Cookie Settings
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Other cookies are those that are being identified and have not been classified into any category as yet.

No cookies to display.

Multi-faceted fraud requires multi-factor authentication

| Published: November 23, 2015

The following blog post is intended for informational purposes only. Please note that this post has not been recently reviewed and should be considered for reference purposes only. Due to its age, it may also be missing links, images, or references that were present at the time of its original publication. We encourage readers to verify any information mentioned in this post with the latest available sources.

Archived Post

There are more types of financial fraud to manage than ever before—debit and credit card, check, online banking, electronic, ACH—the list goes on. Fraudsters never give up. They keep old-fashioned, small-scale scams in play while looking for additional ways to penetrate financial institutions. An example is cross-channel or multi-faceted fraud, where information is gained in one channel and used to commit fraud in another, making it even more challenging to combat.

Multi-faceted fraudsters obtain PIN numbers through phishing or ATM skimming and use stolen data such as social security numbers, passwords, and email addresses to implement their schemes. Armed with this information, they employ social engineering to target unsuspecting customer service representatives (CSRs) and trick them into changing sensitive account data. Once they have charmed their way in, they can use any channel to commit fraud against the account.

This is one way that cross-channel fraud can occur. A fraudster obtains a list of social security numbers and begins contacting call centers with the intention of gaining the trust of the CSR—I’m on vacation and really need to make a withdrawal, but can’t remember my account number. Would it be possible to give you my social security number for verification?

If there is an account associated with the stolen social security number, bingo. The CSR gives them the information they need to gain access and drain the funds. If there isn’t a matching social or the fraudster gets denied, they keep calling until they find a hit and get in. What seems like a reasonable customer request becomes the perfect crime.

Fraud threats are escalating for consumers and financial institutions, but businesses across all industries are not immune—Primera Blue Cross, Anthem, Sony Pictures, Starwood Hotels and Resorts are just a few companies recently targeted.

In fact, the FBI reported losses of more than $1 billion from October 2013 through August 2015 as a result of business email compromises, also known as corporate account takeover. The thieves use malware to steal passwords that provide access to company email systems, then falsify wire-transfer instructions for legitimate purchases.

Businesses need to be in a position where they can detect and stop fraudsters from stealing data, changing data, or infiltrating their systems. In many of these breaches the companies didn’t know for several months that they had been compromised.

Robert Herjavec, founder of the Herjavec Group recognized as a global leader in information security and one of the leading sharks on ABC’s Shark Tank, spoke recently at a financial industry conference. His message was clear—it is impossible to stop a security breach, but it is your responsibility to know how long an adversary has been on your network and respond quickly.

Where do we go from here?

Watch for things that are out of character. If someone is attempting a large wire transfer online, send a one-time pass code via text that is necessary to finalize the transaction. This type of out-of-band authentication ensures the request is legitimate and decreases false positives.

Apply layered security. Mobile devices can be used to verify consumers (phone printing) in combination with voice biometrics. Phone printing gathers information from the phone to detect whether the call is originating from the location the caller claims as well as the phone type—cell, landline, or voice over IP (VoIP). This helps decrease call center scams by providing a list of known bad devices to prevent future attacks by the same fraudster.

Combating multi-faceted fraud takes multi-factor authentication. It can be a difficult balance for banks that want to provide a great customer experience without a lot of friction, but it is a necessary step in fighting new types of fraud.

Vigilance will be critical as transactions increasingly move online and threats continually change.

Post Categories: Archived

About Zoot

We enable clients to access hundreds of cutting-edge data sources in real time, and provide business user control that empowers our clients to adapt to their evolving strategies.

Recent Posts

Sign Up For Our Newsletter

START TYPING AND PRESS ENTER TO SEARCH