Expo 2013 S3-B-Thwarting the new faces of fraud
Transcription
Expo 2013 S3-B-Thwarting the new faces of fraud
Criminals are targeting smartphones and tablets Thwarting the New Faces of Fraud Smartphones and Tablets Greg Litster, SAFEChecks Industry experts expect mobile threats to surpass PC threats. - 10% of mobile apps leak logins or passwords - 25% expose personally identifiable info (PII) Mobile web browsers also present threats. Browser-based attacks can be launched by simply visiting an infected site. - 40% communicate with third parties. “Cybercrime: This Is War” Report by JPMorganChase 3/2013 Juniper Networks, 2011 Mobile Threats Report -Many apps lack encryption, and many share information insecurely. - 30% of apps have the ability to obtain a device’s location without the user's consent. - 14% of apps request permissions that could lead to the initiation of phone calls without user knowledge. Juniper Networks, 2011 Mobile Threats Report An emerging trend: “Spear Phishing” attacks (Trojans) on Android device apps that allow users to download Gmail attachments. It can compromise the mobile devices and the PCs or Macs to which these devices connect…. App Security Spear Phishing is based on social engineering…. Fraudsters gather information about mobile users through groups with which they are affiliated, as well as social media channels. Product Reviews: CNET.com, PCmag.com MyLookOut, Bullguard, etc.) Kaspersky Lab - research April 2013 Kaspersky Lab - research April 2013 1 1 Mobile Banking and Deposit Fraud Mobile Banking and Deposit Fraud Mobile Banking and Deposit Fraud Scenario: A title insurance company gives John Doe a check at closing. John Doe deposits the The company does not think to put a check via a mobile app, then comes back to office and returns the check, asking that it be made payable to John Doe or Jane Doe. 1. If a physical check is returned for a replacement, place a stop payment on the returned check. It may have been deposited remotely. 2. Recipient MUST sign an affidavit stating the check was not “deposited.” Check Fraud... Why talk about Check Fraud? Stop Payment on the first check, because they have the physical check in hand. Check Fraud produces more losses than all other payment fraud COMBINED! 3. An Affidavit does not provide protection, only a right to sue and collect legal fees. Total Non-Cash Payments by Method "Checks remain the most popular vehicle "Checks continue to be widely used and for criminals committing payments fraud, abused, and fraud via check payments 35 even though the corporate use of checks remains the overwhelming threat 30 has declined." faced by companies." Association for Financial Professionals (AFP) Association for Financial Professionals (AFP) 2013 Payments Fraud Survey 2011 Payments Fraud Survey (Transactions) 25 20 15 10 5 0 A C H C R E D I T … C A R D D E B I T … . C A R D S C H E C K S EBT ACH Credit Cards Debit Cards Checks Billions 2010 Federal Reserve Payments Study (the next Study will be released at the end of 2013) 2 2 Fraudulent Payments by Method Fraud Losses by Method (Some Respondents were hit multiple ways; total > 100%) How Dollars were actually lost: 60% in 2011 –> 69% in 2012 CHECKS 87% 100 100 80 Purchasing Cards 29% 60 80 Catch Me If You Can Technology is making Frank Abagnale’s “gift” achievable by mere mortals Purchasing Cards 10% 60 ACH Debits 27% 40 20 0 CHECKS 69% Frank Abagnale Wir e Transf er 11% Percentage ACH Debits 9% 40 0 ACH Credits 8% ACH Credits 7% 20 Percenta ge Wire Transfer 5% The Evolution of Check Fraud Counterfeit Checks …Banks developed Positive Pay and Banker Solutions BOSTON’S # 1 SELLER Typical Check Layout Altered Payees …Banks developed Payee Positive Pay Added Payee Names Checks pass right through Payee Pos Pay! Open Areas Where Forgers Add A New Payee Name How? 3 3 Typical Check Layout Multiple Payees: Added Payee Names If it doesn’t say AND, Open Areas Where Forgers Add A New Payee Name No Banker Solution! it is assumed to be OR. A forward slash (virgule, vər-gyül “/” ) = OR (There is a software solution….) Added Payee printed 2 lines above the original name – it will not be detected by Payee Positive Pay Strategies to Prevent kF c e Ch d u a r Commercial Purchase Card Benefits Don’t Write Checks! 