SlideShare a Scribd company logo
Prevention of Fraud, Forgeries in
Internet Banking and T24 System
Presented by
Md. Shazzad Hossain, CISA, CISM, CRISC
Senior Manager
IT Audit Department
Prime Bank Limited
Head Office
Dhaka, Bangladesh
Some points to be ponder
 Banking and Bank
 Fraud and Forgery
 Internet
 Internet Banking
 How an Internet Banking Fraud happened
 Prevention of Fraud in IB
Banking and Bank
• It is the business conducted or services offered by a bank.
• Simply the bank collects money from the depositors and invest the
depositors money with the intent to receive more.
• As such it can be said that banks run its business with public’s
money and act as a custodian of that money.
Fraud and Forgery
• Though the word Fraud and Forgery is used inter changeably; they are not
actually same.
Fraud: Fraud is a relatively broad term applied to any illegal act in
which the offender uses deceitful or deceptive means to carry out the
crime. In almost all instances of fraud, the offender is trying to obtain
something from the victim, whether the victim be an individual
person, group of people, or company. Furthermore, most fraud crimes
are committed to obtain money or access to money.
Forgery: Forgery is actually a type of fraud in which the offender uses
false, fabricated or fictitious documents in order to defraud a victim,
usually in an effort to secure money. A person can also be charged
with forgery if they alter or change an existing document for the
purpose of deceiving or defrauding the victim. Even something as
simple as signing another person's name on a check can be
considered forgery.
Fraud is a hidden crime. In every fraud situation, the fraudster tries to
conceal his/her crime. The method for concealing fraud are so numerous and
sometimes ingenious that almost anyone might be defrauded.
Internet
• The Internet is a global system of interconnected computer
networks that use the standard Internet protocol suite (TCP/IP) to
link several billion devices worldwide.
• It is a global network connecting millions of computers. More than
190 countries are linked into exchanges of data, news and
opinions. According to Internet Live Stats, as of December 30, 2014
there was an estimated 3,037,608,300 Internet users worldwide.
The number of Internet users represents nearly 40 percent of the
world's population. The largest number of Internet users by
country is China, followed by the United States and India.
• In September 2014, the total number of websites with a unique
hostname online exceeded 1 billion. This is an increase from one
website (info.cern.ch) in 1991.
Is Web and Internet the Same?
• The Internet is not synonymous with World Wide Web. The Internet
is a massive network of networks, a networking infrastructure. It
connects millions of computers together globally, forming a
network in which any computer can communicate with any other
computer as long as they are both connected to the Internet. The
World Wide Web, or simply Web, is a way of accessing information
over the medium of the Internet. It is an information-sharing model
that is built on top of the Internet.
Internet Banking
• Bank offer its product or service through many ways. Internet
Banking is one of them and most probably the recent addition in
our society.
• To avail this service one have to have a formal banking relationship
with bank and an internet connected PC or device.
• In our bank the internet banking is offered to our customer named
“ALTITUDE”.
• It is a secure, most robust and popular Internet Banking solution
in Bangladesh.
• As such it is not beyond the target of cyber criminals and prone to
fraud and forgery.
Fraud Triangle
Motivation
Opportunity
Rationalization
How an Internet Banking Fraud happened
• In most cases Internet Banking fraud initiated by taking the opportunity of one’s lack of
security knowledge.
• The process followed by fraudsters to steal money from internet banking users is nearly
always the same. They are:
i. Get the person’s Internet banking details, typically through a “Phishing
Attack”
ii. Get a banking account/s to which money can be transferred to and
withdrawn
iii. Clone the SIM card used by the person
iv. Hack the persons e-mail account
v. Create beneficiaries (using the list of banking accounts) and transfer
money to these beneficiaries and
vi. Withdraw the money from these accounts.
• In each of these steps the criminals can exploit different weaknesses in the system to
achieve their goal.
Phishing
• Phishing is a form of theft where the intent is
to steal your valuable personal data, such as
National Identification numbers, credit card
numbers, passwords, account data, or other
personal and critical information.
• Regardless of which story the phishers use, if
you fall prey to a phishing email, the end
result may be unauthorized fund transfer
which ultimately lead to an empty bank
account or other financial account. Identity
theft is also a very common result of
phishing scams.
• If this Phishing attack is more targeted and
specific to any person, organization etc. then
it is called Spare Phishing attack.
How does Phishing work?
• A phisher will send you an email, an instant message or sometimes call you on the phone.
