering Typologies Money Remittance Providers Wire Transfers Bank Account Take- Over Cash Withdrawals Internet Payment Services Money MulesInternational Transfers Digital/Electronic Currency Purchase Through the Internet Shell CompaniesPrepaid Cards Online Gaming and Online Trading Platforms Third Party Funding (including straw men and nominees) Exploitation of non- face-to-face nature of new payment method (NPM) accounts Complicit NPM Providers or Their Employees

Tools and Infrastructure Identity Theft Card Fraud Banking Attacks ConfidenceFraud InvestmentFraud MLM Schemes Child Abuse CounterfeitPharmaceuticals CopyrightInfringement OnlineExtortion Botnets ✔✔✔✔✔✔✔ Malware ✔✔✔✔ Spam ✔✔✔✔ Proxies ✔✔✔✔✔✔✔✔✔✔ Bulletproof Hosting ✔✔✔✔✔✔ Undergroun d Economy ✔✔✔✔ Other ✔✔✔✔✔✔✔✔✔✔

CASE STUDY: BANKING MALWARE

What is Malware? Malware = “Malicious Software” Many types of malware: viruses, worms, trojans, spyware, adware, rootkits, ransomware. In 2015 over 140 million new types of malware identified, with almost 500 million different types of malware identified in total. –Source: In 2015 Kaspersky alone registered almost 2 million attempted malware infections that aimed to steal money via online access to bank accounts. –Source: security-bulletin-2015-overall-statistics-for-2015/

What is Malware? Once infected, PCs can be used by fraudsters to perform a variety of tasks. For example: –Send spam –Attack other computers –Monitor user activity –Steal credentials –Install further malware –Pop up ads –Hold customer files for ransom

Banking Malware The category of malware specifically designed to target customer’s online banking activity. Principally used to steal customer’s money. However, theft of the customer’s credentials may also allow of transfer funds through the customer’s account.

Customer PC Online Bank C&C Server Mule Criminal How does it work? - Example

Criminal Money Flows Banking malware (and the corresponding account takeover) represents a challenge by facilitating both a predicate offence (theft of customer funds) and a laundering typology (layering transactions through compromised accounts). AwarenessPreventionDetectionResponse

Awareness FI Awareness –Information and intelligence sharing Customer Awareness –Customer education campaigns Public Sector Awareness –Involvement in information sharing initiatives –Public-private cooperation

Prevention Customer endpoint protection –Free anti-virus or other software Online banking technical controls –2 factor authentication Transaction controls –Do not allow setting up beneficiaries, particularly international beneficiaries, online

Detection Technical controls to detect deviations in customer transaction patterns. For example: –Logins from unusual locations –Unusual transaction patterns –Setting up of unusual beneficiaries

Response Public-private cooperation to target criminal infrastructure. –Robust command-and-control (C&C) infrastructure –Often has a limited impact on criminal operations. International investigations

Infected PCs “Front end” C&C Server “Back end” Web Server Database Server DNS Server Firewall Infrastructure

CASE STUDY: PAYMENT CARD FRAUD

Payment Card Fraud Any one of a number of techniques can be used to compromise a customer’s card details; ATM skimming and POS malware being two examples. Captured card details are then frequently traded or sold online using specific websites (carder forums, underground economy).

Criminal Money Flows How fraudsters monetise captured card data relates directly to multiple online laundering typologies. Specifically: –Purchases through the Internet –Cash withdrawals –Prepaid cards –Online gaming and online trading platforms –Internet payment services AwarenessPreventionDetectionResponse

Awareness FI Awareness –Information and intelligence sharing –Understanding of the criminal use of compromised card details –Understand the relationship between fraud and money laundering Customer Awareness –Customer education campaigns –In particular “cover your PIN” messaging Public Sector Awareness –Involvement in information sharing initiatives –Public-private cooperation

Prevention Anti-fraud countermeasures –Anti-skimming –Anti-card trapping –Anti-malware –PIN shields Appropriate information security measures PCI standards, including PCI DSS

Detection Technical controls to detect deviations in customer transaction patterns. For example: –Cash withdrawals from unexpected locations –Uncharacteristic purchases –Purchases of goods that are easily resold

Response Public-private cooperation to target criminal infrastructure. –Takedown of criminal websites, carding forums International investigations

CASE STUDY: ATTACK SIMULATION

Responding to Cyber Incidents In 2015, a survey of 1,000 IT Security professionals reported that: –70% of breaches are detected by a third party. –In 46% of cases it took more than four months to detect an incident (and a further three months to mitigate the risk). –73% of respondents believed that their company’s data was vulnerable to being hacked.

Case Study: Attack Simulation In 2010, a major cybercrime incident was simulated by Irish financial institutions to assess their readiness. The aim was to explore the impact of a major cybercrime incident on each institution but also on the wider banking sector and the Irish economy.

Case Study: Attack Simulation Attendees included all retail financial institutions, industry organisations, law enforcement and prosecutors. Attendees were asked to record their decisions while responding to the incident, which were then analysed and categorised by business function.

Case Study: Attack Simulation

Key Messages The threat of cyber attacks should not be ignored, even if you have not yet suffered from a cyber incident. A multidisciplinary approach is essential to adequately respond to cyber incidents.

Responding to Cyber Incidents Prevention, prevention, prevention: –Employee education –Public education (if applicable) –Security policies/procedures –Strong audit/compliance function –Penetration testing/simulated incidents

Responding to Cyber Incidents Detection and Response: –Investment in capability –Intelligence gathering and analysis –Response infrastructure –Evidence preservation –Simulated incidents/exercises

SUMMARY

Summary A structured approach is needed involving all stakeholders, encompassing awareness, prevention, detection and response. Public sector stakeholders have key roles to play: –Neutral third parties facilitating cooperation and information exchange between competitors –Representing societal interest in reduced levels of financial crime and money laundering –Investigative and prosecutorial expertise, guiding the activities of the private sector actors and leading to increased number of successful prosecutions.

Thank You! Any Questions? Dave O’Reilly Chief Technologist FTR Solutions +353 (87) m