1. Reduces check writing and check fraud risk 2. Does not expose the checking account number • Use Commercial Purchase Cards • Pay electronically (ACH) 3. Terminating a card is easier than closing a checking account. 4. Reduces bank per-item fees 5. Increases payment float by 40+ days 6. Reduces interest expense 7. Potential for Rebates or Rewards ACH Payment Benefits 1. Reduces check writing and check fraud risk 2. Does not expose the checking account number 3. Reduces late fees 4. Reduces mailing expense and bank fees 5. Pay 1 invoice at a time, or 6. Pay multiple invoices and email remittance detail If you’re going to ec write checks… . #1 S igh yC it ur ks c he H 4 4 Association for Financial Professionals (AFP) 2013 Payment Fraud Survey Effective check fraud prevention strategies begin with a Types of Attempted or Actual Check Fraud Events: 1. Payee Name Alterations = high security check. 2. Counterfeit Checks = 49% 1. Deter the forger (psychological warfare) 2. Thwart attempts to replicate or alter the check 29% 3. Dollar Amount Alterations = High Security Checks 28% 3. May help protect you legally, e.g. from some Holder in Due Course claims These attempts could be prevented with high security checks. Important Security Features What makes a check secure? “Controlled” Check Stock is a critical Ø Controlled Check Stock Ø Dual-tone True Watermark security feature Ø Thermochromatic Ink (reacts to heat) Ø Correctly Worded Warning Banner Ø Toner Anchorage 10+ safety features It is unique to each end-user or entity Ø Copy Void Pantograph Ø Chemical-reactive Ink + Paper Ø Inventory Control Number on Back (laser) Ø UV Ink + UV Fibers Ø Microprinting Ø Laid Lines y a eP Uncontrolled check stock is check stock that is generic (meaning it is not unique or customized to the end-user) iv sit.net o P ay It is available entirely blank to multiple organizations/entities (including fraudsters) Uncontrolled check stock is a major contributor to check fraud. #2 .P P ee Positive y a b: Positive Pay... ...a powerful tool! e W 5 5 Preceding Events Lawsuit Added or Altered Cincinnati Insurance Company Payee Names v. Wachovia Bank $154,000 Loss Facts from an Altered Payee Facts Dec. 1, 2005: Schultz Foods issues $154,000 check is intercepted and stolen. $154,000 check payable to Amerada Payee Name changed to “Kenneth Payton.” Hess Corporation. Kenneth Payton, an unwitting participant, deposits $154,000 check into TCF Bank. Schultz Foods had 3 prior check fraud attempts and was encouraged by Wachovia Bank to use Positive Pay Schultz Foods does NOT use Positive Pay Schultz buys check fraud insurance from Cincinnati Insurance Company Facts Per instructions, Kenneth Payton keeps $3,500 and wires $150K to Singapore to “...help a refugee South African family.” The money disappears. Wachovia pays the altered check. Facts January 2006: Schultz Foods notifies Wachovia Bank of Altered Payee and demands repayment. Wachovia demands repayment from TCF Bank (bank of first deposit; liable party). Facts Facts Wachovia Bank pursues TCF Bank for $154,000; does not pay Schultz Foods. Wachovia had a “defense” against Schultz Foods and its insurance company: A Signed Deposit Agreement Schultz Foods makes a claim under its policy; Cincinnati Insurance Co. pays Schultz Foods $154,000. Cincinnati Insurance Co. sues Wachovia Bank for $154,000. Under UCC § 3-119, TCF Bank’s attorneys, acting for Wachovia Bank, use Wachovia’s “deposit agreement defense” against Cincinnati Insurance Co. 6 6 Resolution: If… Wachovia Bank Wins! Schultz Food’s had used Positive Pay, This case demonstrates you can have a great relationship with your bank and Preventing Altered Payee Names