The message may appear to come from a friend, a business (your bank), a government agency
(the BB), or some other entity. Common phishing scams typically claim to be credit card
companies, banks, and major online retailers such as Ajker Deal, Bikroy.com or bdjobs, as
well as social networking sites like Facebook. Some phishing attempts are easy to identify
because they claim to come from businesses or companies that you have never dealt with;
others may be more difficult to identify, since they appear to originate from entities with
which you do business.
• A phishing message may indicate that the entity had problems with their computers or data
and that they simply need to verify your account information so you won't be inconvenienced
next time you try to use their services. The email message might suggest that a suspicious
purchase was made using your credit card, and that if you did not make this purchase, you
need to contact them by using the link included in the email.
• Another example is a message claiming that you have just won the lottery, that you should go
to the secure web link provided, enter your bank account information and they will deposit
your winnings into your account.
• Other variation might be an email claiming to be from retail shop claiming that due to an
accounting error, you are owed a refund. They ask that you go to a website and enter your
banking information so that they can process the refund.
Example of a Phishing email
From: Altitude Team [rj@calpoly.edu]
Sent: Friday, June 29, 2012 2:42 PM
Subject: Internet Banking Account Deletion Confirmation
Altitude! SERVICE ANNOUNCEMENT
Dear Account Holder,
1. You have requested your Internet Banking Account on June 29, 2012 at 11:02 PM BST to be
deactivated and deleted from a location in with this IP number; 201.130.47.33.
2. Click on (http://localhost/pib.primebank.com.bd/login.html) to cancel this request after log
into your account; else your internet banking account will be deactivated and deleted within 24 hours
3. Do not share your password with anyone for your security purpose.
Thank You for Being A Loyal Altitude User
Altitude Team
Other Means
• Other ways in which the login details can be attained include
computers in public areas (such as Internet cafés, airport or
hotel lobby) which record sensitive information through
keystroke logging software installed in that computer or
shoulder surfing.
• Trojans or malware also provides criminals access to a
victim’s computer or smart phone which installed in those
device through exploiting the vulnerability of out dated
antivirus, insecure connection to public/free Wi-Fi hotspot,
infected USB devices.
• However, phishing remains the most popular way in which
personal banking details are stolen.
Final Picture
Prevention of Internet Banking Fraud
• Awareness is the main and first shield
to prevent IB fraud. Knowledge and
awareness is like light. As beside
mentioned shadow can be removed by
spotting light on it; fraud can mostly be
eliminated in IB by building awareness
like that.
Prevention of Internet Banking Fraud (contd..)
To avoid to be a victim of Internet Banking fraud, following tips
should be kept in mind:
• Remember, legitimate businesses should NEVER ask you for your
personal or financial information via email.
• If it appears to be a phishing email, simply delete it.
• Do not click on any links listed within the email message, and do
not open any attachments contained within the email. Many
phishing messages and sites not only attempt to get your personal
information, they may also attempt to install malicious code on
your computer.
• Do not enter personal information in a pop-up screen. Legitimate
companies, agencies, and organizations don't ask for personal
information via pop-up screens.
Prevention of Internet Banking Fraud (contd..)
• If you get an email or phone call from a person posing as a bank
official or service desk officer, take the name and phone number of
the person calling. Tell them that you cannot talk now. Look up the
contact information of the business and contact them
independently to verify the legitimacy of the phone call.
• Review your credit card and bank statements, along with bills from
any other companies with which you do business, looking for
unauthorized charges or withdrawals.
• Choose strong passwords for your accounts, do not use the same
password for every account and most importantly never save it in
your browser.
• Remember when you put your credentials on the Internet, always
make sure that the site you use to enter such information is
secure.
Prevention of Internet Banking Fraud (contd..)
• Always keep antivirus of your PC or device(if any) updated and run
virus scan regularly
• Make sure that latest patch of OS has been deployed
• Change your password periodically as per Information Security
Policy
• Avoid using insecure public Wi-Fi hotspot or other peoples
PC/Laptop to log into the Internet Banking solution
• Watch out for shoulder surfers (people who watch over your
shoulder when you type in your passwords).
• Always lock or log off of your computer before walking away from it!
Now It is Time for the
IB Fraud

