Fraud Auditing, Detection, and Prevention Blog

A Peek Behind the Curtain to Look at Account Take Over Attacks

Sep 17, 2024 1:20:02 PM / by Leonard W. Vona

Businesses face a growing threat of account take over attacks as fraudsters become more sophisticated and take advantage of advances in technology. This week, we're pulling back the curtain to take a closer look at them and how to add this to your fraud protection strategy. 

Fraud Trivia: Phishing

Phishing is a prevalent type of social engineering that aims to steal data from the message receiver. Typically, this data includes personal information, usernames and passwords, and/or financial information. Phishing is consistently named as one of the top 5 types of cybersecurity attacks.

1. What are the four types of Phishing? Spear, whaling, smishing and vishing. Some lists also add emailing and search engine as a category.
2. What is evil twin phishing? a cyberattack in which a hacker creates a fake Wi-Fi access point that mimics a legitimate network and tricks users into connecting.
3. What is whaling? A whaling attack is a type of spear-phishing attack directed at high-level executives where attackers masquerade as legitimate, known, and trusted entities and encourage a victim to share extremely sensitive information.
4. Where did the word phishing originate? Famous hacker and spammer Khan C. Smith is credited to have coined the term phishing. He first introduced the term “phishing” in the Usenet newsgroup after AOL rolled out measures to prevent using fake, algorithmically generated credit card numbers to open accounts.

 

Continuing with our theme, look behind the curtain we need to highlight cyber fraud perpetrated by account take over.

 Account Take Over Attacks Threaten Business Success

What is an account takeover (ATO) attack? An account takeover attack occurs when a malicious actor gains unauthorized access to a user's account credentials and assumes control of the account to commit fraud, data theft, or other malicious activities. Other ATO schemes for business include credential stuffing, malware attacking, man in the middle attacks (MitM), and SIM card swapping 

It can all be done in the background without the account owner noticing a thing. It happens to individuals, which can be devastating. But it also happens to companies of all sizes siphoning off profits and potentially causing widespread damage.

There are many reasons why I choose to write about this subject. First my friend Sheila Sellers suggested I write a blog on account take over. Second, when I travel abroad to speak, I always search for fraud in that country. The most common topic is account take over. Lastly, account takeover is a critical fraud risk assessment topic.

In fraud identification, the starting point is identifying who is the perpetrator, the next step is to rank the sophistication of the perpetrator. For account takeover of a company, the perpetrator is external to your organization and most likely part of a crime group. We can assume their fraud sophistication is high and they have no fear of getting caught. This is despite the recent The Fraud Risk Management Guideline that suggests getting caught is a deterrent.

Account Take Over can then be linked to every business system and most likely every fraud scheme. Coud the a hacker add an employee (ghost employee) or set up a dummy vendor simply drain your bank account? Yes, to all.

Just a Few Scary Statistics on this Topic

Juniper Research anticipates global losses from online payment fraud to surpass $362 billion between 2023 and 2028, including a staggering projected loss of $91 billion in 2028 alone.

E-commerce, in particular, is witnessing a significant surge in fraudulent activities, with $48 billion expected to be lost to fraud in 2023, according to Forbes.

According to Aberdeen, financial services companies can lose up to 8.3% of their annual revenue to ATO attacks.

 It’s estimated in the Cybersecurity Market Review that in the first quarter of 2022, online fraud attacks rose by 233% worldwide. During the same period, the number of online transactions only increased by 65%.

Approximately 26% of Companies Are Targeted by Weekly ATO Attempts, according to Abnormal.

So, what should we do?

Our ability to manage this fraud risk is a combination of IT security controls and our traditional business controls. But before you start down your internal control world, I want to continue my stress of going down the knowledge road. Then and only then will you be able to look behind the curtain.

First you must understand Federal Financial Institutions Examination Council's latest guidance on the risks and risk management controls necessary to authenticate services in an Internet banking environment. For those of you not familiar with the acronym FFIEC:

The Federal Financial Institutions Examination Council (FFIEC) on behalf of its members1 is issuing this guidance titled Authentication and Access to Financial Institution Services and Systems (the Guidance) to provide financial institutions with examples of effective risk management principles and practices for access and authentication. These principles and practices address business and consumer customers, employees, and third parties that access digital banking services and financial institution information systems.

The second step should be to review the court cases involving account take over and banks. Here are two:

 

Choice Escrow and Land Title, LLC, Plaintiff – Appellant/Cross-Appellee, v. BancorpSouth Bank

United States Court of Appeals for the Eighth Circuit
754 F.3d 611 (2014)

“Choice Escrow and Land Title, LLC (Choice) (plaintiff) maintained an account at Bancorpsouth Bank (Bancorpsouth) (defendant). Bancorpsouth offered four security procedures to protect against fraud: a username and password for each online user; device authentication; dollar limits on transactions; and a dual-control system. The dual-control system required approval of two unique users to authenticate a payment order. Choice declined the dual-control security measure. A third party hacked into Choice’s online bank account and ordered a wire transfer of $440,000. Bancorpsouth processed the transfer. Choice brought suit against Bancorpsouth, seeking to recover the lost money. The district court granted Bancorpsouth’s motion for summary judgment. Choice appealed.”

Now that you know how a court ruled in this matter, you have industry knowledge. No, I do not expect you to be an attorney. But here are the questions you should be asking:

  • Has you company implemented all the security protocols offered by the financial institution?
  • If not, has management communicated these decisions at the senior management level? Board Level?

 

PATCO Construction ACH Fraud Ruling Reversed

Appeals Court Calls Bank's Security 'Commercially Unreasonable

The 43-page ruling describes the bank's security procedures as "commercially unreasonable," saying the institution should have detected and stopped the fraudulent transactions that drained more than $500,000 from PATCO's commercial account in 2009.

Here on the questions, you should be asking about your financial institution.

  • Is your company using a financial institution that is in compliance with FFIEC?
  • Has your financial institution made representations to your company in writing?
  • If not, why are using the financial institution.
  1.  
The last step is to review your contract with your bank. What obligations does the bank have for security? Is your bank in compliance with FFIEC? Has your organization waived the implementation of any security / control features suggested or offered by the bank?
  1.  
Now I realize these recommendations may sound USA centric. But every country has laws and court cases. You will need to do a little research to obtain your country specific laws and guidelines.

 

One last thought on this subject: “Although cybersecurity continues to improve by leaps and bounds, history demonstrates that no matter how good of a mousetrap we build, some people will stop at nothing until they’ve found a way to beat it.” For an analogy (my good friend Larry Harrington once said this to me) fraud risk mitigation on this subject would be like trying to change a tire on a car traveling at 100 miles an hour.

Lastly, it begs the question, do we spend our internal control money on prevention or detection?

Fraud Trivia: Hacks and Hackers

1. Who is called the god of hackers?
2. Which country is number one in cybercrime, according to PLOS ONE?
3. Which hacker inspired the movie War Games?
4. What is hacktivism?
5. What is the difference between Hackers and Hacktivism?

Demystifying Fraud eBook CTA

Topics: Fraud Auditing, Cyberattack,

Leonard W. Vona

Written by Leonard W. Vona

Leonard W. Vona has more than 40 years of diversified fraud auditing and forensic accounting experience. His firm, Fraud Auditing, Inc., advises clients in areas of fraud risk assessment, fraud data analytics, fraud auditing, fraud prevention and litigation support.

Demystifying Fraud eBook CTA

Recent Posts

Subscribe to Email Updates