Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/11/2020
10:00 AM
Doug Clare
Doug Clare
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Fraud Prevention During the Pandemic

When the economy is disrupted, fraud goes up, so let's not ignore the lessons we can learn from previous downturns.

There's one fraud pattern that's highly predictable: When the economy goes down, fraud goes up. In the wake of COVID-19, the Great Recession of 2008 provides some important lessons that can help enterprise security teams protect their companies and employees against the increased risk of fraud.

Criminals Exploit Vulnerabilities
Let's first take a look at some of the broad similarities between 2008 and 2020. As in 2008, consumer debt is today at an all-time high — in fact, it's even greater than during the peak of the Great Recession. Unemployment has surged, with current rates higher than any time since the Great Depression of the 1930s.

Related Content:

Special Report: Computing's New Normal, a Dark Reading Perspective

How Better Intel Can Reduce, Prevent Payment Card Fraud

The pandemic of 2020 has affected a wide range of American workers, especially those with customer-facing jobs that pay an hourly wage. People who have suddenly found themselves unemployed are most concerned about securing necessities such as food and shelter, and more are using credit cards to pay for rent and groceries.

These challenging economic conditions make many people, including employees, more vulnerable to being exploited by criminals.

A Surge of Fraud Types Old and New
In 2008, there was a sharp increase in fraud incidents (and losses) due to: collusive fraud rings in which groups of criminals conspired to defraud a large number of institutions and credit card issuers, and bust-out fraud perpetrated by individuals with either genuine or synthetic identities, running up high balances and intentionally defaulting after making a few normal-looking payments.

There are early signs that both of these are again on the rise in 2020, but here's what's different about fraud and some greater security risks during the COVID:

  • Phishing attacks are multiplying: Anxious employees are more susceptible to phishing emails claiming to have information about COVID-19 cures and economic stimulus payments. A large-scale move to work-from-home also creates new susceptibilities for hackers to exploit, such as a fake emails from executives asking for "help," particularly with financial transactions. These emails can plant malware and entice employees with financial access to inadvertently send funds and other valuable company information to fraudsters.

  • Money mule scams are on the rise: Economic uncertainty leads to consumer vulnerability, and more consumers are getting swept up in scams involving "cash prizes" and opportunities to "earn $100,000 from your home!"

Education and Prevention for All Parties
To protect their company and employees both inside and outside of work, security professionals should address the pandemic's fraud landscape with increased monitoring and a strong employee education program. Particularly, security teams should start by identifying high-risk employees and partners.

1. Employees
Your newest hires, temporary staff, and any new offshore employees your organization enlists are a significant risk. Some are new to the roles and being trained in jobs they haven't done before, and with the influx of COVID-related business interactions, such as higher call volumes at call centers, organizations are also asked to scale quickly and manage complex employee and customer issues quickly.

With that in mind, resources to detect inbound phishing emails should be expanded, and all employees should be educated on the latest trends in COVID-themed scams such as money muling and phishing.

2. C-Suite
Believe it or not, but your C-suite may be at greatest risk: After all, the more access an executive has within your organization, up to and including the CEO, the more valuable that person is as a target. In one recent example, a criminal impersonated the leader of a UK-based energy firm using voice-generating artificial intelligence software and convinced a chief executive to wire the equivalent of $243,000.

To avoid a similar situation, your organization should consider the likelihood of each employee and partner's vulnerability to fraudsters and the potential damage they could cause if compromised. The next step is then implementing the right risk management process — parts of it customer-facing, others behind the scenes.

3. Business Partners
It's important to not forget your business partners represent a risk as well. Many companies have fallen victim to a data breach connected to vendors and resellers that had access to many of their systems and in many cases conducted business on their behalf.

Overall, through vigilance and education of high-risk employees and heavily integrated business partners, enterprise security teams can use lessons learned from previous crises to navigate the pandemic with minimal disruption, ultimately mitigating security and fraud risks within an organization.

 

Doug Clare is Vice President of fraud, Compliance, and Security Solutions at FICO. In this role, Doug heads FICO's fraud, financial crime, and cyber-risk businesses. With more than 25 years at FICO, he has deep expertise in helping banks and other businesses manage fraud, ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...