Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/14/2018
02:00 PM
David Shefter
David Shefter
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital

Realizing the wide scope of fraud should be at the top of every business executive's to-do list. Here's some practical advice to help you stay safe.

Fraud has a long history. Old-fashioned confidence schemes, scams through the mail (such as fake lotteries) or via telephone (false bill and tax collectors), and cyberattacks all share a common thread: the desire for easy cash by criminals who may never see their victims in person.

Business executives and their teams of systems/security operations pros running any critical network of devices and people — from banks and government to tech companies, insurers, and retailers — are realizing just how pervasive fraud is. The biggest development is that fraudulent activity is coming from a multitude of sources, both human and machine. While ransomware and phishing attacks show up in the headlines, fraud is often an inside job, conducted by unhappy employees looking to make some quick money and get revenge on their company.

But the main goal of most thieves is financial gain; they can achieve it by obtaining personally identifiable information, manipulating identities, and making transactions. Or they can work from inside of a company, obtaining common business practices and policies so that they know how to avoid them; this could mean working closely with a compromised employee who also stands to gain. Here are four major types of fraud:

1) Identity theft: Criminals steal an existing identity to commit fraud and rob an institution; they often get one chance at this crime before their activities show up on a person’s credit card statement, and thus damages are limited. Much identity theft today is carried out via email and text-message phishing schemes, either targeting large groups (such as all employees at a company) or a single person, based on his or her worth.

2) Synthetic fraud: Some criminals have used various forms of synthetic fraud, meaning the creation of a fake identity. This can, for example, be used to steal new cars from dealers or receive tax refunds and other undeserved payments. Instead of using a real name, criminals choose a new "synthetic" identity and then pick up the car they ordered and drive away. Banks are now losing more to this crime than ever before — around $2 billion per year, per research from TransUnion.

3)  Ransomware: Ransomware has exploded in the past few years. Hospitals have been entangled with ransomware that encrypts their information and demands a Bitcoin ransom since 2016.  

4) Digital fraud: Cyberattacks have a different feel — but despite the high-tech gloss, the result is the same. The motivations for such attacks can be blackmail, embarrassment, or both. Think about the 2015 Sony Entertainment hack, competitive spying (such as how Uber spied on Lyft), and even political objectives. Lastly, fraud and attacks may be motivated by social objectives, such as how users of 4chan target their perceived enemies — in one case, the social blogging site Tumblr.  

Reputational damage can be severe for brands, particularly those centered around security or data quality. Because an increasing amount of the value of a company is tied up in its brand, the consequences of reputational damage are always increasing.

The results of fraud and cyberattacks are as varied as their potential targets. While having a few systems caught up in a botnet or having some cryptomining software running on your enterprise servers probably won't make too much of a dent, this can lead to worse consequences. Financial losses, legal or regulatory liability for organizations holding certain types of information or failing to meet service-level agreements, diminished competitive position, or loss of trust from customers and partners are all midlevel consequences of cyberattacks.

Be Prepared
Practical advice to help your company avoid the perils of fraud includes having an end-to-end strategy that starts with assessing the situation and taking a pre-emptive strike on losses. Of course, companies will vary in their tolerance for fraud, based on possible losses and exposure; and thus, their approach to fraud protection will need to fit appropriately. Here is some step-by-step best practices to follow: 

  • As a first step, set parameters for the types of fraudulent activity that your organization will be focused on.
  • Build a comprehensive list of the different ways someone could defraud your company, and then rank the easiest and most damaging paths to fraud.
  • Introduce more-thorough background checks for any employee or contractor connecting with the company in the hiring process.
  • Structure ongoing checks in the future, of the same persons. Case in point, no one with a criminal record (even for a petty crime) would be eligible to be employed by banking and credit institutions or government agencies.
  • For businesses that involve sales of products, such as retailers, think about warranty fraud. Realizing that a certain percentage of customers will make false claims for refunds, and building rules and policies against this, will enhance defenses.
  • More-advanced steps, applied to companies with thousands of transactions (such as medical or insurance billing), involve taking advantage of data mining, and setting up a system and algorithm that correlates past anomalous patterns that may be fraud, and then enables real-time alerts that stop the crime in action.
  • Get outside help: In many cases, hiring a consultant with deep experience in loss prevention can be a worthy investment. 
  • Seek the company of others in the fight against fraud. Many industries are creating consortiums and forums that gather business leaders together to share ideas, isolate new and emerging scams, and define best working practices that may become a new standard in the fight against fraud fight. 

As business leaders, start at the foundation of your business to prevent fraud, and teach your management and staff how to think about losses and the behaviors that may cause them. Put practices in place, starting with background checks, monitoring systems, and other methods that make outsiders earn trust.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are — and why they might be targeting your enterprise. Click for more information.

David Shefter serves as Chief Technology Officer for Ziften Technologies, where he brings an expansive background in security, IT, and emerging technologies for finance. Previously, he served as Senior VP of Innovation and Emerging Technology at Citigroup. Shefter is ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
jposhea3a
50%
50%
jposhea3a,
User Rank: Apprentice
6/15/2018 | 10:10:33 AM
cyber as a means of theft-by-abuse in addition to theft-by-breach
Thanks for the post David.

You highlight an important and overlooked aspect of cyber - that there is a lot to be gained by simply *abusing* existing processes.

Effective business processes should also be checking that 'correct behavior' and *only* 'correct behavior' is occurring in the normal course of a process operating, not simply checking for a limited set of bad behaviors (invalid dollar amounts, overdrafts, failed logins, etc).

Looking forward to seeing more content from you on DarkReading!
Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Ericka Chickowski, Contributing Writer,  12/2/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19647
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
CVE-2019-19648
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.
CVE-2019-19642
PUBLISHED: 2019-12-08
On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareNa...
CVE-2019-19637
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
CVE-2019-19638
PUBLISHED: 2019-12-08
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.