the check may not have paid, and there may not have been a loss! still lose a lawsuit! (Exception: Added Payees) Preventing Altered Payees Ø High-security checks • Includes “toner anchorage” Ø Use 14 point font for Payee Name Preventing Typical Check Layout Added Payee Names Ø High-quality toner Ø Hot laser printer Open Areas Where Forgers Add A New Payee Name • Highest temperature setting available • Replace fuser element every 2-3 years Ø Positive Pay with Payee Name Recognition See Frank Abagnale’s Fraud Bulletin, Page 7: A Primer on Laser Printing Identical check data Eliminate Added Payee Name Risk No room for an Added Payee 10 point font – Easily scraped off – alteration covered with larger font strengthened by software 7 7 Secure Number Font 14 point font – Scrape-offs more visible, difficult to cover up PAYEE NAME: Upper & lower case letters converted into UPPER CASE LETTERS Identical data is printed on both checks. Which check would forgers prefer to attack? “Forger-Deterrent” Text Secure Name Font = 18 point Secure Seal barcode “Forger-Deterrent” Text Holder in Due Course Text Barcode contains: 1. Drawer “Secure Seal” 2. Payee Name 3. Dollar Amount is an 4. Issue Date image-survivable encrypted barcode 5. Check Number 6. Account Number 7. Routing/Transit Number 8. X,Y coordinates on the check face of each data piece 9. Date and Time Check was printed Barcode is created by a Printer Driver 10. Laser Printer used 11. The employee that printed the check 8 8 8934 Eton Avenue Canoga Park, CA 91304 Printer driver can: 1. Accumulate check data for Positive Pay 2. Change Font size Typical Check Layout – Check is on top and shows thru window envelope 3. Add Barcode, Secure Name & Number fonts Payee Name, Address, is printed in TOP white panel. Check is re-positioned to the bottom. Printer Driver can Reposition the Check 4. Be configured to send Pos Pay files to the Check is Z-folded with TOP PANEL showing thru window It is not obvious the envelope contains a check. bank automatically 5. Reposition Check Placement ACH Fraud is on the rise! n tio ilia ec c on ou c el im .T #3 c yA R nt 2012 = 23% vs. 2013 = 27% • Use ACH Filters or Blocks (a bank service) • Select “Return All” as your default choice for ACH Debit Filter • Set maximum debit limit for all Approved Vendors • Be alert for small dollar ($1) ACH debits/credits Cyber Crime Keystroke Logger Virus How a Remote Town in Romania Has Become Cybercrime Central How a Remote Town in Romania Has Become Cybercrime Central By Yudhijit Bhattacharjee By Yudhijit Bhattacharjee January 31, 2011 January 31, 2011 Expensive cars choke the streets of Râmnicu Vâlcea’s bustling city center—top-ofthe-line BMWs, Audis, and Mercedes driven by twenty- and thirty-something men sporting gold chains. I ask my cab driver if all these men have high-paying jobs, and he laughs. Then he holds up his hands, palms down, and wiggles his fingers as if typing on a keyboard. “They steal money on the Internet,” he says. The city of 120,000 has a nickname: Hackerville. It’s something of a misnomer; the town is indeed full of online crooks, but only a small percentage of them are actual hackers. Most specialize in e-commerce scams and malware attacks on businesses. Tracks every keystroke; sends hourly reports Spreads by: - Email, Web sites - Infected files on network - USB drive or CD 9 9 Trojan Horse Phishing Emails A malicious program concealed in something innocuous. Contains keystroke logger virus • Pictures, Video on Facebook and MySpace Can lead to “account takeovers” • Free music downloads • Email attachments Lawsuit Lawsuit Experi-Metal, Inc. Experi-Metal, Inc. v. Comerica Bank Company sued the bank 82 Wires, $5,200,000 $560,000 Loss “Phishing” Attack: CFO responds with to email with his login WHY did the Bank lose? Company sued the bank. Company sued the bank. Who won the lawsuit? Who won the lawsuit? The Customer! 