Vulnerabilities / Threats

6/14/2018
02:00 PM
David Shefter
David Shefter
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital

Realizing the wide scope of fraud should be at the top of every business executive's to-do list. Here's some practical advice to help you stay safe.

Fraud has a long history. Old-fashioned confidence schemes, scams through the mail (such as fake lotteries) or via telephone (false bill and tax collectors), and cyberattacks all share a common thread: the desire for easy cash by criminals who may never see their victims in person.

Business executives and their teams of systems/security operations pros running any critical network of devices and people — from banks and government to tech companies, insurers, and retailers — are realizing just how pervasive fraud is. The biggest development is that fraudulent activity is coming from a multitude of sources, both human and machine. While ransomware and phishing attacks show up in the headlines, fraud is often an inside job, conducted by unhappy employees looking to make some quick money and get revenge on their company.

But the main goal of most thieves is financial gain; they can achieve it by obtaining personally identifiable information, manipulating identities, and making transactions. Or they can work from inside of a company, obtaining common business practices and policies so that they know how to avoid them; this could mean working closely with a compromised employee who also stands to gain. Here are four major types of fraud:

1) Identity theft: Criminals steal an existing identity to commit fraud and rob an institution; they often get one chance at this crime before their activities show up on a person’s credit card statement, and thus damages are limited. Much identity theft today is carried out via email and text-message phishing schemes, either targeting large groups (such as all employees at a company) or a single person, based on his or her worth.

2) Synthetic fraud: Some criminals have used various forms of synthetic fraud, meaning the creation of a fake identity. This can, for example, be used to steal new cars from dealers or receive tax refunds and other undeserved payments. Instead of using a real name, criminals choose a new "synthetic" identity and then pick up the car they ordered and drive away. Banks are now losing more to this crime than ever before — around $2 billion per year, per research from TransUnion.

3)  Ransomware: Ransomware has exploded in the past few years. Hospitals have been entangled with ransomware that encrypts their information and demands a Bitcoin ransom since 2016.  

4) Digital fraud: Cyberattacks have a different feel — but despite the high-tech gloss, the result is the same. The motivations for such attacks can be blackmail, embarrassment, or both. Think about the 2015 Sony Entertainment hack, competitive spying (such as how Uber spied on Lyft), and even political objectives. Lastly, fraud and attacks may be motivated by social objectives, such as how users of 4chan target their perceived enemies — in one case, the social blogging site Tumblr.  

Reputational damage can be severe for brands, particularly those centered around security or data quality. Because an increasing amount of the value of a company is tied up in its brand, the consequences of reputational damage are always increasing.

The results of fraud and cyberattacks are as varied as their potential targets. While having a few systems caught up in a botnet or having some cryptomining software running on your enterprise servers probably won't make too much of a dent, this can lead to worse consequences. Financial losses, legal or regulatory liability for organizations holding certain types of information or failing to meet service-level agreements, diminished competitive position, or loss of trust from customers and partners are all midlevel consequences of cyberattacks.

Be Prepared
Practical advice to help your company avoid the perils of fraud includes having an end-to-end strategy that starts with assessing the situation and taking a pre-emptive strike on losses. Of course, companies will vary in their tolerance for fraud, based on possible losses and exposure; and thus, their approach to fraud protection will need to fit appropriately. Here is some step-by-step best practices to follow: 

  • As a first step, set parameters for the types of fraudulent activity that your organization will be focused on.
  • Build a comprehensive list of the different ways someone could defraud your company, and then rank the easiest and most damaging paths to fraud.
  • Introduce more-thorough background checks for any employee or contractor connecting with the company in the hiring process.
  • Structure ongoing checks in the future, of the same persons. Case in point, no one with a criminal record (even for a petty crime) would be eligible to be employed by banking and credit institutions or government agencies.
  • For businesses that involve sales of products, such as retailers, think about warranty fraud. Realizing that a certain percentage of customers will make false claims for refunds, and building rules and policies against this, will enhance defenses.
  • More-advanced steps, applied to companies with thousands of transactions (such as medical or insurance billing), involve taking advantage of data mining, and setting up a system and algorithm that correlates past anomalous patterns that may be fraud, and then enables real-time alerts that stop the crime in action.
  • Get outside help: In many cases, hiring a consultant with deep experience in loss prevention can be a worthy investment. 
  • Seek the company of others in the fight against fraud. Many industries are creating consortiums and forums that gather business leaders together to share ideas, isolate new and emerging scams, and define best working practices that may become a new standard in the fight against fraud fight. 

As business leaders, start at the foundation of your business to prevent fraud, and teach your management and staff how to think about losses and the behaviors that may cause them. Put practices in place, starting with background checks, monitoring systems, and other methods that make outsiders earn trust.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are — and why they might be targeting your enterprise. Click for more information.

David Shefter serves as Chief Technology Officer for Ziften Technologies, where he brings an expansive background in security, IT, and emerging technologies for finance. Previously, he served as Senior VP of Innovation and Emerging Technology at Citigroup. Shefter is ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jposhea3a
50%
50%
jposhea3a,
User Rank: Apprentice
6/15/2018 | 10:10:33 AM
cyber as a means of theft-by-abuse in addition to theft-by-breach
Thanks for the post David.

You highlight an important and overlooked aspect of cyber - that there is a lot to be gained by simply *abusing* existing processes.

Effective business processes should also be checking that 'correct behavior' and *only* 'correct behavior' is occurring in the normal course of a process operating, not simply checking for a limited set of bad behaviors (invalid dollar amounts, overdrafts, failed logins, etc).

Looking forward to seeing more content from you on DarkReading!
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11378
PUBLISHED: 2019-04-20
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
CVE-2019-11372
PUBLISHED: 2019-04-20
An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11373
PUBLISHED: 2019-04-20
An out-of-bounds read in File__Analyze::Get_L8 in File__Analyze_Buffer.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11374
PUBLISHED: 2019-04-20
74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.
CVE-2019-11375
PUBLISHED: 2019-04-20
Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI.