Top Banner
Computer Fraud – “Phishing” Identity Theft in Identity Theft in Financial Services Financial Services 6/30/04 6/30/04
54

Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

Dec 23, 2015

Download

Documents

Wilfred McCoy
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

Computer Fraud – “Phishing”

Identity Theft in Identity Theft in Financial ServicesFinancial Services 6/30/046/30/04

Page 2: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

22

Phishing

“…“…The use of digital media also can lend The use of digital media also can lend fraudulent material an air of credibility. fraudulent material an air of credibility. Someone with a home computer and Someone with a home computer and knowledge of computer graphics can create knowledge of computer graphics can create an attractive, professional-looking Web site, an attractive, professional-looking Web site, rivaling that of a Fortune 500 company…”rivaling that of a Fortune 500 company…”

Arthur LevittArthur Levitt

Former Chairman of the SECFormer Chairman of the SEC

QuotesQuotes

Page 3: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

33

Phishing

QuotesQuotes

“…“…The Internet is a perfect medium to The Internet is a perfect medium to locate victims and provide an locate victims and provide an environment where victims do not see environment where victims do not see or speak to the “fraudsters”. Anyone in or speak to the “fraudsters”. Anyone in the privacy of their own home can the privacy of their own home can create a very persuasive vehicle for create a very persuasive vehicle for fraud over the Internet…”fraud over the Internet…”

Louis J. FreehLouis J. Freeh

Former FBI DirectorFormer FBI Director

Page 4: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

44

Phishing

Session ObjectivesSession Objectives

1)1) Raise awareness of threats & risks of Raise awareness of threats & risks of phishingphishing

2)2) Outline process to reduce the impact Outline process to reduce the impact of phishingof phishing

This is This is notnot a technical session. a technical session.

Page 5: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

55

Phishing

Session OutlineSession Outline

Phishing 101Phishing 101 RisksRisks Trends Trends ExamplesExamples Action Plan IdeasAction Plan Ideas Responses & Resource Examples Responses & Resource Examples SummarySummary

Page 6: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

66

Phishing

Phishing 101Phishing 101

InternetInternet

ConnectivityConnectivityAccessAccessAnonymityAnonymityVelocityVelocitySoftware vulnerabilitiesSoftware vulnerabilities

Page 7: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

77

Phishing

Phishing 101Phishing 101

Phishing uses e-mail to Phishing uses e-mail to lure recipients to bogus lure recipients to bogus websites designed to websites designed to fool them into divulging fool them into divulging personal data.personal data.

Page 8: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

88

Phishing

Phishing 101Phishing 101

E-mailE-mail

Spoofed addressSpoofed addressConvincing Convincing Sense of urgencySense of urgencyEmbedded link (but not always)Embedded link (but not always)

Page 9: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

99

Phishing

Phishing 101Phishing 101

WebsiteWebsite

Spoofed/similar addressSpoofed/similar addressSpoofed look/feel Spoofed look/feel Authentication screen/pop-up windowAuthentication screen/pop-up windowPossible redirect to actual websitePossible redirect to actual website

Page 10: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1010

Phishing

Phishing 101Phishing 101

Scam relies on:Scam relies on:

Unrecognized spamUnrecognized spam

% w/ existing relationship% w/ existing relationship

Ease of registering a websiteEase of registering a website

Social engineeringSocial engineering

Page 11: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1111

Phishing

RisksRisks

ConsumerConsumerID TheftID Theft

Open new accountsOpen new accounts

FraudFraudUnauthorized credit card Unauthorized credit card

transactionstransactionsA/C withdrawals A/C withdrawals

Page 12: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1212

Phishing

RisksRisksOrganization ImpersonatedOrganization Impersonated

Reputation RiskReputation RiskImpression of weak securityImpression of weak securityImpression of ignoranceImpression of ignoranceInadequate education programInadequate education programInadequate response programInadequate response programNegative publicityNegative publicity

Strategic RiskStrategic RiskImpact to on-line strategy (i.e. Impact to on-line strategy (i.e. adoption/retention rates)adoption/retention rates)

Page 13: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1313

Phishing

RisksRisks

Organization ImpersonatedOrganization Impersonated

Transaction RiskTransaction RiskFraudulent transactionsFraudulent transactions

Legal RiskLegal RiskPossible litigationPossible litigation

Operational RiskOperational RiskAdded cost to respond/assist Added cost to respond/assist consumersconsumers

Page 14: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1414

Phishing

TrendsTrends

Anti-Phishing Working GroupThe Anti-Phishing Working Group (APWG) is an industry association focused on eliminating the identity theft and fraud that result from the growing problem of phishing and email spoofing.

APWG Members- Over 400 members- Over 250 companies- 8 of the top 10 US banks- 4 of the top 5 US ISPs- Over 100 technology vendors- Law enforcement from Australia, CA, UK, USA

Page 15: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1515

Phishing

TrendsTrends

Source: Anti-Phishing Working Group Phishing Attach Trends Report s- March 2004 & May 2004

Unique Phishing Attacks

282116 176

402

11251197

0

200

400

600

800

1000

1200

1400

Dec '03 Jan '04 Feb '04 March '04 April '04 May '04

Page 16: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1616

Phishing

Source: Anti-Phishing Working Group Phishing Attach Trends Report - May 2004

TrendsTrends

Page 17: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1717

Phishing

Source: Anti-Phishing Working Group Phishing Archive

Examples (June 2004)Examples (June 2004)

Page 18: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1818

Phishing

Source: Anti-Phishing Working Group Phishing Archive

Examples (June 2004)Examples (June 2004)

Page 19: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

1919

Phishing

Source: Anti-Phishing Working Group Phishing Archive

Examples (June 2004)Examples (June 2004)

Page 20: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2020

Phishing

Examples (March 2004)Examples (March 2004)

Source: Anti-Phishing Working Group Phishing Archive

Page 21: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2121

Phishing

Examples (March 2004)Examples (March 2004)

Source: Anti-Phishing Working Group Phishing Archive

Page 22: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2222

Phishing

Examples (March 2004)Examples (March 2004)

Source: Anti-Phishing Working Group Phishing Archive

Page 23: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2323

Phishing

Examples (May 2004)Examples (May 2004)

Source: Anti-Phishing Working Group Phishing Archive

Page 24: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2424

Phishing

Examples (May 2004)Examples (May 2004)

Source: Anti-Phishing Working Group Phishing Archive

Page 25: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2525

Phishing

Examples (May 2004)Examples (May 2004)

                                                                          

Source: Anti-Phishing Working Group Phishing Archive

Page 26: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2626

Phishing

Examples (May 2004)Examples (May 2004)

Source: Anti-Phishing Working Group Phishing Archive

Page 27: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2727

Phishing

Examples (May 2004)Examples (May 2004)

Source: Anti-Phishing Working Group Phishing Archive

Page 28: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2828

Phishing

Examples (May 2004)Examples (May 2004)

Source: Anti-Phishing Working Group Phishing Archive

Page 29: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

2929

Phishing

Examples (FYI)Examples (FYI)

Internet Explorer browser exploit allows Internet Explorer browser exploit allows the URL in the web browser to be the URL in the web browser to be “masked”.“masked”.

Users would not know by looking at the Users would not know by looking at the browser window that they were at a browser window that they were at a different site than indicated.different site than indicated.

Patch issued (how many users Patch issued (how many users installed?)installed?)

Page 30: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3030

Phishing

RelatedRelated Examples (July ‘03) Examples (July ‘03)

Twist – newspaper vs. e-mail Twist – newspaper vs. e-mail CU official thought suspicious (service CU official thought suspicious (service

area)area) Site Site www.centurycredit.orgwww.centurycredit.org mirrored mirrored

www.centurycu.orgwww.centurycu.org (NCUA logo too) (NCUA logo too) Collected personal info. & loan app Collected personal info. & loan app

feesfees Toll free #Toll free # Site shut down (GA), but ads persistSite shut down (GA), but ads persist

Page 31: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3131

Phishing

1.1. EducationEducation

2.2. Protect on-line identity of FIProtect on-line identity of FI

3.3. Response PlanResponse Plan

Action Plan IdeasAction Plan Ideas

Page 32: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3232

Phishing

SelfSelf

Review resource sources*Review resource sources*

InstitutionInstitution

Training / Policy DevelopmentTraining / Policy Development

AwarenessAwareness

Handling complaints & reports of Handling complaints & reports of

suspicious e-mails/sites suspicious e-mails/sites

Protect on-line identity of FI*Protect on-line identity of FI*

Response Plan*Response Plan*

Action Plan Ideas - EducationAction Plan Ideas - Education

* More info. on other slides* More info. on other slides

Page 33: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3333

Phishing

Member / CustomerMember / Customer

Communication MethodsCommunication Methods

Internet Banking AgreementsInternet Banking Agreements

Newsletters Newsletters

Statement Stuffers Statement Stuffers

Recordings when on “hold”Recordings when on “hold”

Website Website

• Messages / FAQs / Advisories / Links to Messages / FAQs / Advisories / Links to

outside resources/ Current Fraud linkoutside resources/ Current Fraud link

Action Plan Ideas - EducationAction Plan Ideas - Education

Page 34: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3434

Phishing

Action Plan Ideas - EducationAction Plan Ideas - Education

Page 35: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3535

Phishing

Action Plan Ideas - EducationAction Plan Ideas - Education

Page 36: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3636

Phishing

Action Plan Ideas - EducationAction Plan Ideas - Education

Page 37: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3737

Phishing

Action Plan Ideas - EducationAction Plan Ideas - Education

Page 38: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3838

Phishing

Member / CustomerMember / Customer

ContentContent

We will never ask for xxx via e-mailWe will never ask for xxx via e-mail

We will never alert you of xxx via e-mailWe will never alert you of xxx via e-mail

Always feel free to call us at # on statementAlways feel free to call us at # on statement

Always type in our site URL (see Always type in our site URL (see

statement / newsletter / previous bookmark)statement / newsletter / previous bookmark)

Action Plan Ideas - EducationAction Plan Ideas - Education

Page 39: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

3939

Phishing

Member / CustomerMember / Customer

Content (cont’d)Content (cont’d)

Sites can be convincingly copiedSites can be convincingly copied

Report suspicious e-mails & sites Report suspicious e-mails & sites

Where to get more advice on phishingWhere to get more advice on phishing

Importance of patchingImportance of patching

How to validate site (via cert or seal)How to validate site (via cert or seal)

Where to go for ID theft helpWhere to go for ID theft help

Action Plan Ideas - EducationAction Plan Ideas - Education

Page 40: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4040

Phishing

ConsiderationsConsiderations

Review related regulatory issuances, such Review related regulatory issuances, such

as:as:

NCUA LTR 02-CU-16 Protection of CU NCUA LTR 02-CU-16 Protection of CU

Internet Addresses* Internet Addresses*

FFIEC Information Security Booklet*FFIEC Information Security Booklet*

**See IS&T portion of NCUA’s websiteSee IS&T portion of NCUA’s website

Action Plan Ideas – Action Plan Ideas – Protection of FI’s Online IdentityProtection of FI’s Online Identity

Page 41: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4141

Phishing

Considerations (cont’d)Considerations (cont’d)

Keep certificates up-to-dateKeep certificates up-to-date

Practice good domain name controlsPractice good domain name controls

Don’t let URLs lapseDon’t let URLs lapse

Purchase similar URLsPurchase similar URLs

Search for similar URLsSearch for similar URLs

Action Plan Ideas – Action Plan Ideas – Protection of FI’s Online IdentityProtection of FI’s Online Identity

Page 42: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4242

Phishing

Notification ConsiderationsNotification Considerations

AttorneyAttorney

Law EnforcementLaw Enforcement

Bonding Co.Bonding Co.

Regulator(s)Regulator(s)

Domain host / owner / registrarDomain host / owner / registrar

Members / CustomersMembers / Customers

Action Plan Ideas - ResponseAction Plan Ideas - Response

Page 43: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4343

Phishing

Notification Considerations (cont’d)Notification Considerations (cont’d)

PressPress

Suspicious Activity ReportSuspicious Activity Report

Internet Fraud Compliant CenterInternet Fraud Compliant Center

FTCFTC

Industry Fraud Associations / GroupsIndustry Fraud Associations / Groups

Action Plan Ideas - ResponseAction Plan Ideas - Response

Page 44: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4444

Phishing

NCUA NCUA (www.ncua.gov)(www.ncua.gov)

Specific guidance:Specific guidance:

(8/03) LTR 03-CU-12 Fraudulent (8/03) LTR 03-CU-12 Fraudulent Newspaper Advertisements, and Websites Newspaper Advertisements, and Websites by Entities Claiming to be Credit Unionsby Entities Claiming to be Credit Unions

(04/04) LTR 04-CU-05 Fraudulent E-Mail (04/04) LTR 04-CU-05 Fraudulent E-Mail SchemesSchemes

(05/04) LTR 04-CU-06 E-Mail & Internet (05/04) LTR 04-CU-06 E-Mail & Internet Related Fraudulent Schemes GuidanceRelated Fraudulent Schemes Guidance

Responses & Resource ExamplesResponses & Resource Examples

Page 45: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4545

Phishing

NCUA NCUA (www.ncua.gov)(www.ncua.gov)

Related guidance:Related guidance: (12/02) LTR 02-CU-16 Protection of CU (12/02) LTR 02-CU-16 Protection of CU

Internet AddressesInternet Addresses (7/02) LTR 02-FCU-11 Tips to Safely (7/02) LTR 02-FCU-11 Tips to Safely

Conduct Financial Transactions Over Conduct Financial Transactions Over the Internetthe Internet

(09/01) LTR 01-CU-09 Identity Theft & (09/01) LTR 01-CU-09 Identity Theft & Pretext CallingPretext Calling

Working with FBI, FFIEC, SSAs, Working with FBI, FFIEC, SSAs, Newspaper AssociationNewspaper Association

Article in NCUA NewsArticle in NCUA News

Responses & Resource ExamplesResponses & Resource Examples

Page 46: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4646

Phishing

FDIC FDIC (www.fdic.gov)(www.fdic.gov)

(03/04) FIL-27-2004 Guidance on (03/04) FIL-27-2004 Guidance on Safeguarding Customers Against E-Safeguarding Customers Against E-mail & Internet-Related Fraudulent mail & Internet-Related Fraudulent SchemesSchemes

OTS OTS (www.ots.gov)(www.ots.gov)

(03/04) Memo – Phishing & E-mail (03/04) Memo – Phishing & E-mail ScamsScams

Responses & Resource ExamplesResponses & Resource Examples

Page 47: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4747

Phishing

OCC OCC (www.occ.gov)(www.occ.gov)

(09/03) Alert – Customer Identity Theft: E-(09/03) Alert – Customer Identity Theft: E-mail-Related Fraud Threatsmail-Related Fraud Threats

FI Trade AssociationsFI Trade Associations Most have issued guidance to FIs and Most have issued guidance to FIs and

consumersconsumers

FI Industry ConsortiumFI Industry Consortium Subcommittee addressing issueSubcommittee addressing issue

Responses & Resource ExamplesResponses & Resource Examples

Page 48: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4848

Phishing

FFIEC FFIEC (www.ffiec.gov)(www.ffiec.gov) Information Security BookletInformation Security Booklet

FTC FTC (www.ftc.gov)(www.ftc.gov)

(7/03) How Not to Get Hooked by the (7/03) How Not to Get Hooked by the “Phishing” Scam“Phishing” Scam

(9/02) ID Theft: When Bad Things Happen to (9/02) ID Theft: When Bad Things Happen to Your Good NameYour Good Name

Can report incidentsCan report incidents

Responses & Resource ExamplesResponses & Resource Examples

Page 49: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

4949

Phishing

Treasury Treasury (www.treas.gov)(www.treas.gov)

(1/04) Statement Warning about Recent (1/04) Statement Warning about Recent Fraudulent E-mail ScamsFraudulent E-mail Scams

Dept. of Justice Dept. of Justice (www.usdoj.gov & (www.usdoj.gov & www.cybercrime.gov)www.cybercrime.gov)

(2004) Special Report on “Phishing”(2004) Special Report on “Phishing”• Also includes links to on-line protection & Also includes links to on-line protection &

response notifications from various FIs.response notifications from various FIs.

FBI FBI (www.fbi.gov & www.ifccfbi.gov)(www.fbi.gov & www.ifccfbi.gov)

(7/03) FBI Says Web “Spoofing” Scams are a (7/03) FBI Says Web “Spoofing” Scams are a Growing ProblemGrowing Problem

Also see Internet Fraud Complaint Center Also see Internet Fraud Complaint Center (IFCCBI) for info on reporting incidents(IFCCBI) for info on reporting incidents

Responses & Resource ExamplesResponses & Resource Examples

Page 50: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

5050

Phishing

Better Business Bureau Better Business Bureau (www.bbb.org/phishing)(www.bbb.org/phishing)

Issuing media alerts through its national and local Issuing media alerts through its national and local offices.offices.

www.callforaction.orgwww.callforaction.org International, non-profit network of consumer International, non-profit network of consumer

hotlines and information. Worked with Visa to hotlines and information. Worked with Visa to develop much of its material on ID theft.develop much of its material on ID theft.

Responses & Resource ExamplesResponses & Resource Examples

Page 51: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

5151

Phishing

Anti-Phishing Working GroupAnti-Phishing Working Group(www.antiphising.org)(www.antiphising.org)

Industry association w/comprehensive resources Industry association w/comprehensive resources (i.e. phishing archive, reporting, consumer (i.e. phishing archive, reporting, consumer guidance, resource links/papers, special reports, guidance, resource links/papers, special reports, links to FIs/other orgs with anti-phishing consumer links to FIs/other orgs with anti-phishing consumer guidance on their websites, etc.)guidance on their websites, etc.)

Information Technology Association Information Technology Association of America of America (www.itaa.org)(www.itaa.org)

Coalition (includes to MS, Amazon, eBay) to curb Coalition (includes to MS, Amazon, eBay) to curb ID theftID theft

Responses & Resource ExamplesResponses & Resource Examples

Page 52: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

5252

Phishing

Trusted Electronic Trusted Electronic Communications ForumCommunications Forum

(www.tecf.org)(www.tecf.org)

New standards and research effort to focus New standards and research effort to focus on establishing new standards for on establishing new standards for protecting consumers and teach end users protecting consumers and teach end users how to better protect themselves. how to better protect themselves.

Several well-known financial services Several well-known financial services organizations represented.organizations represented.

Responses & Resource ExamplesResponses & Resource Examples

Page 53: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

5353

Phishing

Spam, social engineering, urgencySpam, social engineering, urgency Increasing # of eventsIncreasing # of events FIs targetedFIs targeted Variations appearingVariations appearing Risk to FIs and consumersRisk to FIs and consumers Proactive action neededProactive action needed

SummarySummary

Page 54: Computer Fraud – “Phishing” Identity Theft in Financial Services 6/30/04.

5454

Phishing

QuotesQuotes

““Bogus e-mails that try to trick customers Bogus e-mails that try to trick customers into giving out personal information are into giving out personal information are the hottest, and most troubling, new the hottest, and most troubling, new scam on the Internet.”scam on the Internet.”

Jana MonroeJana Monroe

Assistant DirectorAssistant Director

Cyber Division of FBICyber Division of FBI