1. Bank wired out funds exceeding Customer’s Actual Account Balance (Overdraft = $5MM) (ZBA debited; Concentration Acct OD. Programming error remedied!) 2. Five (5) other companies were hit that day 3. Company was liable for CFO clicking on fake email, BUT 4. Company “won” lawsuit against Comerica, but 5. Company not awarded attorney fees (> $250K) 10 10 Choice Escrow and Land Title Choice Escrow and Land Title vs. BancorpSouth Bank vs. ü March 17, 2010: Bank received an internet-based request to BancorpSouth Bank Computer Takeover: NO “Dual Control” ü Wire to Cypress was initiated using the User ID and password of a Choice Escrow employee wire $440,000 out of Choice Escrow’s Trust Account ü Request not legitimate – Choice Escrow employee’s computer was hacked, taken over by fraudsters ü Wire was initiated from IP address registered to Choice ü Bank authenticated employee’s computer by detecting the secure device ID token that Bank previously installed ü NO “Dual Authentication” in place ü Wire transfer request to send $440K to Republic of Cypress http://courtweb.pamd.uscourts.gov/courtwebsearch/mowd/qmC2dt555T.pdf Bank: Customer Failed to Implement “Dual Control” ü Bank required online banking customers sending wires to utilize “Dual Control” ü Dual Control = 2 computers, 2 logins, 2 passwords ü Wire transfer could only be effectuated by two individuals Feeble Argument about Dual Control ü Choice argued “Dual Control” was not “commercially reasonable” because… ü “…at times, one or both of the two individuals authorized to perform wire transfers through the [bank] system were out of the office due to various reasons.” using separate User IDs and passwords ü Court disagreed. ü Choice declined in writing, TWICE, to use Dual Control ü Choice Escrow held liable for loss. Official Comments to the Funds Transfers provisions of the UCC: Sometimes an informed customer refuses a security procedure that is commercially reasonable and suitable for that customer and insists on using a higher-risk procedure because it is more convenient or cheaper. In that case, under the last sentence of subsection (c), the customer has voluntarily assumed the risk of failure of the procedure and cannot shift the loss to the bank. Online Banking Require 2 different computers to move $$ 1. Computers #1-99 can “originate” wires 2. Dedicated “banking-only” Computer to “release” the wire / ACH ü Immediately after wiring funds, Bank automatically generated a Transaction Receipt faxed to and received by Choice Escrow. Fax placed on a desk without review. Official Comments to the Funds Transfers provisions of the UCC: The purpose of having a security procedure deemed to be commercially reasonable is to encourage banks to institute reasonable safeguards against fraud but not to make them insurers against fraud. A security procedure is not commercially unreasonable simply because another procedure might have been better or because the judge deciding the question would have opted for a more stringent procedure. The standard is not whether the security procedure is the best available. Use a Layered Approach for Wires & ACH • Dual Factor Authorization • (“something you have (token), and something you know”) • “Out of Band” Authentication • (text msg from bank with password for that specific wire) • Tokens • Transactional Alerts via • Text • E-mail • Voice call back (human confirmation) 11 11 Protect Passwords 1 123456 2 12345 3 123456789 4 Password 5 qwerty FBI: 10 Most Popular Passwords trustno1 7 abc123 8 monkey 9 letmein 10 dragon FBI: 10 Most Popular Passwords RockYou.com list confirmed nearly all 2009 Cracking Passwords 6 • Online games service RockYou.com hacked • 32 Million plain-text passwords stolen • 14 Million unique passcodes were posted v Overnight, the way hackers cracked CAPITAL LETTERS come at the beginning of a password. Nearly all NUMBERS and PUNCTUATION are at the end. Revealed a strong tendency to use first names followed by years: Christopher1965 or passwords changed! Julia1984 Passwords Posted on the Web Last Year 5 Years Ago The Time it Took a Hacker to Randomly Guess Your Password + numbers and 100,000,000+ Length lowercase + Uppercase symbols 6 Characters 10 Minutes 10 Hours 18 Days 7 Characters 4 Hours 23 Days 4 Years 463 Years 8 Characters 4 Days 3 Years 9 Characters 4 Months 178 Years 44,530 Years Today: It Takes a Hacker 12 Hours to Randomly Guess Your Password Length 8 Characters Upper + Lower + Numbers + symbols 12 Hours This $12,000 computer containing 8 AMD Radeon GPU cards can brute force the entire keyspace for any eight-character password in 12 hours. 