More Related Content

What's hot

Internet fraud
Internet fraudInternet fraud
Internet fraud
Yasha Singh
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
Rahmat Inggi
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
N F
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
Harold Stallard
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
Steve Mitchinson
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
BestIDTheftCompanys.com
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
- Mark - Fullbright
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
Naval OPSEC
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
Goutama Bachtiar
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
amiable_indian
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
 
Phishing
PhishingPhishing
Phishing
Ajit Yadav
 
Data theft
Data theftData theft
Data theftLaura
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
Blake Morgan LLP
 

What's hot (20)

Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Research Article
Research ArticleResearch Article
Research Article
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Phishing
PhishingPhishing
Phishing
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Data theft
Data theftData theft
Data theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 

Viewers also liked

Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity management
GARL
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
Blackbaud
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Dinidu Weeraratne
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Wagh Bakri Tea Lounge
Wagh Bakri Tea LoungeWagh Bakri Tea Lounge
Wagh Bakri Tea LoungeWaghBakri
 
5 biggest banking scams in india
5 biggest banking scams in india 5 biggest banking scams in india
5 biggest banking scams in india
Universal Business School (Karjat)
 
Essential Social Media for Solo-Preneurs
Essential Social Media for Solo-PreneursEssential Social Media for Solo-Preneurs
Essential Social Media for Solo-Preneurs
IABC Houston
 
10 tips on avoiding an early grave for your brand or company
10 tips on avoiding an early grave for your brand or company10 tips on avoiding an early grave for your brand or company
10 tips on avoiding an early grave for your brand or company
Gary Bembridge
 
Developing Stratgey by Caroline Durowse - #DigitalTrends
Developing Stratgey by Caroline Durowse -  #DigitalTrendsDeveloping Stratgey by Caroline Durowse -  #DigitalTrends
Developing Stratgey by Caroline Durowse - #DigitalTrendse-Strategy
 
What is Digital Strategy? (And why should I care?)
What is Digital Strategy? (And why should I care?) What is Digital Strategy? (And why should I care?)
What is Digital Strategy? (And why should I care?)
Elliott Farber
 
Cyber Security & SMEs – protecting your business
Cyber Security & SMEs – protecting your businessCyber Security & SMEs – protecting your business
Cyber Security & SMEs – protecting your business
Allen Wilkes
 
Current State of E-channel Fraud Trends: Online Banking, Mobile Banking, and ...
Current State of E-channel Fraud Trends: Online Banking, Mobile Banking, and ...Current State of E-channel Fraud Trends: Online Banking, Mobile Banking, and ...
Current State of E-channel Fraud Trends: Online Banking, Mobile Banking, and ...
NAFCU Services Corporation
 
The Top Issues in Mobile Payments Fraud
The Top Issues in Mobile Payments FraudThe Top Issues in Mobile Payments Fraud
The Top Issues in Mobile Payments FraudVivastream
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
Kudakwashe Shamu
 
20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction
Luc Beirens
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Tim Bass
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile World
Comrade
 
Payments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online SalesPayments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online SalesChristopher Uriarte
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Capgemini
 

Viewers also liked (20)

Prevent banking frauds through identity management
Prevent banking frauds through identity managementPrevent banking frauds through identity management
Prevent banking frauds through identity management
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Wagh Bakri Tea Lounge
Wagh Bakri Tea LoungeWagh Bakri Tea Lounge
Wagh Bakri Tea Lounge
 
5 biggest banking scams in india
5 biggest banking scams in india 5 biggest banking scams in india
5 biggest banking scams in india
 
Essential Social Media for Solo-Preneurs
Essential Social Media for Solo-PreneursEssential Social Media for Solo-Preneurs
Essential Social Media for Solo-Preneurs
 
10 tips on avoiding an early grave for your brand or company
10 tips on avoiding an early grave for your brand or company10 tips on avoiding an early grave for your brand or company
10 tips on avoiding an early grave for your brand or company
 
Developing Stratgey by Caroline Durowse - #DigitalTrends
Developing Stratgey by Caroline Durowse -  #DigitalTrendsDeveloping Stratgey by Caroline Durowse -  #DigitalTrends
Developing Stratgey by Caroline Durowse - #DigitalTrends
 
What is Digital Strategy? (And why should I care?)
What is Digital Strategy? (And why should I care?) What is Digital Strategy? (And why should I care?)
What is Digital Strategy? (And why should I care?)
 
Cyber Security & SMEs – protecting your business
Cyber Security & SMEs – protecting your businessCyber Security & SMEs – protecting your business
Cyber Security & SMEs – protecting your business
 
Current State of E-channel Fraud Trends: Online Banking, Mobile Banking, and ...
Current State of E-channel Fraud Trends: Online Banking, Mobile Banking, and ...Current State of E-channel Fraud Trends: Online Banking, Mobile Banking, and ...
Current State of E-channel Fraud Trends: Online Banking, Mobile Banking, and ...
 
