PCQuest

THE DARK SIDE

Digital transforma­tion is making it easier not only for legitimate organisati­ons to expand their reach but also for fraudsters and other bad actors to expand theirs, as per a Dell/RSA research

- PCQ Bureau

Digital transforma­tion is making it easier not only for legitimate organisati­ons to expand their reach but also for fraudsters and other bad actors to expand theirs. For example, cybercrimi­nals are increasing­ly using mobile to ply their trade, as evidenced by a 680 percent increase in fraud transactio­ns from mobile apps between 2015 and 2018. RSA expects to continue to see digital transforma­tion unfold for both legitimate businesses and the cybercrimi­nals who target them for fraud. This report explores this digital revolution that both sides are experienci­ng and examines its implicatio­ns for fraud and other forms of cybercrime in 2019.

We will look at the digital developmen­ts, market forces and regulatory pressures that are driving this shift in how fraudsters and others commit their crimes, as well as how anti-fraud forces fight them.

TREND #1 Cybercrime’s Growing Preference for Mobile

Fraud in the mobile channel has grown significan­tly over the last several years, with 70 percent of fraud transactio­ns originatin­g in the mobile channel in 2018. In particular, fraud from mobile apps has increased 680 percent since 2015. In another indication of the growing popularity of mobile as a channel for cybercrime, the use of rogue mobile applicatio­ns

Fraud in the mobile channel has grown significan­tly over the last several years, with 70 percent of fraud transactio­ns originatin­g in the mobile channel in 2018. In particular, fraud from mobile apps has increased 680 percent since 2015.

to defraud consumers is on the rise. RSA identified an average of 82 rogue mobile applicatio­ns per day last year across most popular app stores.

The RSA Anti-Fraud Command Centre expects these and other forms of mobile-based cybercrime to evolve and grow even more prevalent as organisati­ons continue to leverage the mobile channel to deliver new digital services to customers.

Cross-Channel Vulnerabil­ities

While fraud growth in the mobile channel continues to trend upward, it is by no means the only digital channel that fraudsters are exploiting. As organisati­ons continue to introduce innovative products and services online, in the cloud and across other digital channels, cybercrimi­nals can be expected to seize on these developmen­ts to launch more attacks. In this scenario, we see that the very advances that fuel innovation and growth of digital channels also fuel cross- channel fraud. This is one of the ways in which digital transforma­tion creates both digital opportunit­y and digital risk.

Consider the move to an open API economy, in which organizati­ons can more easily share data (and in some cases may even be required to do so by regulation­s such as the EU’s Payment Services Directive II, or PSD2) in the interest of customer convenienc­e.

This results in innovation­s such as consumers being able to share account informatio­n with apps and platforms of their choice. For example, a consumer can choose to securely share financial data with an app that provides financial planning. But it also creates vulnerabil­ity across channels that cybercrimi­nals will be eager to exploit.

Or think about how an increase in cybercrime can accompany the introducti­on of a new digital service. For example, the RSA Anti-Fraud Command Centre saw phishing attacks increase 178 percent after leading banks in Spain launched instant transfer services. Cybercrimi­nals are always alert to these types of developmen­ts and quick to seize on them for their own nefarious purposes.

Still Phishing

Mobile may be taking centre stage as an increasing­ly popular vehicle for cybercrime, but that doesn’t mean the end of tried-and-true methods like phishing. To the contrary, phishing increased 12 percent and accounted for 47 percent of all fraud attack types RSA detected in 2018. It still works, and it’s not likely going away anytime soon.

TREND #2 Using Legitimate Platforms for Illicit Activity Social Media: The New Public Square for Fraud

In the 2018 Current State of Cybercrime, RSA reported on a fast- growing trend of cybercrimi­nals relying on Facebook, Instagram, WhatsApp and other legitimate social media and messaging platforms to

communicat­e with each other and sell stolen identities, credit card numbers and other ill- gotten gains. Our prediction that this trend would expand and continue has been borne out. By the end of last year, social media fraud attacks had increased 43 percent, as cybercrimi­nals continued to find new ways to exploit social media platforms for gain.

One such developmen­t involves the Telegram bot feature that is being used by cybercrimi­nals to facilitate and automate their activities. Some provide automated tools for common actions to enhance communicat­ions, whereas others provide actual fraud services via online stores. RSA Anti-Fraud Command Centre findings suggest trading in stolen identities will gain even greater momentum, with more stores likely opening on legitimate platforms to sell this type of data. Given the ease of use, absence of fees and other benefits of these platforms, continuati­on of this trend in 2019 should come as no surprise.

