U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.

Slides:



Advertisements
Similar presentations
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Advertisements

Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing – Read Behind The Lines Veljko Pejović
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Internet Scams and Money- Making Models. A way You can be scammed online.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
U.S. SECRET SERVICE “Worthy of Trust and Confidence” !!! SCAMS !!! $$$ SCAMMER KNOW WHAT TO LOOK FOR.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
By: Valerie Boscia PHISHING. PHISHING OVERVIEW Pronounced “fishing” To Phish: defined by the Oxford English Dictionary as “To perpetrate a fraud on the.
INTRODUCTION & QUESTIONS.
SCHEMES, SCAMS, AND PLOYS Deconstructing the Hoax 1.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
By Toby Reed.
U.S. Department of Homeland Security United States Secret Service MCPF PRESENTATION Evolving Financial CrimeTrends & The Gateway ECTF ASAIC Doug Roberts.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Managing Money Workshop The National Autistic Society AGM
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
Take the Quiz and find out more!
Cyber Crime in the Real Estate Industry
Done by… Hanoof Al-Khaldi Information Assurance
Chapter 9 Non-Cash Assets.
IRS Impersonation Scams: What You Should Know
Social Engineering Charniece Craven COSC 316.
ISYM 540 Current Topics in Information System Management
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Phishing, what you should know
Chapter 9 Non-Cash Assets.
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Cyber Issues Facing Medical Practice Managers
Personal IT Security Cyber Security – Basic Steps
Electronic Transactions
Shellie Carnal Business Consultant - Texas
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Workshop on online fraud and electronic payment frauds
Business Compromise and Cyber Threat
Premier Employee Program Version 4.0
Donning your Detective Hat: Sniffing Out Payroll Fraud
Presentation transcript:

U.S. Businesses Targeted Randy Wolverton Brian J. Koechner

 Payment Fraud Schemes  Involves Compromising Accounts  Fake s from Senior Executives  Fake s from Vendors  Goal: Cause Wire Transfers from Company to Fraudsters  Also Known as Man-In-The-Middle Scams  Video Video

 Global Scam Stats:  Time Period: 10/01/2013 to 12/01/2014:  Combined U.S. and Non-U.S. Victims: 2126  Combined Losses: $214,972,  Problem is Growing  Linked to Other Fraud Schemes: Romance; Lottery; Employment; Home/Vacation Rental Attorney Check;

 Compromise account of Executive  sent from Executive to Employee with ability to conduct wire transfers  Compromise Vendor/Supplier  Last Minute modifications to bank account  Wired Funds often sent to Asia, and other countries

 Business with longstanding relationship with supplier  Asked to wire funds for invoice payment to fraudulent account  Request made via telephone, fax, or  contains spoofed website  Appears to mimic prior legitimate requests

 accounts of high level Executives are compromised  Request for wire transfer from compromised account is made to employee(s) conducting wires  Fraudulent request is often sent to banking institution

 Employee’s is hacked  Contact list is obtained  Request for invoice payments to fraudster bank account are sent from this employee’s to multiple vendors  Scheme not discovered until contact is made with vendors

 Very Patient, Ruthless  Prior Reconnaissance of Target  Looking for Control Weaknesses  Often Use Weekends, Evenings, fake Emergency transfers  Often used when Executive is traveling and cannot be contacted

 Changing the header to disguise the true source  Used to get recipients to open and respond to solicitations  Used to convince person to provide personal or financial information  Used to gain access to computer system

 Use Spoofed s to employees allegedly from Executive  Spoofed from Executive describing a “Confidential Deal”  Spoofed from Executive asking to change Vendor information  Can be used to install Malware, Key Logging  Asks Employees to click on a compromised Website (Phishing)

 Businesses/Personnel using open source E- Mail are targeted  Individuals handling wire transfers are targeted  Spoofed s mimic a legitimate  Hacked s often occur with personal E- Mail account

 Fraudulent requests carefully worded to appear legitimate  Phrases “code to administrative expenses” or “urgent wire transfer” are common  Amount of wire transfer is business specific – similar to normal business

 Fraudulent requests coincide with business travel dates for Executives  Fraudulent IP addresses often trace back to free domain registers

 Avoid Free Web-Based  Establish a company web-site domain and use it to establish company accounts  Be careful of posts to social media and company websites  Be suspicious of requests for secrecy, or to take action immediately

 Consider additional IT and Financial Security  Consider 2-step verification  Arrange second-factor authentication (telephone contact)  Consider Digital Signatures on both sides of transaction  Delete Spam – unsolicited from unknown parties

 Do Not Open Spam  Do Not use the “Reply” option to respond to business s. Instead, use the “Forward” option and either type the correct address or select it from the address book  Be aware of significant or sudden changes in business practices  Train Employees