The Top Issues in Mobile Payments Fraud
The Top Issues in Mobile Payments FraudThe Top Issues in Mobile Payments Fraud
The Top Issues in Mobile Payments Fraud
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction20120613 e-banking fraud situation - BE law enforcement reaction
20120613 e-banking fraud situation - BE law enforcement reaction
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
Balancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile WorldBalancing Fraud & Customer Experience in a Mobile World
Balancing Fraud & Customer Experience in a Mobile World
 
Payments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online SalesPayments Card Fraud Challenges in Digital and Online Sales
Payments Card Fraud Challenges in Digital and Online Sales
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
 

Similar to IB Fraud

Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
Sheril Daniel
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
tomciolkosz
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
phishing attack - man in the middle.pptx
phishing attack - man in the middle.pptxphishing attack - man in the middle.pptx
phishing attack - man in the middle.pptx
2021000444deepak
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
Surajsingh809614
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
Alexandru Turcu
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalSiphiwe Msibi
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
Yusuf Qadir
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 

Similar to IB Fraud (20)

Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
phishing attack - man in the middle.pptx
phishing attack - man in the middle.pptxphishing attack - man in the middle.pptx
phishing attack - man in the middle.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 

IB Fraud

  • 1. Prevention of Fraud, Forgeries in Internet Banking and T24 System Presented by Md. Shazzad Hossain, CISA, CISM, CRISC Senior Manager IT Audit Department Prime Bank Limited Head Office Dhaka, Bangladesh
  • 2. Some points to be ponder  Banking and Bank  Fraud and Forgery  Internet  Internet Banking  How an Internet Banking Fraud happened  Prevention of Fraud in IB
  • 3. Banking and Bank • It is the business conducted or services offered by a bank. • Simply the bank collects money from the depositors and invest the depositors money with the intent to receive more. • As such it can be said that banks run its business with public’s money and act as a custodian of that money.
  • 4. Fraud and Forgery • Though the word Fraud and Forgery is used inter changeably; they are not actually same. Fraud: Fraud is a relatively broad term applied to any illegal act in which the offender uses deceitful or deceptive means to carry out the crime. In almost all instances of fraud, the offender is trying to obtain something from the victim, whether the victim be an individual person, group of people, or company. Furthermore, most fraud crimes are committed to obtain money or access to money. Forgery: Forgery is actually a type of fraud in which the offender uses false, fabricated or fictitious documents in order to defraud a victim, usually in an effort to secure money. A person can also be charged with forgery if they alter or change an existing document for the purpose of deceiving or defrauding the victim. Even something as simple as signing another person's name on a check can be considered forgery. Fraud is a hidden crime. In every fraud situation, the fraudster tries to conceal his/her crime. The method for concealing fraud are so numerous and sometimes ingenious that almost anyone might be defrauded.
  • 5. Internet • The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. • It is a global network connecting millions of computers. More than 190 countries are linked into exchanges of data, news and opinions. According to Internet Live Stats, as of December 30, 2014 there was an estimated 3,037,608,300 Internet users worldwide. The number of Internet users represents nearly 40 percent of the world's population. The largest number of Internet users by country is China, followed by the United States and India. • In September 2014, the total number of websites with a unique hostname online exceeded 1 billion. This is an increase from one website (info.cern.ch) in 1991.
  • 6. Is Web and Internet the Same? • The Internet is not synonymous with World Wide Web. The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet.
  • 7. Internet Banking • Bank offer its product or service through many ways. Internet Banking is one of them and most probably the recent addition in our society. • To avail this service one have to have a formal banking relationship with bank and an internet connected PC or device. • In our bank the internet banking is offered to our customer named “ALTITUDE”. • It is a secure, most robust and popular Internet Banking solution in Bangladesh. • As such it is not beyond the target of cyber criminals and prone to fraud and forgery.
  • 9. How an Internet Banking Fraud happened • In most cases Internet Banking fraud initiated by taking the opportunity of one’s lack of security knowledge. • The process followed by fraudsters to steal money from internet banking users is nearly always the same. They are: i. Get the person’s Internet banking details, typically through a “Phishing Attack” ii. Get a banking account/s to which money can be transferred to and withdrawn iii. Clone the SIM card used by the person iv. Hack the persons e-mail account v. Create beneficiaries (using the list of banking accounts) and transfer money to these beneficiaries and vi. Withdraw the money from these accounts. • In each of these steps the criminals can exploit different weaknesses in the system to achieve their goal.