12 12 “Common Sense” Controls to Prevent Fraud • Tone at the Top • Fraud Hotlines • Strong Internal Controls • Bonding of employees / Temps • Internal Audit reviews of Controls “Common Sense” Controls to Prevent Fraud • Purchasing (CC’s / P Cards) • Written Policy with guidelines • Cardholder acceptance / Signature • Merchant / Category restrictions • Timely review of charges “Common Sense” Controls to Prevent Fraud • Vendors • Segregate approval of vendors from authorization of payments • Current authorized signer list • System that won’t allow duplicate payments • Skimming of Cash • • • • Segregation of Duties Policy on Voids / Credits Prenumbered Receipts / Information Surprise Cash Counts Kids keep 2 Facebook Accounts (Mom only sees one) • Timely vendor payments including verification of goods / services Track Your Kids Keystrokes • Timely reconciliation of paid checks / review of check images to records Track Your Kids’ Keystrokes Track Your Kids’ Keystrokes Spector Pro: Track your child’s keystrokes, emails, MySpace, Facebook, IM, websites visited with Spector Pro (spectorsoft.com). eBlaster forwards incoming and outgoing emails to your email address. 13 13 www.NoSlang.com Spectorsoft.com/mobile www.NoSlang.com Internet Slang Dictionary & Translator Texting app Sexting Slang Terms Sexting can create serious long-term legal consequences for your child. www.NoSlang.com What is Snapchat? Snapchat is the fastest way to share a moment on iPhone and Android. You control how long you want your friends to view your messages. We'll let you know if we detect that they've taken a screenshot! Is there any way to view an image after the time has expired? No, snaps disappear after the timer runs out. You can save snaps that you capture by pressing the save button on the preview screen. What if I take a screenshot? Screenshots can be captured if you're quick. The sender will be notified if we detect you have taken a screenshot. Holder in Due Course Holder in Due Course Web: FraudTips.net Holder in Due Course Ø An innocent party who accepts a check as payment for goods or services ØTrumps Stop Payments Ø No evidence of alteration or forgery on face of the check, or knowledge of fraud by recipient ØTrumps Positive Pay Ø Statute of Limitations • 10 years from date of issue • Three (3) years from date of return Trump (n.) To get the better of an adversary or competitor by using a crucial, often hidden resource. Ø A Holder in Due Course can sell his/her rights 14 14 Holder in Due Course #1 Holder in Due Course Federal Appellate Court Lawsuits Holder in Due Course Text Ø Robert Triffin v. Cigna Insurance • Two year old check, payment stopped • No “expiration date” printed on check UCC rules: 3 years or 10 years • Print on check face: “This check expires and is void 25 days from issue date” üDon’t re-issue check until first check expires Holder in Due Course #2 Someone who accepts an expired instrument Has No Legal Standing! as a Holder in Due Course Ø Robert Triffin v. Somerset Valley Bank and Hauser Contracting Company • 80 counterfeit checks on authentic-looking check stock (ADP payroll checks) • $25,000 • Hauser Contracting held liable in both Courts because checks looked authentic Ø Solution: Use controlled, high security check stock that cannot be purchased blank Greg Litster, President SAFEChecks (800) 949-2265 direct (818) 383-5996 cell [email protected] 15 15