Malware Targets Bank Accounts GAMEOVER!!. GameOver Cyber criminals have found yet another way to steal your hard-earned money: a recent phishing scheme.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

© 2007 First Data Corporation. All Rights Reserved. This document contains unpublished, confidential and proprietary information of First Data Corporation.
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
OVER VIEW OF BANKING FRAUDS
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Malware and ACH/EFT Fraud
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
What is identity theft, and how can you protect yourself from it?
Internet Security Awareness Presenter: Royce Wilkerson.
Threats To A Computer Network
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Electronic Payment By: El Panda. What is an electronic payment? Electronic money (also known as e-currency, e-money, electronic cash, electronic currency,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
Internet Fraud By: Noelle Woodman.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security (Computer crime and dangers associated with computer use). Legislation (Data Protection, Computer Misuse and Copyright Acts). 4 th module
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
CYBER CRIME.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Fraudsters’ Accounts Malek Costa, CPA Head of Group Compliance BLOM Bank sal.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Take the Quiz and find out more!
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
Learn how to protect yourself against common attacks
CYBER SECURITY...
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Digital Citizenship Middle School
Newer Technologies Fraud
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
A Project on CYBER SECURITY
Cybersecurity Awareness
Internet Payment Fraud
Information Security Session October 24, 2005
Staying safe on the internet
Information Security – Sep 18
Internet Safety By: Ayana Shiggs.
Communicating in the IT Industry
Internet Safety By: Ayana Shiggs.
Presentation transcript:

Malware Targets Bank Accounts GAMEOVER!!

GameOver Cyber criminals have found yet another way to steal your hard-earned money: a recent phishing scheme involves spam e- mails—purportedly from the National Automated Clearing House Association (NACHA), the Federal Reserve Bank, or the Federal Deposit Insurance Corporation (FDIC)—that can infect recipients’ computers with malware and allow access to their bank accounts.

New Malware The malware is appropriately called “Gameover” because once it’s on your computer, it can steal usernames and passwords and defeat common methods of user authentication employed by financial institutions. And once the crooks get into your bank account, it’s definitely “game over.”

New Malware Gameover is a newer variant of the Zeus malware, which was created several years ago and specifically targeted banking information.

How the scheme works Typically, you receive an unsolicited from NACHA, the Federal Reserve, or the FDIC telling you that there’s a problem with your bank account or a recent ACH transaction. (ACH stands for Automated Clearing House, a network for a wide variety of financial transactions in the United States).

How the scheme works The sender includes a link in the that will supposedly help you resolve whatever the issue is. Unfortunately, the link goes to a phony website, and once you’re there, you inadvertently download the Gameover malware, which promptly infects your computer and steals your banking information.

How the scheme works After the perpetrators access your account, they conduct what’s called a distributed denial of service, or DDoS, attack using a botnet, which involves multiple computers flooding the financial institution’s server with traffic in an effort to deny legitimate users access to the site—probably in an attempt to deflect attention from what the bad guys are doing.

But that’s not the end of the scheme Recent investigations have shown that some of the funds stolen from bank accounts go towards the purchase of precious stones and expensive watches from high-end jewelry stores. The criminals contact these jewelry stores, tell them what they’d like to buy, and promise they will wire the money the next day.

But that’s not the end of the scheme So the next day, a person involved in the money laundering aspect of the crime— called a “money mule”—comes into the store to pick up the merchandise. After verifying that the money is in the store’s account, the jewelry is turned over to the mule, who then gives the items to the organizers of the scheme or converts them to cash and uses money transfer services to launder the funds.

But that’s not the end of the scheme In many cases, these money mules are willing participants in the criminal scheme. But increasingly, as part of this scheme, we see a rising number of unsuspecting mules hired via “work-at-home” advertisements who end up laundering some of the funds stolen from bank accounts. The criminals e- mail prospective candidates claiming to have seen their résumés on job websites and offer them a job. The hired employees are provided long and seemingly legitimate work contracts and actual websites to log into.

But that’s not the end of the scheme They’re instructed to either open a bank account or use their own bank account in order to receive funds via wire and ACH transactions from numerous banks…and then use money remitting services to send the money overseas.

But that’s not the end of the scheme If you think you’ve been victimized by this type of scheme, contact your financial institution to report it, and file a complaint with the FBI’s Internet Crime Complaint Center.

Resources - Scams & Safety - More Cyber Crimes stories - FBI Cyber Division