  • 10. Phishing • Phishing is a form of theft where the intent is to steal your valuable personal data, such as National Identification numbers, credit card numbers, passwords, account data, or other personal and critical information. • Regardless of which story the phishers use, if you fall prey to a phishing email, the end result may be unauthorized fund transfer which ultimately lead to an empty bank account or other financial account. Identity theft is also a very common result of phishing scams. • If this Phishing attack is more targeted and specific to any person, organization etc. then it is called Spare Phishing attack.
  • 11. How does Phishing work? • A phisher will send you an email, an instant message or sometimes call you on the phone. The message may appear to come from a friend, a business (your bank), a government agency (the BB), or some other entity. Common phishing scams typically claim to be credit card companies, banks, and major online retailers such as Ajker Deal, Bikroy.com or bdjobs, as well as social networking sites like Facebook. Some phishing attempts are easy to identify because they claim to come from businesses or companies that you have never dealt with; others may be more difficult to identify, since they appear to originate from entities with which you do business. • A phishing message may indicate that the entity had problems with their computers or data and that they simply need to verify your account information so you won't be inconvenienced next time you try to use their services. The email message might suggest that a suspicious purchase was made using your credit card, and that if you did not make this purchase, you need to contact them by using the link included in the email. • Another example is a message claiming that you have just won the lottery, that you should go to the secure web link provided, enter your bank account information and they will deposit your winnings into your account. • Other variation might be an email claiming to be from retail shop claiming that due to an accounting error, you are owed a refund. They ask that you go to a website and enter your banking information so that they can process the refund.
  • 12. Example of a Phishing email From: Altitude Team [rj@calpoly.edu] Sent: Friday, June 29, 2012 2:42 PM Subject: Internet Banking Account Deletion Confirmation Altitude! SERVICE ANNOUNCEMENT Dear Account Holder, 1. You have requested your Internet Banking Account on June 29, 2012 at 11:02 PM BST to be deactivated and deleted from a location in with this IP number; 201.130.47.33. 2. Click on (http://localhost/pib.primebank.com.bd/login.html) to cancel this request after log into your account; else your internet banking account will be deactivated and deleted within 24 hours 3. Do not share your password with anyone for your security purpose. Thank You for Being A Loyal Altitude User Altitude Team
  • 13.
  • 14. Other Means • Other ways in which the login details can be attained include computers in public areas (such as Internet cafés, airport or hotel lobby) which record sensitive information through keystroke logging software installed in that computer or shoulder surfing. • Trojans or malware also provides criminals access to a victim’s computer or smart phone which installed in those device through exploiting the vulnerability of out dated antivirus, insecure connection to public/free Wi-Fi hotspot, infected USB devices. • However, phishing remains the most popular way in which personal banking details are stolen.
  • 16. Prevention of Internet Banking Fraud • Awareness is the main and first shield to prevent IB fraud. Knowledge and awareness is like light. As beside mentioned shadow can be removed by spotting light on it; fraud can mostly be eliminated in IB by building awareness like that.
  • 17. Prevention of Internet Banking Fraud (contd..) To avoid to be a victim of Internet Banking fraud, following tips should be kept in mind: • Remember, legitimate businesses should NEVER ask you for your personal or financial information via email. • If it appears to be a phishing email, simply delete it. • Do not click on any links listed within the email message, and do not open any attachments contained within the email. Many phishing messages and sites not only attempt to get your personal information, they may also attempt to install malicious code on your computer. • Do not enter personal information in a pop-up screen. Legitimate companies, agencies, and organizations don't ask for personal information via pop-up screens.
  • 18. Prevention of Internet Banking Fraud (contd..) • If you get an email or phone call from a person posing as a bank official or service desk officer, take the name and phone number of the person calling. Tell them that you cannot talk now. Look up the contact information of the business and contact them independently to verify the legitimacy of the phone call. • Review your credit card and bank statements, along with bills from any other companies with which you do business, looking for unauthorized charges or withdrawals. • Choose strong passwords for your accounts, do not use the same password for every account and most importantly never save it in your browser. • Remember when you put your credentials on the Internet, always make sure that the site you use to enter such information is secure.
  • 19. Prevention of Internet Banking Fraud (contd..) • Always keep antivirus of your PC or device(if any) updated and run virus scan regularly • Make sure that latest patch of OS has been deployed • Change your password periodically as per Information Security Policy • Avoid using insecure public Wi-Fi hotspot or other peoples PC/Laptop to log into the Internet Banking solution • Watch out for shoulder surfers (people who watch over your shoulder when you type in your passwords). • Always lock or log off of your computer before walking away from it!
  • 20. Now It is Time for the