Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing

Ciarán Mc Mahon
Ciarán Mc MahonPsychologist at Ciarán Mc Mahon
the cyberpsychology of online
fraud
Dr Ciarán Mc Mahon
Central Bank, AMLD Away Day
November 6th, 2015
Introduction
• Emerging trends in cybercrime
• Architecture of compromise
• Victims of online fraud
• Psychology of cyberspace
• Cybercrime targeting financial institutions
Emerging trends In cybercrime
• Advanced persistent threats
– You are already hacked
• Cybercrime as a service
– everyone can be a hacker now
• Low-hanging fruit
– easier to steal a lamb than a sheep
• Blackmail
– information is the new money
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Europol iOCTA Report 2015
• Cybercrime
– remains a growth industry
– becoming more aggressive and confrontational
– an extremely diverse range of criminality
– blurring of the lines between Advanced Persistent
Threat (APT) groups and profit-driven
cybercriminals
Europol iOCTA Report 2015
• CaaS – Cybercrime as a Service
– grants easy access to criminal products and
services, enables a broad base of unskilled,
entrylevel cybercriminals to launch attacks of a
scale and scope disproportionate to their technical
capability and asymmetric in terms of risks, costs
and profits.
• Mc Afee – ‘The Hidden Data Economy’
http://www.mcafee.com/us/resources/reports/rp-hidden-data-
economy.pdf
• “Software-generated” is a valid combination of a primary account
number (PAN), an expiration date, and a CVV2 number that has
been generated by software. Sellers refer to a valid number
combination as a “Random.” Valid credit card number generators
can be purchased or found for free online.
• “Fullzinfo” means the seller supplies all of the details about the
card and its owner, such as full name, billing address, payment
card number, expiration date, PIN number, social security
number, mother’s maiden name, date of birth, and CVV2.
The Hidden Data Economy
• Data is a key commodity in the digital
underground and almost any type of data is
of value to someone; whether it can be used
for the furtherance of fraud or for immediate
financial gain. (Europol iOCTA)
recent EU breaches
Europol iOCTA Report 2015
“While it is possible for organisations to
invest in technological means to protect
themselves, the human element will always
remain as an unpredictable variable and a
potential vulnerability. As such social
engineering is a common and effective tool
used for anything from complex multi-stage
attacks to fraud. “
PWC The Global State of Information Security Survey 2015
http://www.pwchk.com/webmedia/doc/635527689739110925_rcs_info_security_2015.pdf
Information Age - http://www.information-age.com/technology/security/123458744/2015-year-cyber-security-shows-its-human-side
Grant Forks Herald http://www.grandforksherald.com/news/business/3847833-cyber-security-professionals-say-employees-are-
biggest-threat-network-security
Databarracks Data Health Check - http://datahealthcheck.databarracks.com/
Clearswift -
https://www.clearswift.com/sites/default/files/documents/Infographics/Clearswift_What_is_your_employees_price_infographic.pdf
CIO - http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will-dominate-2015.html
Cyberpsychology is an emerging discipline which involves the study of the human mind and behaviour in the context of information
communication technology. It represents an incredibly valuable source of insight into information security behaviour.
Photo from Project Apollo Archive https://www.flickr.com/photos/projectapolloarchive/21713955181
• Presence
• The internet is designed to make communication effortless, so we should feel
totally immersed in it.
• A major goal for all ICT engineers is to ensure that users of their technology are
totally unaware of all of the computations and calculations that are going on
behind the scenes (Lombard & Ditton, 1997).
• Users act like ICT is invisible - “for mediated exchange to work as interpersonal
communication, there must be tacit agreement that the participants will proceed
as though they are communicating face to face” (Cathcart and Gumpert, 1986, p.
116)
• Cathcart, R., & Gumpert, G. (1986). The person-computer interaction: A unique
source. In B. D. Ruben (Ed.), Information and behavior (vo.l 1) (pp. 113–124).
New Brunswick, NJ: Transaction Publishers.
• Lombard, M., Ditton, T., & Media, M. (1997). At the heart of it all: The concept
of presence. Journal of Computer-Mediated Communication, 3(2), 1–23.
• Photo from https://pixabay.com/en/bokeh-background-
abstract-colorful-587113/z
•• LurkingLurking
• Anywhere up to 90% of the visitors to any online forum will read
everything, will be invisible and will not participate to any
meaningful or noticeable degree (Nonnecke, East, & Preece, 2001).
• Consequently it is very likely that when an employee is online:
they may assume that the only ones who they can see talking to
them are the only ones who are present. This is where insider
threats slip up – they don’t think anyone can see them.
• Nonnecke, B., East, K. S., & Preece, J. (2001). Why lurkers lurk.
In Americas Conference on Information Systems (pp. 1–10).
• Photo from https://pixabay.com/en/rabbit-hare-bunny-costume-
animal-542554/
• Self-disclosure
• When online, people are more likely to reveal personal information.
• People tend to reveal most personal information online when they are in
certain conditions (Joinson, 2001), namely heightened private self-
awareness and reduced public self-awareness.
• In other words, when someone is focussing on themselves, their person
and body, and feels anonymous and unseen, they are likely to reveal
information about themselves that they would not in a face-to-face
context.
• Self-disclosure of this kind likely a critical factor in cyberbullying - it’s
also a pretty useful tool in honeypot operations.
• Joinson, A. N. (2001). Self-disclosure in computer-mediated
communication: The role of self-awareness and visual anonymity.
European Journal of Psychological Assessment, 31, 177–192.
• Photo from https://picjumbo.com/colorful-funfair-bokeh/
• Online disinhibition
• When online, people loosen up, feel less restrained, and express
themselves more openly
• Everyday users on the Internet—as well as clinicians and
researchers have noted how people say and do things in
cyberspace that they wouldn’t ordinarily say and do in the face-to-
face world. They loosen up, feel less restrained, and express
themselves more openly. So pervasive is the phenomenon that a
term has surfaced for it: the online disinhibition effect. (Suler,
2004, p.321)
• Suler, J. (2004). The online disinhibition effect. CyberPsychology
& Behavior, 7(3), 321–326.
• Photo from https://pixabay.com/en/concert-people-crowd-audience-
731227
• Minimisation of status and authority
• In the traditional philosophy of the internet there is no centralised
control, everyone is equal, and its only purpose is sharing ideas
• While online a person’s status in the face-to-face world may not be
known to others and may not have as much impact. Authority
figures express their status and power in their dress, body
language, and in the trappings of their environmental settings. The
absence of those cues in the text environments of cyberspace
reduces the impact of their authority. (Suler, 2004, p. 324)
• Suler, J. (2004). The online disinhibition effect. CyberPsychology
& Behavior, 7(3), 321–326.
• Photo from http://www.gratisography.com/
• Traditionally, society is built on a close relationship
between authoritative texts and authority figures
• Knowledge linked to power, not only assumes the
authority of 'the truth' but has the power to make itself
true. All knowledge, once applied in the real world, has
effects, and in that sense at least, 'becomes true.'
Knowledge, once used to regulate the conduct of others,
entails constraint, regulation and the disciplining of
practice. (Foucault,1977, p.27)
• Foucault, M. (1977). Discipline and punish. London:
Tavistock.
• Photo from
https://www.flickr.com/photos/drgbb/2227885657
• Web 2.0 has the power to radically change these knowledge and power relationships
– “Wikipedia provokes divisive debates precisely because academics realise that Web 2.0 has the
potential to radically transform pedagogic and research practices in higher education – and hence
irrevocably change traditional academic power and authority arrangements.” Eijkman (2010, p.
182)
• Eijkman, H. (2010). Academics and Wikipedia: Reframing Web 2.0 as a disruptor of traditional
academic power-knowledge arrangements. Campus-Wide Information Systems.
http://doi.org/10.1108/10650741011054474
• Photo from the Opte Project http://www.opte.org/the-internet/
• How do leaderless networks work? Quote from a book on direct
action, about the Occupy Wall Street Movement:
– “Before long, people were organizing them everywhere. Someone
came up with the theory that the result was a kind of global brain: the
interconnections of communication are such that you can imagine
people not just communicating but acting, and acting damn
effectively, without leadership, a secretariat, without even formal
information channels. It's a little like ants meeting in an ant-heap, all
waving their antennae at each other, and information just gets
around-even though there's no chain of command or even
hierarchical information structure. Of course it would be impossible
without the Internet.” (Graeber, 2009)
• Graeber, D. (2009). Direct Action. An Ethnography. Oakland,
CA: AK Press
• Photo from http://anondesign.deviantart.com/art/Anonymous-
Logo-with-Slogan-Perfect-Symmetry-408650529
• http://www.csmonitor.com/USA/USA-
Update/2015/0605/OPM-hack-What-criminal-hackers-can-
do-with-your-personal-data-video
• OPM offering potentially affected individuals
• credit report access,
• credit monitoring and
• identify theft insurance and recovery services
• As of yesterday, less than a quarter of the 21m affected
had been notified
• http://news.yahoo.com/three-quarters-u-opm-hack-victims-
still-dark-184307823.html
• From
http://20committee.com/2015/06/08/hacking-
as-offensive-counterintelligence/
Offensive Counterintelligence
value of a hacked email account
• Image from
http://krebsonsecurity.com/2013/06/the-value-of-
a-hacked-email-account/
• Phishing: 23% will open message, further 11%
will open attachment
Verizon, 2015 Data Breach Investigations Report,
http://www. verizonenterprise.com/DBIR/2015/,
2015
attack lifecycle
• From Mandiant’s APT1 report -
http://intelreport.mandiant.com/Mandiant_A
PT1_Report.pdf
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
would you click?
VICTIMOLOGY ONLINE
Victims of Phishing
• Jagatic, Johnson, Jakobsson, &
Menczer (2007)
Victims of Phishing
• Rocha Flores, Holm, Nohlberg &
Ekstedt (2015)
– Resistance to phishing:
• Intention to resist social engineering
• general information security awareness
• formal IS training
• computer experience
Victims of Phishing
• Alsharnouby, Alaca, & Chiasson (2015)
– eye tracking testing legitimacy of websites
• users successfully detected only 53% of phishing
websites
– even when primed to identify them
• generally spend very little time gazing at security
indicators
• general technical proficiency does not correlate with
improved detection scores.
Victims of fraud
• van Wilsem (2011)
– large-scale victimization survey data among the
Dutch general population (N = 6,201)
– those with low self-control run substantially
higher victimization risk
– as well as active online shoppers and people
participating in online forums.
Victims of fraud
• Button, Nicholls, Kerr, & Owen (2014)
• depth interviews & focus groups with online
fraud victims: reasons
– the diversity of frauds
– small amounts of money sought
– authority and legitimacy displayed by scammers
– visceral appeals
– embarrassing frauds
– pressure and coercion
– grooming
– fraud at a distance and multiple techniques
Victims of fraud
• Cross (2013)
– discourse surrounding online fraud is heavily
premised on idea that victims are both greedy
and gullible
– need to examine discourse on ‘victim blaming’ in
online fraud
– current discourse does not take into account the
level of deception and the targeting of
vulnerability that is employed by the offender in
perpetrating this type of crime
Victims of fraud
• Cross (2015)
– interviews with 85 seniors across Queensland, Australia,
who received fraudulent emails,
– victim-blaming discourse as an overwhelmingly powerful
and controlling discourse about online fraud
victimization.
– humour reinforces this discourse by isolating victims and
impacting on their ability to disclose to those around
them.
– Identifying and challenging this victim-blaming discourse,
as well as the role of humour and its social acceptance, is
a first step in the facilitation of victim recovery and future
well-being.
Victims of fraud
• Cross (2015) How to tackle cyber crime
before people even know they’re a victim
(The Conversation)
– Project Sunbird
Project Sunbird
• Identification
– police identify people who are sending money to five
known high-risk countries
• Intervention
– Department of Commerce send a letter to each person,
notifying them that they may be victims of fraud
• Interruption
– stoppage of payments and funds
• Intelligence
– from letter recipients from both agencies
• Investigation
– police on local and overseas offenders
cybercrime targeting Banks
• CEO fraud
– ‘business e-mail compromise’ or “Fake President”
• Bank malware
• Ransomware & extortion
• DDOS
CEO fraud
• FBI report January 2015
– October 2013 to August 2015
– Combined victims (US & non US): 8,179
– Combined exposed dollar loss: $798,897,959.25
– transfers reported to 72 countries;
– majority of transfers to Asian banks located
within China and Hong Kong
CEO fraud - Scenario
1. Establish contact
– impersonate a group executive (e.g. the president, CEO, CFO) or a trusted partner
(e.g. lawyers, notaries, auditors, accountants etc.) o
– contact a specific employee, manager, an accounts payable clerk
2. Urgent and exceptional request
– request an urgent bank transfer of a large amount to a foreign bank account.
3. Persuasive dialog
– Use of authority: It is an order to do this
– Secrecy: This project is still secret and its success depends on this transaction
– Valorization: I count on you for your efficiency and discretion
– Pressure: The success of the project rests on your shoulders
