SlideShare a Scribd company logo
How to Secure the
Mobile Banking
Petr Dvořák
petr@wultra.com
Guide for 2019
"Power to be you in

the digital world
We help banks build secure digital channels faster
Secure
Communication
Malware
Protection
Behavioral
Authentication
Fraud Detection
System
Customer
Acquisition
Authentication
Authorization
360°
Security for
Digital
Banking
2014
"Strong crypto
solves every
problem of the
universe.
… except not really…
QRecorder malware (September 2018) steals ~80-100k EUR.
Malware Techniques
Accessibility Features
System Alert Window
SMS Messages
Permissions Misuse Foreground Override Evasion Techniques
Task Affinity
Task Reparenting
Task Hijacking
Code Obfuscation
Uninstall Prevention
Device Reset
… it's an isolated case…
Numbers from the Czech
Republic (Q1/2019)
4major malware
attacks in Q1
€100k
highest single
client loss
€500k
total cost impact
estimates in Q1
2019
Attacker The Bank
✖
Malware
Phishing
MITM
…
Attacker The Bank
✓
"Our Solution"
Attacker The Bank
"Our Solution"
Attacker
✖
"Building walls
around the mobile
app to cover the
perimeter.
4Critical Building Blocks
Good Old Strong Crypto.

Access control and transaction
signing. Resurfaced as "strong
customer authentication" (SCA)
under PSD2.
Note: Compliance requirement for PSD2, see
the entire Chapter 2 in RTS.
Cryptographic Protection
Mobile App Shielding
Runtime Application Self-Protection.

To mitigate issues of potentially
insecure mobile operating systems
even on rooted or jailbroken devices.

Note: Compliance improvement for PSD2, see
RTS, Chapter 2, Article 9, Paragraphs 2 and 3.
Protection Against Mobile Malware
Antivirus for Mobile Banking.

To detect and eliminate apps that may
be potentially harmful to mobile
banking or customer account.

Note: Compliance improvement for PSD2, see
RTS, Chapter 1, Article 2, Paragraph 2d.
Anti-Fraud System
Cross-channel Fraud Detection

To stop transactions that are to
untrusted accounts, do not match
behavioral patterns or are otherwise
"out of normal".
Note: Compliance improvement for PSD2, see
RTS articles related to transaction monitoring
and risk analysis.
Cryptographic
Protection
Mobile App
Shielding
Protection Against
Mobile Malware
Cross-Channel
Anti-Fraud System
Four Critical Building Blocks for Mobile
Banking Security
1 2 3 4
How many of these does your mobile
app have?
Thank you!
Petr Dvořák
petr@wultra.com

More Related Content

Similar to How to Secure The Mobile Banking - Guide for 2019

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 
Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1
Fernando Romero
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
MARIUS EUGEN OPRAN
 

Similar to How to Secure The Mobile Banking - Guide for 2019 (20)

Wultra: Mobile Application Security
Wultra: Mobile Application SecurityWultra: Mobile Application Security
Wultra: Mobile Application Security
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1Taking the offensive Security Leaders V9.1
Taking the offensive Security Leaders V9.1
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
 
Fortifying the Digital Frontier Exploring the Crucial Dimensions of Cyber sec...
Fortifying the Digital Frontier Exploring the Crucial Dimensions of Cyber sec...Fortifying the Digital Frontier Exploring the Crucial Dimensions of Cyber sec...
Fortifying the Digital Frontier Exploring the Crucial Dimensions of Cyber sec...
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
ihegc012
ihegc012ihegc012
ihegc012
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 

More from Wultra

Time to Rethink Mobile Onboarding
Time to Rethink Mobile OnboardingTime to Rethink Mobile Onboarding
Time to Rethink Mobile Onboarding
Wultra
 

More from Wultra (7)

FIDO2 - The Easiest Path to Strong Authentication
FIDO2 - The Easiest Path to Strong AuthenticationFIDO2 - The Easiest Path to Strong Authentication
FIDO2 - The Easiest Path to Strong Authentication
 
Modern mobile identity: Moving away from SMS-based authentication
Modern mobile identity: Moving away from SMS-based authenticationModern mobile identity: Moving away from SMS-based authentication
Modern mobile identity: Moving away from SMS-based authentication
 
Time to Rethink Mobile Onboarding
Time to Rethink Mobile OnboardingTime to Rethink Mobile Onboarding
Time to Rethink Mobile Onboarding
 
Combating Financial Fraud and Cyber-Crime on Mobile
Combating Financial Fraud and Cyber-Crime on MobileCombating Financial Fraud and Cyber-Crime on Mobile
Combating Financial Fraud and Cyber-Crime on Mobile
 
Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022Mobile Banking and Lurking Security Threats for 2022
Mobile Banking and Lurking Security Threats for 2022
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
Introduction - Bank Business Card
Introduction - Bank Business CardIntroduction - Bank Business Card
Introduction - Bank Business Card
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

How to Secure The Mobile Banking - Guide for 2019