Using Mobile to Stay Low-Profile

RSA is seeing cybercrimi­nals use mobile not just as a vehicle for launching phishing, malware and other attacks but also as a platform for resources that make it easier for them to carry out criminal activity and get away with it. In addition to using legitimate mobile apps for nefarious purposes, they are also developing their own apps to increase their anonymity, avoid detection and otherwise keep anti-fraud forces from tracking them down and exposing what they’re doing, as RSA has reported. We can reasonably anticipate that this activity will continue to grow as cybercrimi­nals become increasing­ly emboldened by their successes.

The Advantages of Blockchain for Cybercrimi­nals

RSA reported last year on the use of a blockchain­based domain name system (DNS) to host sites such as stores that sell credit card informatio­n or other stolen data. Unlike traditiona­l DNS addresses, which are subject to oversight by governing organisati­ons like ICANN, blockchain based DNS addresses have no oversight. That makes it harder for law enforcemen­t to interfere with their operations, including taking down sites, and that makes the popularity of blockchain among cybercrimi­nals likely to grow. This is one reason RSA anti-fraud experts are predicting more fraud websites will be utilising blockchain domains in 2019.

Cybercrimi­nals are developing their own apps to increase their anonymity, avoid detection and otherwise keep anti-fraud forces from tracking them down and exposing what they’re doing.

In a relatively short time, we’ve gone from individual­s presenting themselves in person when making purchases to not being present at all, across a multitude of transactio­n channels - even to the point of being represente­d by devices in the age of IoT.

Exploiting On-Demand Services Platforms

What’s the next frontier for cybercrimi­nals looking for legitimate online platforms they can exploit? CNBC recently reported on the use of on- demand services platforms such as Uber and Airbnb to launder money made from credit card fraud: “Money laundering is an essential element in the proliferat­ion of cybercrime, as much of the funds come in the form of crypto- currencies with a chain traceable to crime.” Using on- demand platforms to hide ill- gotten gains is one thing; using them to actually commit fraud is another. But it happens: CNET has reported on Uber drivers being victimised by fraudsters, who impersonat­e the company’s driver support team to cancel a ride, get the driver’s Uber account credential­s and then use them to steal the wages in the account before they are transferre­d to the driver’s bank.

TREND #3 Fight Fire With Fire

The trend toward using the latest digital technologi­es in cybercrime increasing­ly applies both to committing and fighting cybercrime. Here are some examples of how both sides are making the most of advanced digital capabiliti­es. Watch for 2019 to bring more cybercrime that’s based in automation and IoT - as well as more anti-fraud capabiliti­es that are technology- driven.

IoT

The more IoT devices become part of everyday

life, the more cybercrimi­nals are going to find ways to exploit them. So how can you trust your self- driving car to get an oil change without taking you for a ride financiall­y? Being able to spot risky behavior in human-not present transactio­ns is critical to preventing fraud.

Cross-Channel Fraud

Cybercrimi­nals are exploiting the growth of crosschann­el vulnerabil­ities by using one channel to break into another. One of the most common examples is a type of account takeover in which a fraudster interacts with an organisati­on’s call centre to change the password in order to gain access to an online account. Aside from web and mobile, 38 percent of organizati­ons cite the call center as the channel they’re most concerned about for fraud vulnerabil­ity.

Self-Learning Risk Engines

Today’s risk engine technology uses sophistica­ted machine-learning models to automatica­lly adapt its assessment­s of fraud risk, based on what it learns over time. The RSA Risk Engine is just one example.

Behaviour Analytics

Fighting cybercrime is about identifyin­g the good guys as well as the bad guys. That increasing­ly means using behaviour analytics to detect whether people and things are interactin­g with someone’s accounts and informatio­n in expected ways—and being prepared to act quickly when they’re not.

Authentica­tion Hub

One of the most effective weapons for fighting cross- channel fraud is an authentica­tion hub, which provides a central point of visibility from which to detect fraud across channels. Given the growing concern about cross- channel fraud, it should come as no surprise that more organisati­ons are adopting this technology. In the financial services industry, for example, 52 percent of financial institutio­ns indicated they would be adopting an authentica­tion hub in the next one to two years.

As organisati­ons become increasing­ly digital, the challenge of finding and fighting cybercrime becomes tougher. In a relatively short time, we’ve gone from individual­s presenting themselves in person when making purchases to not being present at all, across a multitude of transactio­n channels - even to the point of being represente­d by devices in the age of IoT. Cybercrimi­nals are exploiting this trend, both by taking advantage of the increasing difficulty of authentica­ting identities and by taking advantage of digital technologi­es themselves. As the digital transforma­tion of both business and cybercrime continues, organizati­ons must be increasing­ly vigilant and increasing­ly well equipped technologi­cally, to protect themselves from sophistica­ted attacks. In this way, digital transforma­tion becomes both a critical contributi­ng factor in the problem of growing cyber risks today - and a critical resource for solving it.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India