Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/14/2018
02:00 PM
David Shefter
David Shefter
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital

Realizing the wide scope of fraud should be at the top of every business executive's to-do list. Here's some practical advice to help you stay safe.

Fraud has a long history. Old-fashioned confidence schemes, scams through the mail (such as fake lotteries) or via telephone (false bill and tax collectors), and cyberattacks all share a common thread: the desire for easy cash by criminals who may never see their victims in person.

Business executives and their teams of systems/security operations pros running any critical network of devices and people — from banks and government to tech companies, insurers, and retailers — are realizing just how pervasive fraud is. The biggest development is that fraudulent activity is coming from a multitude of sources, both human and machine. While ransomware and phishing attacks show up in the headlines, fraud is often an inside job, conducted by unhappy employees looking to make some quick money and get revenge on their company.

But the main goal of most thieves is financial gain; they can achieve it by obtaining personally identifiable information, manipulating identities, and making transactions. Or they can work from inside of a company, obtaining common business practices and policies so that they know how to avoid them; this could mean working closely with a compromised employee who also stands to gain. Here are four major types of fraud:

1) Identity theft: Criminals steal an existing identity to commit fraud and rob an institution; they often get one chance at this crime before their activities show up on a person’s credit card statement, and thus damages are limited. Much identity theft today is carried out via email and text-message phishing schemes, either targeting large groups (such as all employees at a company) or a single person, based on his or her worth.

2) Synthetic fraud: Some criminals have used various forms of synthetic fraud, meaning the creation of a fake identity. This can, for example, be used to steal new cars from dealers or receive tax refunds and other undeserved payments. Instead of using a real name, criminals choose a new "synthetic" identity and then pick up the car they ordered and drive away. Banks are now losing more to this crime than ever before — around $2 billion per year, per research from TransUnion.

3)  Ransomware: Ransomware has exploded in the past few years. Hospitals have been entangled with ransomware that encrypts their information and demands a Bitcoin ransom since 2016.  

4) Digital fraud: Cyberattacks have a different feel — but despite the high-tech gloss, the result is the same. The motivations for such attacks can be blackmail, embarrassment, or both. Think about the 2015 Sony Entertainment hack, competitive spying (such as how Uber spied on Lyft), and even political objectives. Lastly, fraud and attacks may be motivated by social objectives, such as how users of 4chan target their perceived enemies — in one case, the social blogging site Tumblr.  

Reputational damage can be severe for brands, particularly those centered around security or data quality. Because an increasing amount of the value of a company is tied up in its brand, the consequences of reputational damage are always increasing.

The results of fraud and cyberattacks are as varied as their potential targets. While having a few systems caught up in a botnet or having some cryptomining software running on your enterprise servers probably won't make too much of a dent, this can lead to worse consequences. Financial losses, legal or regulatory liability for organizations holding certain types of information or failing to meet service-level agreements, diminished competitive position, or loss of trust from customers and partners are all midlevel consequences of cyberattacks.

Be Prepared
Practical advice to help your company avoid the perils of fraud includes having an end-to-end strategy that starts with assessing the situation and taking a pre-emptive strike on losses. Of course, companies will vary in their tolerance for fraud, based on possible losses and exposure; and thus, their approach to fraud protection will need to fit appropriately. Here is some step-by-step best practices to follow: 

  • As a first step, set parameters for the types of fraudulent activity that your organization will be focused on.
  • Build a comprehensive list of the different ways someone could defraud your company, and then rank the easiest and most damaging paths to fraud.
  • Introduce more-thorough background checks for any employee or contractor connecting with the company in the hiring process.
  • Structure ongoing checks in the future, of the same persons. Case in point, no one with a criminal record (even for a petty crime) would be eligible to be employed by banking and credit institutions or government agencies.
  • For businesses that involve sales of products, such as retailers, think about warranty fraud. Realizing that a certain percentage of customers will make false claims for refunds, and building rules and policies against this, will enhance defenses.
  • More-advanced steps, applied to companies with thousands of transactions (such as medical or insurance billing), involve taking advantage of data mining, and setting up a system and algorithm that correlates past anomalous patterns that may be fraud, and then enables real-time alerts that stop the crime in action.
  • Get outside help: In many cases, hiring a consultant with deep experience in loss prevention can be a worthy investment. 
  • Seek the company of others in the fight against fraud. Many industries are creating consortiums and forums that gather business leaders together to share ideas, isolate new and emerging scams, and define best working practices that may become a new standard in the fight against fraud fight. 

As business leaders, start at the foundation of your business to prevent fraud, and teach your management and staff how to think about losses and the behaviors that may cause them. Put practices in place, starting with background checks, monitoring systems, and other methods that make outsiders earn trust.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are — and why they might be targeting your enterprise. Click for more information.

David Shefter serves as Chief Technology Officer for Ziften Technologies, where he brings an expansive background in security, IT, and emerging technologies for finance. Previously, he served as Senior VP of Innovation and Emerging Technology at Citigroup. Shefter is ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jposhea3a
50%
50%
jposhea3a,
User Rank: Apprentice
6/15/2018 | 10:10:33 AM
cyber as a means of theft-by-abuse in addition to theft-by-breach
Thanks for the post David.

You highlight an important and overlooked aspect of cyber - that there is a lot to be gained by simply *abusing* existing processes.

Effective business processes should also be checking that 'correct behavior' and *only* 'correct behavior' is occurring in the normal course of a process operating, not simply checking for a limited set of bad behaviors (invalid dollar amounts, overdrafts, failed logins, etc).

Looking forward to seeing more content from you on DarkReading!
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .