SlideShare a Scribd company logo
Outsmart Fraudsters
GIVING CUSTOMERS A GREAT USER EXPERIENCE WHILE KEEPING FRAUDSTERS OUT
Shaked Vax
June 2016
Trusteer Product Strategist - IBM Security
Brian Mulligan
Offering Manager Access and Directory - IBM Security
2 IBM Security
Agenda
• The evolution of online fraud vs. identity verification
• Fraud is a problem of establishing an identity claim
̶ Applying intelligent access management
̶ Adding frictionless identity assurance
• An integrated identity-focused approach to fraud reduction
Online Fraud
EVOLUTION VS. IDENTITY VERIFICATION SOLUTIONS
4 IBM Security
Account Takeover,
New Account
Fraud
Cybercrime Attack Vectors
Advanced Threats (Employees)
WWW
Online/Mobile Banking
Money, Intellectual Property, Business Data
Mobile Fraud Risk
Phishing and Malware Fraud
5 IBM Security
Financial cybercrime trends
• Malware eco-system managed like Software & SaaS commodity
̶ Agile development cycle – Dyre, Ramnit, Bugat updates weekly
̶ Gangs with Start-up mentality. Use analytics to track success
̶ Malware is built to bypass dynamic analysis
̶ Malware is environment-aware
• Region-specific cybercrime intensifies : Targeted malware campaigns
• Phishing… the same old phish with twists
• Mobile threats rising : Cross channel fraud
• Social engineering + Mobile malware = Broken 2 factor authentication
• Fraud via user’s device on the rise – RAT/Proxy
• Focusing on high value targets
Cybercrime gangs are relentlessly, successfully focused towards fraud
6 IBM Security
Dyre – A global 2014-2015 rock star
US Department
of Homeland
Security
Dyre Alert
October
First reports of
attacks against
US/UK targets
June
Attacks against
Targets in
Australia and
China
December 2014
Over 100 firms
targeted
November
Used as APT in
Attack against
salesforce.com
September
Attacks against
Romanian,
German and
Swiss Banks
October
2014 2015
Dyre Wolf against
high value targets
incl. DDOS ($5M
from Ryanair)
April 2015
Dridex Malware
launches Dyre
like attacks
January 2016
Keeps evolving with innovations:
Server Side web-injects, Anti-
sandboxing, Randomized Config
File Names
March-June 2015
2016
Dyre Gang
takedown in
Moscow.
Code Leaked?
November 2015
Attacks against
Spanish &
LATAM Spanish
speaking Banks
July
7 IBM Security
Dyre data collection
==Programs==
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0
Dyre collects…
• OS attributes
• Browser attributes
• Installed programs
• Services
• Passwords over
secure connection
8 IBM Security
Device forging
9 IBM Security
April-May 2016 GozNym attacking world wide
10 IBM Security
Meet GozNym – the new “two-headed beast”
• Malware Installer (“Dropper”) active since mid-2013
• Highly effective infector and powerful launcher for other
malware
• Infiltrating computers through exploit kits
̶ Drive by infections, Spam campaigns and poisoned Word
documents, launched into action when users enable macros
• Stealthy and highly persistent on infected machines
̶ Uses heavy obfuscation techniques via encryption, anti VM and
anti-research capabilities to evade analysis and AV detection
• Connection with Gozi banking Trojans debuted in Q4-
2015
̶ Until then was recognized as a ransomware dropper
• Believed to be operated by one group, and developed
on an ongoing basis by the same developer(s).
• Alter web sessions and trick users into divulging
authentication details
• Capable of
̶ Web-form grabbing
̶ Social engineering
̶ Redirection and session manipulation
• Like Dyre and Dridex
̶ Screen grabbing (screenshots)
• Used to execute banking account takeover attacks
• LogMeIn remote desktop tool (RAT) may be used by
operators
̶ Perform fraud directly from the infected device
• April 2016, IBM Trusteer research discover an unprecedented code
merge between Gozi ISFB and the Nymaim downloader Trojan
• Combining two top-notch malware strains:
Gozi ISFBNaymaim
11 IBM Security
Mobile fraud: The appearance of PC-grade mobile malware
• “GM Bot” / “Mazar Banking Software”
• Extensive PC malware-like capabilities including:
̶ Dynamic configuration via C&C
̶ Configurable banking app injection/overlay capabilities
̶ Ready made modules being sold to attack WW banks and financial services
̶ On-Mobile full fraud lifecycle – Credential stealing, 2FA circumvent, block user/authorization
̶ Flash News: GM Bot Code Leak !!
