CNP, Malware & Physical Attacks; The Future of Fraud in an EMV World.

Slides:



Advertisements
Similar presentations
Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, /29/2014.
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Fraud Trends and Organized White Collar Crime Presentation by Jeff Wahl, CFE.
S CENARIOS FOR THE F UTURE OF THE C ANADIAN P AYMENTS S YSTEM A UTHENTICATION AND I DENTITY W ORKSHOP N OVEMBER 3, 2010 Greg Wolfond.
Credit Card Fraud The Scale of the Problem Michael Moore Regional Security & Fraud Investigation Manager 14 – 17 Nov 2005 Security & Safety – Middle East.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
© 2015 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
© 2012 Presented by: Preparation For EMV Chip Technology Keith Swiat.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Bank Card Protector Policy Frates Insurance & Risk Management By Thomas P Mulligan
Facts, Issues, and Considerations 7 May 2008 Steven Barnett Identity Theft.
Protecting Your Identity. What is IA? Committee on National Security Systems definition: –Measures that protect and defend information and information.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Why Comply with PCI Security Standards?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Payments technology and security
EMV Panel: Part Two (Follow up to Last Year’s Panel) Joseph D. Tinucci, AAP, CTP Kim Smith-Gross, CTP Matt Davies, AAP, CTP, CPP 2015 ROCKY MOUNTAIN SUMMIT.
Seth Houts Data Processing Manager Debit/Credit Card Fraud.
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
Agenda EMV – What Is It? EMV In The UK EMV Is Coming To The US
Protecting Yourself Against Identity Theft By Sierra Monif Next.
7.3.1.G1 According to The federal Trade Commission, Identity theft Affects Approximately 12.6Million People Every year.
Getnationwide.com Let’s Talk about EMV Danielle Rourke.
Identity Theft.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Identity Theft How it happens and how to avoid it.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Midsouth User Group Annual Conference
Stop cybercrime, protect privacy, save world. Chris Monteiro Cybercrime, dark web and internet security researcher Systems administrator Pirate / Digital.
U.S. Department of Homeland Security United States Secret Service MCPF PRESENTATION Evolving Financial CrimeTrends & The Gateway ECTF ASAIC Doug Roberts.
ATM WITH AN EYE. An automated teller machine (ATM) or automatic banking machine (ABM) is a computerised telecommunications device that provides the clients.
PUBLIC Fraud Conference 2016 Protecting and growing your business by tackling fraud Alastair Sheen Senior Card Fraud Strategy Manager EuropeRisk 23 March.
ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.
How to Write Checks and Balance Accounts. Checking Account An account at a bank against which checks can be drawn by the account depositor Check – A document.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Online Decision Process
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
CNP, Malware & Physical Attacks; The Future of Fraud in an EMV World.
Challenge/Response Authentication
EMV.
The Underground Ecosystem Of Credit Card Frauds
CONFERENCE OF WESTERN ATTORNEYS GENERAL
how to prevent them from being successful
Gift Card Risk Mitigation – Presentation A
ATM WITH AN EYE Suresh kumar.
EMV & Parking – 6 Months On
Discover the Boom in Electronic Banking!
Own Your Identity.
POS Fraud.
Cesar Lomeli.
Cyber Trends and Market Update
Own Your Identity.
U. S. Payments Landscape Perspective
Inserted Shimming Device
Threats Facing Industry –
Identity Theft.
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
“Credit score vocabulary”
A Secret Service Perspective on Credit Card Fraud
Presentation transcript:

CNP, Malware & Physical Attacks; The Future of Fraud in an EMV World

How Will EMV Affect Fraud In the U.S.?

Fraud After EMV  Continued Skimming of Chip card for mag stripe data Chip Card will still contain Mag stripe data for foreseeable future  International Cash-outs of stolen Mag Stripe Data Mag stripe data will have to be used at non chip location  ATM Shimming Device Designed to Capture Chip Data and then is converted to mag stripe data  Eventual & Significant Decrease in card present fraud (5+yrs)

The EMV “Ripple Effect” on Fraud  Significant Increases in Card Not Present Fraud Online & telephonic purchases No more pictures of our suspects!!  Significant Increases in ID Theft to Obtain a New Chip Card with Victim’s Info Network Intrusions to obtain PII and password information  Increase in Physical Attacks Card Trapping / Cash Trapping / Gas Attacks & Malware Attacks  Revert to Traditional Financial Institutional Fraud  Counterfeit checks/Account Takeover/Wire Fraud/Cracking Cards/Loan Fraud/Synthetic ID Fraud

How Much as EMV Affected Skimming (ATM Attack Statistics - EAST)  ATM Skimming makes up 36% of all ATM Fraud but accounts for 90% of all ATM fraud loss.  Card Trapping – 3.2 Million in losses  Logical (Malware) attacks – 11.7 Million in losses  Gas Attacks – 21 Million in losses  Skimming – 2.4 Billion in losses

State of ATM Attacks Current (U.S.)   1 st Generation Skimmers (Digital Skimming)   2 nd Generation Skimming (Analogue)   Cash Forking/Trapping   Shoulder Surfing/Chaining Attacks   POS Skimming Current (Europe)   2 nd Generation (Analogue Skimming   3 rd Generation (Stereo Skimming)   Virtual Skimming   Malware Attacks   Cash Forking/Trapping   Gas Attacks   EMV Pos Skimming   ATM Shimming

Current U.S. Trends in Skimming

Card Reader Tapping/Eavesdropping

Tapping

Insert (Throat) Skimmers Photos provided by NCR

Deep Insert Skimmers Captures Mag-Stripe No Storage on Device – wireless Transmitter

Deployment of POS Skimming Evolving Fraud Trends In the U.S.

Walmart Skimmers

Ingenico i3070 tampered and legitimate device EMV POS Skimming (For Mag Stripe Data) | 57

Compromised Chip Terminal

Inserted Shimming Device