4. Transfer order
– Being unsuspicious, transfer will be done manually (using a direct phone call or fax to
a bank).
– does not follow the standard procedure but may be used by companies in urgent cases
or for flexibility reasons as an alternative to the standard procedure.
CEO fraud - Prevention
1. Inform staff that this fraud is ongoing
2. Test staff knowledge of extraordinary
transfer procedure
3. Include 2FA in extraordinary transfer
procedure
4. Ensure that staff know who CISO is
banking malware
• From Kaspersky Lab report Q3 2015
– blocked 625,669 online banking stealing
attempts, which is 17.2% lower than in Q2 2015
– Windows 7 x64 Edition accounted for 42.2% of
all banking Trojan attacks
– 2,516 detected mobile banker Trojans, which is a
fourfold increase on the previous quarter
Ransomware and extortion
• Increasingly directed at banks
– DDOS
• take down website (embarrassing)
– Exfiltration
• will release customer data if not paid
Ransomware and extortion
• Hackers Release Swiss Bank Data Over $12K
Unpaid Ransom (BloombergBusiness)
– small-scale demand -- $12,000 prevalence and ease of
a rapidly growing extortion industry that deals in
stolen or hijacked data
• Hacker who demanded Bitcoin from banks
jailed for blackmail and child pornography
(TheJournal)
– used a phishing program to obtain customer banking
details before threatening to release them if he was
not paid
Blackmail
• “The Ultimate Invasion of Privacy” (Slate)
– “How a Chinese hacker used my private
nickname, personal emails, and sensitive
documents to try to blackmail me.”
– US businessman working in China
Ransomware and extortion
• Bitcoin cyberextortionists are blackmailing
banks, corporations (arstechnica)
– intended to harass, extort and ultimately
embarrass the victim publicly
– between 1 and 100 bitcoins (about £160 to
£16,000), a deadline for compliance, and warning
of a “small, demonstrative attack.
EU Directives
• Network and Information Security
• General Data Protection Regulation
– Both in the pipeline for some time and still being
negotiated
• Both have certain issues around mandatory reporting
of data breaches, whether to customers or regulators,
depending on the size and nature of the organisation
• Reputational risk is clearly a very significant factor
here
COMBATING CYBERCRIME
Strategies for improving internal organisational security
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
• Emphasis should be on delegation and empowerment
of employees
– “an autocratic stance inhibits effective information
security and highlights ways that this is expressed by
experienced Chief Information Security Officers through
their use of discourse. They need to develop an identity
within the organisation where they are seen to help
employees discuss, and make decisions about,
information security. The emphasis should be on
delegation and empowerment of employees with an
acceptance that, as a result, mistakes and errors may
occur. (Ashenden & Sasse, 2013)
• Photo from http://www.freeimages.com/photo/ducks-
in-a-row-1316756
• Select a champion – not necessarily a technical
expert – but who can motivate and persuade
– “The results of this study give credence to the role of
a ‘champion’ within the organization, specifically
alluding to the influence this person may have in
motivating employees to engage in actions involving
IT” (Johnston & Warkentin, 2010a)
• Photo from
http://www.gratisography.com/#whimsical
• “...findings suggest that religiosity and values can
play important roles in compliance in the
domain of information security... Recognizing
and appealing to these beliefs and values can
help security managers encourage individuals to
be more compliant with the policies set forth by
their organization.” (Kelecha & Belanger, 2013)
• Photo from https://pixabay.com/en/book-skin-
knowledge-key-840647/
• appealing to fear does impact intention to
comply with infosec, but the impact is not
uniform
– “....suggest that fear appeals do impact end user
behavioral intentions to comply with recommended
individual acts of security, but the impact is not
uniform across all end users. It is determined in part
by perceptions of self-efficacy, response efficacy,
threat severity, and social influence.” (Johnston &
Warkentin, 2010b)
• Photo from https://pixabay.com/en/police-
security-safety-protection-869216/
COnclusion
• You are the weakest link
• Your organisation is already compromised
– the only question is to what degree
• Mandatory reporting is on its way
• Ongoing threats require ongoing security
• Link information security with human
resources
Thank you!
www: ciaranmcmahon.ie
e: info@ciaranmcmahon.ie
twitter: @cjamcmahon
linkedin: @cjamcmahon
Further reading
• Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why phishing still works: User strategies for combating phishing attacks.
International Journal of Human-Computer Studies, 82, 69–82. http://doi.org/10.1016/j.ijhcs.2015.05.005
• Ashenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy? Computers and Security, 39(PART
B), 396–405. doi:10.1016/j.cose.2013.09.004
• Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams.
Australian & New Zealand Journal of Criminology, 47(3), 391–408. http://doi.org/10.1177/0004865814521224
• Cross, Cassandra (2013) “Nobody’s holding a gun to your head. . . ” examining current discourses surrounding victims of online
fraud. In Richards, Kelly & Tauri, Juan (Eds.) Crime, Justice and Social Democracy : Proceedings of the 2nd International
Conference, Crime and Justice Research Centre, Queensland University of Technology, Queensland University of Technology,
Brisbane, QLD, pp. 25-32.
• Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204.
http://doi.org/10.1177/0269758015571471
• Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94–100.
http://doi.org/10.1145/1290958.1290968
• Johnston, A. C., & Warkentin, M. (2010a). The Influence of Perceived Source Credibility on End User Attitudes and Intentions to
Comply with Recommended IT Actions. Journal of Organizational and End User Computing, 22(3), 1–21.
doi:10.4018/joeuc.2010070101
• Johnston, A. C., & Warkentin, M. (2010b). Fear Appeals and Information Security Behaviors: an Empirical Study. MIS Quarterly,
34(3), 549–A4.
• Kelecha, B., & Belanger, F. (2013). Religiosity and Information Security Policy Compliance. AMCIS 2013 Proceedings. Retrieved
from http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/13
• Parrish, J. L., & San Nicolas-Rocca, T. (2012). Toward Better Decisions With Respect To Is Security: Integrating Mindfulness Into IS
Security Training. In pre-ICIS workshop on Information Security and Privacy (SIGSEC) (pp. 12–15). Retrieved from
http://aisel.aisnet.org/wisp2012/17
• Rocha Flores, W., Holm, H., Nohlberg, M., & Ekstedt, M. (2015). Investigating personal determinants of phishing and the effect of
national culture. Information and Computer Security, 23(2), 178–199. http://doi.org/10.1108/ICS-05-2014-0029
• van Wilsem, J. (2011). “Bought it, but Never Got it” Assessing Risk Factors for Online Consumer Fraud Victimization. European
Sociological Review, 29(2), 168–178. http://doi.org/10.1093/esr/jcr053
1 of 55

