Workshop on online fraud and electronic payment frauds

Slides:



Advertisements
Similar presentations
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Advertisements

Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, /29/2014.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
1 Treasury Management Services Superior service. Working capital expertise. Innovative solutions. Client Implementation.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Phishing – Read Behind The Lines Veljko Pejović
Chapter 4 Billing Schemes.
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
The evolution of eCrime and the remote banking channels Presentation to the RHUL MSc Information Security Summer School 9 September 2013 Dom Lucas.
Chapter 4 Billing Schemes.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
U.S. Department of Homeland Security United States Secret Service MCPF PRESENTATION Evolving Financial CrimeTrends & The Gateway ECTF ASAIC Doug Roberts.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
2016 FRAUD.
Funds Remittance Checks – Company or Bank – Bill of Exchange Clean Documentary Sight Term/Time/Usance – Draft Bankers Draft Electronic Funds Transfer (Wire.
Protecting Your Assets By Preventing Identity Theft
Cyber Crime in the Real Estate Industry
Securing Information Systems
Presented by: Assistant Superintendent Debra Thompson
Fraud Awareness: Not For Profit Organisations
Correspondent Banking (1)
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Organised Crime in New Zealand
Gift Card Risk Mitigation – Presentation A
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Bank ReBIT - Operational Excellence Webinar Series (DMARC)
IT Security  .
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
Own Your Identity.
Phishing is a form of social engineering that attempts to steal sensitive information.
Information Security Session October 24, 2005
Cyber Issues Facing Medical Practice Managers
Use of Biometric Technology in Payments to avoid Frauds
smartmail & smartportal: Introducing Two-Factor Authentication
Own Your Identity.
Everything old is new again
Don’t Become a Statistic: Cybersecurity Best Practices for Treasurers
( Compromise).
Anatomy of a Large Scale Attack
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
Business Compromise and Cyber Threat
Policies and Procedures to Protect you, your Office and your Data
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Spear Phishing Awareness
Indiana Department of Insurance Wire Fraud Prevention
Cybersecurity Simplified: Phishing
Presentation transcript:

Workshop on online fraud and electronic payment frauds Bucharest, 12-14 November 2018 Social engineering, BEC/CEO fraud : a challenge for investigators and prosecutors www.coe.int/cybercrime

Agenda Overview Evolution of BEC Versions of BEC & Money Laundering Trends Investigative Avenues Private Sector Vulnerabilities Partnerships and prevention www.coe.int/cybercrime

BEC Statistics Oct 2013 – May 2016 Global Victims Reach 22,143 and $3,086,250,090 Loss Exposure! Oct 2013 – Dec 2016 Global Victims Increase to 40,203! Loss Exposure Bounds to $5,302,890,448! 72% Increase in 6 Months! More than 131 countries have recently been impacted by BEC!

CEO Impersonation www.coe.int/cybercrime

Security Breach Scams www.coe.int/cybercrime

Supplier Fraud www.coe.int/cybercrime

Other types of BEC VERSION 1: REAL ESTATE TRANSACTIONS Email Intrusion Actor monitors progress of real estate transactions and changes the payment type (check to wire) or bank account details VERSION 2: UNIVERSITIES WITH CONSTRUCTION CONTRACTS Spoofed Domains Actor impersonates construction firm and requests payment be routed to a new account VERSION 3: AIRLINES Actor requests funds be sent to U.S. bank accounts Actor using address of a legitimate U.S. company in wire transfers Recently occurred in Canada and China!

Versions of BEC VERSION 4: MICROSOFT OFFFICE 365 CUSTOMERS Account Payable Manager of the company targeted with spear phishing email Redirected to harvesting site to reset Office 365 password Actor sent emails from Accounts Payable Manager (victim) to partner bank which manages bill payment Instructed funds to be sent to “actor-owned” account

BEC Evolution VICTIM: VICTIM: VICTIM: Companies with Chinese Business Relationships VECTOR: Intrusion (Man-in-the-Middle) FUNDS: Hong Kong & Mainland China Bank Accounts VICTIM: Companies from US (All Sectors) VECTOR: Spoofed Domain Less Intrusion FUNDS: Global Bank Accounts VICTIM: Foreign Companies (All Sectors) VECTOR: Spoofed Domain FUNDS: Global Bank Accounts

Fraud Hints Direct contact by a senior official you are normally not in contact with Unusual request in contradiction with internal procedures Request for absolute confidentiality Use of particularly alarming tone by an IT/security officer Sudden change in contact/payment details of an international supplier Change occurring shortly after a significant order was passed or shortly before a deadline for payment

Prevention and Detection www.coe.int/cybercrime

How do fraudsters conceal their identity? Use forged documents with legitimate company logo/signatures obtained online •Use copycat e-mail addresses •Disguise the origin of the call through applications faking the caller’s identity (display the number of the service/individual they impersonate) •Use VOIP and proxy servers to lower the risks of detection •Use the services of illicit call centres based outside the EU www.coe.int/cybercrime

BEC Trends – Money Laundering “Human Infrastructure” is key Domestic U.S. Accounts Multiple “hops” before leaving US Romance Scam Mules Increased use with domestic “hops” Prepaid Cards Some can accept prepaid cards and wire transfers Cashiers Check Actor contacted bank client team and requested funds in the form of a cashier’s check “Human Infrastructure” is key

Digital Money

Bitcoin ATM by continent Future of BEC Money Laundering Global Partners Reporting Bitcoin! 3,989 Bitcoin ATMs 72 Countries Bitcoin ATM by continent

Investigative Avenues Global & Domestic Money Recovery Processes X-Sender / Reply-To Email Accounts Summer Surge Malware & Keyloggers Spoofed Domains Phishing Emails/Domains Forums/Social Media Research – BEC Manuals Email Lists for Purchase Private Sector Insight

Investigative Avenues .

Malware&Keyloggers Predator Pain Redpill Hawkeye Limitless Olympic Vision

Spoofed Domains

Spoofed Domains Domain Categories Self-Named Fake Organizations Impersonating Legitimate Organizations Targeting of Domains Legal Process to Tucows Replicate with BlueHost and 1&1 Data Usage Registrant information for fraudulent accounts Domains and IPs for DMARC and other email authentication tools

Compromised accounts www.coe.int/cybercrime

Case study – BEC Case and money laundering for 2 mil. Euro Funds redirected in China and Japan IP Adresses USA Source of the funds Destination of the funds www.coe.int/cybercrime

Ionut STOICA Senior Project Officer Workshop on online fraud and electronic payment frauds Bucharest, 12-14 November 2018 Va multumesc! Ionut STOICA Senior Project Officer Cybercrime Programme Office (C-PROC) Council of Europe ionut.stoica@coe.int www.coe.int/cybercrime