Recommended

In defence of the human factor by
In defence of the human factorIn defence of the human factor
In defence of the human factorCiarán Mc Mahon
2.2K views30 slides
A review of cyberbullying and cyber threats in education 2 by
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2IAEME Publication
928 views7 slides
Future of the Internet Predictions March 2014 PIP Report by
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportVasily Ryzhonkov
2.3K views61 slides
Webinar slides sept 23 2021 mary aiken by
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
249 views68 slides
Issues: What the Web Can Tell us About Human Behavior by
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behaviorgloriakt
388 views23 slides
Cyber security issues part a by
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a www.StudentsAssignmentHelp.com
108 views9 slides

More Related Content

What's hot

Cyber bullying presentation by
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
459 views12 slides
Steve Luczynski Mitigating Aviation Cyber Risk by
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber RiskCapitolTechU
19 views23 slides
Components of a Model of Cybersecurity Behavior Adoption by
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
281 views21 slides
Gender and the digital divide by
Gender and the digital divideGender and the digital divide
Gender and the digital dividelinakap3
3.7K views33 slides
How Young is Too Young? by
How Young is Too Young? How Young is Too Young?
How Young is Too Young? sshrimali
662 views27 slides

What's hot(18)

Cyber bullying presentation by centrelink
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
centrelink459 views
Steve Luczynski Mitigating Aviation Cyber Risk by CapitolTechU
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
CapitolTechU19 views
Components of a Model of Cybersecurity Behavior Adoption by Cori Faklaris
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
Cori Faklaris281 views
Gender and the digital divide by linakap3
Gender and the digital divideGender and the digital divide
Gender and the digital divide
linakap33.7K views
How Young is Too Young? by sshrimali
How Young is Too Young? How Young is Too Young?
How Young is Too Young?
sshrimali662 views
Bowhuis Group Ppt Draft5 by lisamulka
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
lisamulka923 views
Motivations behind Software Piracy: Relevance to Computer Ethics Theories by Saptarshi Ghosh
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Saptarshi Ghosh49 views
Information communication technology by Aditya
Information communication technologyInformation communication technology
Information communication technology
Aditya 15.1K views
Major assignment - Impact of Social Technologies on Society by Harris Naseem
Major assignment - Impact of Social Technologies on SocietyMajor assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on Society
Harris Naseem15.1K views
Module 7 Assignment 2 Pp On Review Paper by Meghan.V
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
Meghan.V316 views
Privacy of facebook by hernan_j1
Privacy of facebookPrivacy of facebook
Privacy of facebook
hernan_j1600 views
Keep in touch for cyber peace_20150212 by Kunihiro Maeda
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
Kunihiro Maeda757 views
Digital Citizenship2 by groot83
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
groot83439 views
how does technology affect society? by kahooks324
how does technology affect society?how does technology affect society?
how does technology affect society?
kahooks3249.1K views
Decline of interpersonal communication by NaeemMushtaq4
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communication
NaeemMushtaq4100 views
The fate-of-the-semantic-web by Marketingfacts
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-web
Marketingfacts2.3K views
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S... by ijsptm
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
ijsptm647 views

Similar to Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing

Appreciating Contradications: The Cyberpsychology of Information Security by
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
1.3K views39 slides
Digital Life in 2025 by
Digital Life in 2025Digital Life in 2025
Digital Life in 2025Evgeny Tsarkov
1.1K views61 slides
DIGITAL LIFE IN 2025 by
DIGITAL LIFE IN 2025DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025Ryba Tut Digital Agency
1K views61 slides
Rethinking Learning in the Age of Digital Fluency by
Rethinking Learning in the Age of Digital FluencyRethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital FluencyJudy O'Connell
76.5K views114 slides
When communication innovations lead to social exclusion by
When communication innovations lead to social exclusionWhen communication innovations lead to social exclusion
When communication innovations lead to social exclusionPetr Lupac
419 views20 slides
Topic-2.2_InfoPrivacy-IT-Ethics.pptx by
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
0 views35 slides

Similar to Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing(20)

Appreciating Contradications: The Cyberpsychology of Information Security by Ciarán Mc Mahon
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
Ciarán Mc Mahon1.3K views
Rethinking Learning in the Age of Digital Fluency by Judy O'Connell
Rethinking Learning in the Age of Digital FluencyRethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital Fluency
Judy O'Connell76.5K views
When communication innovations lead to social exclusion by Petr Lupac
When communication innovations lead to social exclusionWhen communication innovations lead to social exclusion
When communication innovations lead to social exclusion
Petr Lupac419 views
Topic-2.2_InfoPrivacy-IT-Ethics.pptx by OxfordRiNorth
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth0 views
Open for business_dalberg by Victor Gridnev
Open for business_dalbergOpen for business_dalberg
Open for business_dalberg
Victor Gridnev2.2K views
Digital culture - a book chapter by Jan Van Dijk by Xanat V. Meza
Digital culture - a book chapter by Jan Van DijkDigital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van Dijk
Xanat V. Meza417 views
MAC309 Trust in media by Rob Jewitt
MAC309 Trust in mediaMAC309 Trust in media
MAC309 Trust in media
Rob Jewitt658 views
Seven types of ambiguity by Johannes Meier
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity
Johannes Meier6.7K views
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf by bozo18
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdfINST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
bozo182 views
Social networking boon or a bane by Abhishek Sharma
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
Abhishek Sharma1.3K views
The usage of internet by youngsters of gujrat city (pakistan) by Alexander Decker
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)
Alexander Decker1.6K views
Why not use ict in sudan by Hala Nur
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
Hala Nur1.4K views
Cmc, diffusion and social theories by Tajanik Oliver
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theories
Tajanik Oliver50 views

Recently uploaded

Housing Discrimination in America.pptx by
Housing Discrimination in America.pptxHousing Discrimination in America.pptx
Housing Discrimination in America.pptxecobbins1
34 views15 slides
PPI - the role of CDC in decumulation by
PPI - the role of CDC in decumulationPPI - the role of CDC in decumulation
PPI - the role of CDC in decumulationHenry Tapper
224 views40 slides
NATIONAL INCOME IN INDIA by
NATIONAL INCOME IN INDIANATIONAL INCOME IN INDIA
NATIONAL INCOME IN INDIAJitender Dhalia
7 views6 slides
InitVerse :Blockchain development trends in 2024.pdf by
InitVerse :Blockchain development trends in 2024.pdfInitVerse :Blockchain development trends in 2024.pdf
InitVerse :Blockchain development trends in 2024.pdfInitVerse Blockchain
24 views9 slides
Multigain_Financial_Services_Newsletter_December_2023 (1).pdf by
Multigain_Financial_Services_Newsletter_December_2023 (1).pdfMultigain_Financial_Services_Newsletter_December_2023 (1).pdf
Multigain_Financial_Services_Newsletter_December_2023 (1).pdfmultigainfinancial
20 views13 slides
The Rise of China as the Industrial Nation.docx by
The Rise of China as the Industrial Nation.docxThe Rise of China as the Industrial Nation.docx
The Rise of China as the Industrial Nation.docxlamluanvan.net Viết thuê luận văn
5 views23 slides

Recently uploaded(20)

Housing Discrimination in America.pptx by ecobbins1
Housing Discrimination in America.pptxHousing Discrimination in America.pptx
Housing Discrimination in America.pptx
ecobbins134 views
PPI - the role of CDC in decumulation by Henry Tapper
PPI - the role of CDC in decumulationPPI - the role of CDC in decumulation
PPI - the role of CDC in decumulation
Henry Tapper224 views
Multigain_Financial_Services_Newsletter_December_2023 (1).pdf by multigainfinancial
Multigain_Financial_Services_Newsletter_December_2023 (1).pdfMultigain_Financial_Services_Newsletter_December_2023 (1).pdf
Multigain_Financial_Services_Newsletter_December_2023 (1).pdf
Stock Market Brief Deck 127.pdf by Michael Silva
Stock Market Brief Deck 127.pdfStock Market Brief Deck 127.pdf
Stock Market Brief Deck 127.pdf
Michael Silva228 views
Minister of LGBT Affairs in Qatar.docx by Ramis Al-Kuwari
Minister of LGBT Affairs in Qatar.docxMinister of LGBT Affairs in Qatar.docx
Minister of LGBT Affairs in Qatar.docx
Ramis Al-Kuwari6 views
Practices of corporate governance in Commercial Banks of Bangladesh by Ariful Saimon
Practices of corporate governance in Commercial Banks of BangladeshPractices of corporate governance in Commercial Banks of Bangladesh
Practices of corporate governance in Commercial Banks of Bangladesh
Ariful Saimon13 views
Practical Tax planning in Nigeria presentation slides.pdf by UbongAkpekong1
Practical Tax planning in Nigeria presentation slides.pdfPractical Tax planning in Nigeria presentation slides.pdf
Practical Tax planning in Nigeria presentation slides.pdf
UbongAkpekong111 views
Debt Watch | ICICI Prudential Mutual Fund by iciciprumf
Debt Watch | ICICI Prudential Mutual FundDebt Watch | ICICI Prudential Mutual Fund
Debt Watch | ICICI Prudential Mutual Fund
iciciprumf24 views
ENTIME_GEM___GAP.pdf by GRAPE
ENTIME_GEM___GAP.pdfENTIME_GEM___GAP.pdf
ENTIME_GEM___GAP.pdf
GRAPE5 views
The U.S. Treasury Department has declassified lists of Qataris associated wit... by fatimadoha817
The U.S. Treasury Department has declassified lists of Qataris associated wit...The U.S. Treasury Department has declassified lists of Qataris associated wit...
The U.S. Treasury Department has declassified lists of Qataris associated wit...
fatimadoha8175 views
Seeman_Fintouch_LLP_Newsletter_December_2023.pdf by Ashis Kumar Dey
Seeman_Fintouch_LLP_Newsletter_December_2023.pdfSeeman_Fintouch_LLP_Newsletter_December_2023.pdf
Seeman_Fintouch_LLP_Newsletter_December_2023.pdf
Ashis Kumar Dey13 views
Amalgamation, Absorption, External Reconstruction and Internal Reconstruction... by Dr.G. KARTHIKEYAN
Amalgamation, Absorption, External Reconstruction and Internal Reconstruction...Amalgamation, Absorption, External Reconstruction and Internal Reconstruction...
Amalgamation, Absorption, External Reconstruction and Internal Reconstruction...
Stabilizing Algorithmic Stablecoins: the TerraLuna case study by FedericoCalandra1
Stabilizing Algorithmic Stablecoins: the TerraLuna case studyStabilizing Algorithmic Stablecoins: the TerraLuna case study
Stabilizing Algorithmic Stablecoins: the TerraLuna case study
Product Listing Optimization.pdf by AllenSingson
Product Listing Optimization.pdfProduct Listing Optimization.pdf
Product Listing Optimization.pdf
AllenSingson21 views

Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing

  • 1. the cyberpsychology of online fraud Dr Ciarán Mc Mahon Central Bank, AMLD Away Day November 6th, 2015
  • 2. Introduction • Emerging trends in cybercrime • Architecture of compromise • Victims of online fraud • Psychology of cyberspace • Cybercrime targeting financial institutions
  • 3. Emerging trends In cybercrime • Advanced persistent threats – You are already hacked • Cybercrime as a service – everyone can be a hacker now • Low-hanging fruit – easier to steal a lamb than a sheep • Blackmail – information is the new money
  • 5. Europol iOCTA Report 2015 • Cybercrime – remains a growth industry – becoming more aggressive and confrontational – an extremely diverse range of criminality – blurring of the lines between Advanced Persistent Threat (APT) groups and profit-driven cybercriminals
  • 6. Europol iOCTA Report 2015 • CaaS – Cybercrime as a Service – grants easy access to criminal products and services, enables a broad base of unskilled, entrylevel cybercriminals to launch attacks of a scale and scope disproportionate to their technical capability and asymmetric in terms of risks, costs and profits.
  • 7. • Mc Afee – ‘The Hidden Data Economy’ http://www.mcafee.com/us/resources/reports/rp-hidden-data- economy.pdf • “Software-generated” is a valid combination of a primary account number (PAN), an expiration date, and a CVV2 number that has been generated by software. Sellers refer to a valid number combination as a “Random.” Valid credit card number generators can be purchased or found for free online. • “Fullzinfo” means the seller supplies all of the details about the card and its owner, such as full name, billing address, payment card number, expiration date, PIN number, social security number, mother’s maiden name, date of birth, and CVV2. The Hidden Data Economy
  • 8. • Data is a key commodity in the digital underground and almost any type of data is of value to someone; whether it can be used for the furtherance of fraud or for immediate financial gain. (Europol iOCTA) recent EU breaches
  • 9. Europol iOCTA Report 2015 “While it is possible for organisations to invest in technological means to protect themselves, the human element will always remain as an unpredictable variable and a potential vulnerability. As such social engineering is a common and effective tool used for anything from complex multi-stage attacks to fraud. “
  • 10. PWC The Global State of Information Security Survey 2015 http://www.pwchk.com/webmedia/doc/635527689739110925_rcs_info_security_2015.pdf Information Age - http://www.information-age.com/technology/security/123458744/2015-year-cyber-security-shows-its-human-side Grant Forks Herald http://www.grandforksherald.com/news/business/3847833-cyber-security-professionals-say-employees-are- biggest-threat-network-security Databarracks Data Health Check - http://datahealthcheck.databarracks.com/ Clearswift - https://www.clearswift.com/sites/default/files/documents/Infographics/Clearswift_What_is_your_employees_price_infographic.pdf CIO - http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will-dominate-2015.html
  • 11. Cyberpsychology is an emerging discipline which involves the study of the human mind and behaviour in the context of information communication technology. It represents an incredibly valuable source of insight into information security behaviour. Photo from Project Apollo Archive https://www.flickr.com/photos/projectapolloarchive/21713955181
  • 12. • Presence • The internet is designed to make communication effortless, so we should feel totally immersed in it. • A major goal for all ICT engineers is to ensure that users of their technology are totally unaware of all of the computations and calculations that are going on behind the scenes (Lombard & Ditton, 1997). • Users act like ICT is invisible - “for mediated exchange to work as interpersonal communication, there must be tacit agreement that the participants will proceed as though they are communicating face to face” (Cathcart and Gumpert, 1986, p. 116) • Cathcart, R., & Gumpert, G. (1986). The person-computer interaction: A unique source. In B. D. Ruben (Ed.), Information and behavior (vo.l 1) (pp. 113–124). New Brunswick, NJ: Transaction Publishers. • Lombard, M., Ditton, T., & Media, M. (1997). At the heart of it all: The concept of presence. Journal of Computer-Mediated Communication, 3(2), 1–23. • Photo from https://pixabay.com/en/bokeh-background- abstract-colorful-587113/z
  • 13. •• LurkingLurking • Anywhere up to 90% of the visitors to any online forum will read everything, will be invisible and will not participate to any meaningful or noticeable degree (Nonnecke, East, & Preece, 2001). • Consequently it is very likely that when an employee is online: they may assume that the only ones who they can see talking to them are the only ones who are present. This is where insider threats slip up – they don’t think anyone can see them. • Nonnecke, B., East, K. S., & Preece, J. (2001). Why lurkers lurk. In Americas Conference on Information Systems (pp. 1–10). • Photo from https://pixabay.com/en/rabbit-hare-bunny-costume- animal-542554/
  • 14. • Self-disclosure • When online, people are more likely to reveal personal information. • People tend to reveal most personal information online when they are in certain conditions (Joinson, 2001), namely heightened private self- awareness and reduced public self-awareness. • In other words, when someone is focussing on themselves, their person and body, and feels anonymous and unseen, they are likely to reveal information about themselves that they would not in a face-to-face context. • Self-disclosure of this kind likely a critical factor in cyberbullying - it’s also a pretty useful tool in honeypot operations. • Joinson, A. N. (2001). Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. European Journal of Psychological Assessment, 31, 177–192. • Photo from https://picjumbo.com/colorful-funfair-bokeh/
  • 15. • Online disinhibition • When online, people loosen up, feel less restrained, and express themselves more openly • Everyday users on the Internet—as well as clinicians and researchers have noted how people say and do things in cyberspace that they wouldn’t ordinarily say and do in the face-to- face world. They loosen up, feel less restrained, and express themselves more openly. So pervasive is the phenomenon that a term has surfaced for it: the online disinhibition effect. (Suler, 2004, p.321) • Suler, J. (2004). The online disinhibition effect. CyberPsychology & Behavior, 7(3), 321–326. • Photo from https://pixabay.com/en/concert-people-crowd-audience- 731227
  • 16. • Minimisation of status and authority • In the traditional philosophy of the internet there is no centralised control, everyone is equal, and its only purpose is sharing ideas • While online a person’s status in the face-to-face world may not be known to others and may not have as much impact. Authority figures express their status and power in their dress, body language, and in the trappings of their environmental settings. The absence of those cues in the text environments of cyberspace reduces the impact of their authority. (Suler, 2004, p. 324) • Suler, J. (2004). The online disinhibition effect. CyberPsychology & Behavior, 7(3), 321–326. • Photo from http://www.gratisography.com/
  • 17. • Traditionally, society is built on a close relationship between authoritative texts and authority figures • Knowledge linked to power, not only assumes the authority of 'the truth' but has the power to make itself true. All knowledge, once applied in the real world, has effects, and in that sense at least, 'becomes true.' Knowledge, once used to regulate the conduct of others, entails constraint, regulation and the disciplining of practice. (Foucault,1977, p.27) • Foucault, M. (1977). Discipline and punish. London: Tavistock. • Photo from https://www.flickr.com/photos/drgbb/2227885657
  • 18. • Web 2.0 has the power to radically change these knowledge and power relationships – “Wikipedia provokes divisive debates precisely because academics realise that Web 2.0 has the potential to radically transform pedagogic and research practices in higher education – and hence irrevocably change traditional academic power and authority arrangements.” Eijkman (2010, p. 182) • Eijkman, H. (2010). Academics and Wikipedia: Reframing Web 2.0 as a disruptor of traditional academic power-knowledge arrangements. Campus-Wide Information Systems. http://doi.org/10.1108/10650741011054474 • Photo from the Opte Project http://www.opte.org/the-internet/
  • 19. • How do leaderless networks work? Quote from a book on direct action, about the Occupy Wall Street Movement: – “Before long, people were organizing them everywhere. Someone came up with the theory that the result was a kind of global brain: the interconnections of communication are such that you can imagine people not just communicating but acting, and acting damn effectively, without leadership, a secretariat, without even formal information channels. It's a little like ants meeting in an ant-heap, all waving their antennae at each other, and information just gets around-even though there's no chain of command or even hierarchical information structure. Of course it would be impossible without the Internet.” (Graeber, 2009) • Graeber, D. (2009). Direct Action. An Ethnography. Oakland, CA: AK Press • Photo from http://anondesign.deviantart.com/art/Anonymous- Logo-with-Slogan-Perfect-Symmetry-408650529
  • 20. • http://www.csmonitor.com/USA/USA- Update/2015/0605/OPM-hack-What-criminal-hackers-can- do-with-your-personal-data-video • OPM offering potentially affected individuals • credit report access, • credit monitoring and • identify theft insurance and recovery services • As of yesterday, less than a quarter of the 21m affected had been notified • http://news.yahoo.com/three-quarters-u-opm-hack-victims- still-dark-184307823.html
  • 22. value of a hacked email account • Image from http://krebsonsecurity.com/2013/06/the-value-of- a-hacked-email-account/ • Phishing: 23% will open message, further 11% will open attachment Verizon, 2015 Data Breach Investigations Report, http://www. verizonenterprise.com/DBIR/2015/, 2015
  • 23. attack lifecycle • From Mandiant’s APT1 report - http://intelreport.mandiant.com/Mandiant_A PT1_Report.pdf
  • 28. Victims of Phishing • Jagatic, Johnson, Jakobsson, & Menczer (2007)
  • 29. Victims of Phishing • Rocha Flores, Holm, Nohlberg & Ekstedt (2015) – Resistance to phishing: • Intention to resist social engineering • general information security awareness • formal IS training • computer experience
  • 30. Victims of Phishing • Alsharnouby, Alaca, & Chiasson (2015) – eye tracking testing legitimacy of websites • users successfully detected only 53% of phishing websites – even when primed to identify them • generally spend very little time gazing at security indicators • general technical proficiency does not correlate with improved detection scores.
  • 31. Victims of fraud • van Wilsem (2011) – large-scale victimization survey data among the Dutch general population (N = 6,201) – those with low self-control run substantially higher victimization risk – as well as active online shoppers and people participating in online forums.
  • 32. Victims of fraud • Button, Nicholls, Kerr, & Owen (2014) • depth interviews & focus groups with online fraud victims: reasons – the diversity of frauds – small amounts of money sought – authority and legitimacy displayed by scammers – visceral appeals – embarrassing frauds – pressure and coercion – grooming – fraud at a distance and multiple techniques
  • 33. Victims of fraud • Cross (2013) – discourse surrounding online fraud is heavily premised on idea that victims are both greedy and gullible – need to examine discourse on ‘victim blaming’ in online fraud – current discourse does not take into account the level of deception and the targeting of vulnerability that is employed by the offender in perpetrating this type of crime
  • 34. Victims of fraud • Cross (2015) – interviews with 85 seniors across Queensland, Australia, who received fraudulent emails, – victim-blaming discourse as an overwhelmingly powerful and controlling discourse about online fraud victimization. – humour reinforces this discourse by isolating victims and impacting on their ability to disclose to those around them. – Identifying and challenging this victim-blaming discourse, as well as the role of humour and its social acceptance, is a first step in the facilitation of victim recovery and future well-being.
  • 35. Victims of fraud • Cross (2015) How to tackle cyber crime before people even know they’re a victim (The Conversation) – Project Sunbird
  • 36. Project Sunbird • Identification – police identify people who are sending money to five known high-risk countries • Intervention – Department of Commerce send a letter to each person, notifying them that they may be victims of fraud • Interruption – stoppage of payments and funds • Intelligence – from letter recipients from both agencies • Investigation – police on local and overseas offenders
  • 37. cybercrime targeting Banks • CEO fraud – ‘business e-mail compromise’ or “Fake President” • Bank malware • Ransomware & extortion • DDOS
  • 38. CEO fraud • FBI report January 2015 – October 2013 to August 2015 – Combined victims (US & non US): 8,179 – Combined exposed dollar loss: $798,897,959.25 – transfers reported to 72 countries; – majority of transfers to Asian banks located within China and Hong Kong
  • 39. CEO fraud - Scenario 1. Establish contact – impersonate a group executive (e.g. the president, CEO, CFO) or a trusted partner (e.g. lawyers, notaries, auditors, accountants etc.) o – contact a specific employee, manager, an accounts payable clerk 2. Urgent and exceptional request – request an urgent bank transfer of a large amount to a foreign bank account. 3. Persuasive dialog – Use of authority: It is an order to do this – Secrecy: This project is still secret and its success depends on this transaction – Valorization: I count on you for your efficiency and discretion – Pressure: The success of the project rests on your shoulders 4. Transfer order – Being unsuspicious, transfer will be done manually (using a direct phone call or fax to a bank). – does not follow the standard procedure but may be used by companies in urgent cases or for flexibility reasons as an alternative to the standard procedure.
  • 40. CEO fraud - Prevention 1. Inform staff that this fraud is ongoing 2. Test staff knowledge of extraordinary transfer procedure 3. Include 2FA in extraordinary transfer procedure 4. Ensure that staff know who CISO is
  • 41. banking malware • From Kaspersky Lab report Q3 2015 – blocked 625,669 online banking stealing attempts, which is 17.2% lower than in Q2 2015 – Windows 7 x64 Edition accounted for 42.2% of all banking Trojan attacks – 2,516 detected mobile banker Trojans, which is a fourfold increase on the previous quarter
  • 42. Ransomware and extortion • Increasingly directed at banks – DDOS • take down website (embarrassing) – Exfiltration • will release customer data if not paid
  • 43. Ransomware and extortion • Hackers Release Swiss Bank Data Over $12K Unpaid Ransom (BloombergBusiness) – small-scale demand -- $12,000 prevalence and ease of a rapidly growing extortion industry that deals in stolen or hijacked data • Hacker who demanded Bitcoin from banks jailed for blackmail and child pornography (TheJournal) – used a phishing program to obtain customer banking details before threatening to release them if he was not paid
  • 44. Blackmail • “The Ultimate Invasion of Privacy” (Slate) – “How a Chinese hacker used my private nickname, personal emails, and sensitive documents to try to blackmail me.” – US businessman working in China
  • 45. Ransomware and extortion • Bitcoin cyberextortionists are blackmailing banks, corporations (arstechnica) – intended to harass, extort and ultimately embarrass the victim publicly – between 1 and 100 bitcoins (about £160 to £16,000), a deadline for compliance, and warning of a “small, demonstrative attack.
  • 46. EU Directives • Network and Information Security • General Data Protection Regulation – Both in the pipeline for some time and still being negotiated • Both have certain issues around mandatory reporting of data breaches, whether to customers or regulators, depending on the size and nature of the organisation • Reputational risk is clearly a very significant factor here
  • 47. COMBATING CYBERCRIME Strategies for improving internal organisational security
  • 49. • Emphasis should be on delegation and empowerment of employees – “an autocratic stance inhibits effective information security and highlights ways that this is expressed by experienced Chief Information Security Officers through their use of discourse. They need to develop an identity within the organisation where they are seen to help employees discuss, and make decisions about, information security. The emphasis should be on delegation and empowerment of employees with an acceptance that, as a result, mistakes and errors may occur. (Ashenden & Sasse, 2013) • Photo from http://www.freeimages.com/photo/ducks- in-a-row-1316756
  • 50. • Select a champion – not necessarily a technical expert – but who can motivate and persuade – “The results of this study give credence to the role of a ‘champion’ within the organization, specifically alluding to the influence this person may have in motivating employees to engage in actions involving IT” (Johnston & Warkentin, 2010a) • Photo from http://www.gratisography.com/#whimsical
  • 51. • “...findings suggest that religiosity and values can play important roles in compliance in the domain of information security... Recognizing and appealing to these beliefs and values can help security managers encourage individuals to be more compliant with the policies set forth by their organization.” (Kelecha & Belanger, 2013) • Photo from https://pixabay.com/en/book-skin- knowledge-key-840647/
  • 52. • appealing to fear does impact intention to comply with infosec, but the impact is not uniform – “....suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence.” (Johnston & Warkentin, 2010b) • Photo from https://pixabay.com/en/police- security-safety-protection-869216/
  • 53. COnclusion • You are the weakest link • Your organisation is already compromised – the only question is to what degree • Mandatory reporting is on its way • Ongoing threats require ongoing security • Link information security with human resources
  • 54. Thank you! www: ciaranmcmahon.ie e: info@ciaranmcmahon.ie twitter: @cjamcmahon linkedin: @cjamcmahon
  • 55. Further reading • Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82, 69–82. http://doi.org/10.1016/j.ijhcs.2015.05.005 • Ashenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy? Computers and Security, 39(PART B), 396–405. doi:10.1016/j.cose.2013.09.004 • Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391–408. http://doi.org/10.1177/0004865814521224 • Cross, Cassandra (2013) “Nobody’s holding a gun to your head. . . ” examining current discourses surrounding victims of online fraud. In Richards, Kelly & Tauri, Juan (Eds.) Crime, Justice and Social Democracy : Proceedings of the 2nd International Conference, Crime and Justice Research Centre, Queensland University of Technology, Queensland University of Technology, Brisbane, QLD, pp. 25-32. • Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204. http://doi.org/10.1177/0269758015571471 • Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94–100. http://doi.org/10.1145/1290958.1290968 • Johnston, A. C., & Warkentin, M. (2010a). The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions. Journal of Organizational and End User Computing, 22(3), 1–21. doi:10.4018/joeuc.2010070101 • Johnston, A. C., & Warkentin, M. (2010b). Fear Appeals and Information Security Behaviors: an Empirical Study. MIS Quarterly, 34(3), 549–A4. • Kelecha, B., & Belanger, F. (2013). Religiosity and Information Security Policy Compliance. AMCIS 2013 Proceedings. Retrieved from http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/13 • Parrish, J. L., & San Nicolas-Rocca, T. (2012). Toward Better Decisions With Respect To Is Security: Integrating Mindfulness Into IS Security Training. In pre-ICIS workshop on Information Security and Privacy (SIGSEC) (pp. 12–15). Retrieved from http://aisel.aisnet.org/wisp2012/17 • Rocha Flores, W., Holm, H., Nohlberg, M., & Ekstedt, M. (2015). Investigating personal determinants of phishing and the effect of national culture. Information and Computer Security, 23(2), 178–199. http://doi.org/10.1108/ICS-05-2014-0029 • van Wilsem, J. (2011). “Bought it, but Never Got it” Assessing Risk Factors for Online Consumer Fraud Victimization. European Sociological Review, 29(2), 168–178. http://doi.org/10.1093/esr/jcr053