̶ Flash News 2: GM BOT 2.0 released
12 IBM Security
The mobile channel threats
Understanding the mobile risk landscape
Customer
Sensitive Information Stealing Mobile Channel Misuse Cross-Channel Fraud
• Credentials stealing
• Personal Identifiable
Information (PII)
• Financial records
• Full account takeover on
mobile channel
• Use of mobile by fraudsters
as an anonymous channel
to perform the ATO
• Leverage mobile to enable
fraud on other channels
(e.g. web)
• Circumvent Out of Band
(OOB) two-factor
authentication (2FA)
Criminal
13 IBM Security
Online Banking
Cross Channel Attacks – OOB pin stealing via mobile malware
Credentials
Theft
LOGIN
App
Login
Mobile Device Risk
Factors
Device Attributes
• Jailbroken /
Rooted Device
• Malware
Infection
• New device ID
• Unpatched OS
• Unsecure Wi-Fi
connection
• Rogue App
Account Risk Device Risk+
Account
Compromise
History
Phished
Credentials
Malware
Infections,
Phishing
Incident
(stolen
credentials)
The bank’s
mobile banking
app
Credentials, data
Customer
Criminal
14 IBM Security
Viruses & worms
Focused on nuisance
& damage
2003
APT/High-value targeted attacks
Business email compromise, Dyre Wolf
bank employees/systems compromise
2015
Online/Mobile cross-
channel attacks
Leverage mobile anonymity,
bypass SMS OTP, 2FA
2012
MiTM/MiTB
Inject transactions
steal secondary
authentication
2006
Online fraud methodologies vs. identity verification
2nd Factor Auth Circumvention
Device ID & Risk Engine
Evasion
RATs - RDP/VNC, PC-grade
mobile malware
Bypass device ID,
overlay mobile app
2014
Single Factor Auth Stealing
Phishing &
keyloggers
Bypass static
username/password
2004
MitB with login blocking,
automated scripts
Steal credentials, bypass
device ID & risk engines
2009
Leveraging Mobile Channel
Fraud is a problem of
establishing an identity claim
BALANCING FRAUD PREVENTION AND BUSINESS NEEDS
16 IBM Security
Stopping fraud means accurately identifying the user
17 IBM Security
The traditional security vs. convenience tradeoff
High Usability Expectations Demand for Increased Assurance
18 IBM Security
Embrace context for intelligent, risk-based access
• Dynamic user risk assessment using contextual information
̶ Device, user, environment, resource, malware, device management status and past user behavior
• Protect critical sensitive assets depending on the risk context
̶ Strong and multi-factor authentication, limit access to sensitive information/operations
• Central integration and enforcement
̶ No need to modify backend applications
̶ Unified risk-based access policy management and enforcement
Mobile
Web
Hybrid
Native
Apps
19 IBM Security
Assess risk use context. What is context?
Identity
Groups, roles, credential attributes, organization
Endpoints
Device fingerprint, Screen resolution, Fonts, OS, Browser, Plugins etc
Environment
Geographic location, network, local time . . . etc
Resource / Action
The application being requested and what is being done.
Behavior
Analytics of user historical and current resource usage.
20 IBM Security
Recognize that achieving absolute
certainty about an identity's
legitimacy is impossible. Focus
instead on assessing the probability
that an identity claim is legitimate.
GARTNER 2015
21 IBM Security
Balancing identity verification and usability
22 IBM Security
Frictionless authentication through a new factor: Something you DO!
Comprehensive
Behavioral
Based Profile Profile
Anomalies
detection
Rogue Activity
Identification
23 IBM Security
Behavior based profiling
• Proactively analyze hundreds of parameters to authenticate users against a
uniquely created user profile
• Profile is based on user interaction patterns, account usage and frequently used
devices, learned during service accesses
• User is authenticated by a much richer identifying data set that can augment
traditional authentication factors
• No user interaction is required in most logins
̶ Only when suspicion arises – user is presented with authentication
challenges
24 IBM Security
User identity verification through anomaly detection
• Different devices / accounts
• Deviation in access times / locations
• Velocity – irrational location change
• Language
User/Account behavior anomalies
• Navigation patterns – jumping between unlinked pages
• Clipboard – pasting page address
• Automation – link clicking
• User interaction – deviation in typing/mouse movements
Session flow anomalies
• Device ID spoofing
• Interaction patterns
• Suspicious geographies
• Proxy usage
• RAT usage
Device
25 IBM Security
Identifying rogue activity
• Clientless detection of MitB malware
• Detecting PC, Mac and mobile devices malware
• Detection updates, addressing evolving threats and new attack
vectors, deployed automatically
• No customer interaction or business interruption required
Malware detection
• Unique detection of machine remote take over by RATs
Remote Access Trojans (RATs) use detection
• Identifying known attackers using a world wide fraudsters database
Known fraudsters detection
Identity-focused approach to
fraud reduction
27 IBM Security
Holistic fraud protection solution
• Detect identity and fraud accurately
• Manage centralized context based access policies balancing security
and usability
• Enforce fraud prevention measures using explicit-authentication and access-
authorization
• E.g. require additional 2nd factor authentication via SMS on access to highly sensitive
operations (money transfers)
• Limit operations if there is a significant risk a particular user is compromised (prevent
“add payee”)
• Provide remediation facilities to infected user to regain full business activity
• Clean and re-credential
Addressing the cycle - Detect–Prevent–Remediate
• Deploy Trusteer’s Pinpoint fraud protection and dynamic authentication via ISAM
• Allows integrating and protecting multiple applications at once (without any changes to
their application)
Accelerate deployment of fraud protection and dynamic
authentication
Full Fraud
Lifecycle
management
Prevent
28 IBM Security
How it works? Trusteer Pinpoint & IBM Security Access Manager
X-Force / Trusteer Security Research
customer
Authentication,
Verification, Access
Policy Management
Web/Mobile
Application
snippet
Pinpoint Identify
Detection Service
Session
assessment
LineofBusiness/Frauddepartment
Session
Session&
devicedata
Session
Management
On-demand remediation
(Rapport for remediation)
ISAM
29 IBM Security
Additional benefits from IBM Security Access Manager (ISAM)
 Enforce identity- and risk-aware application
access for web and mobile devices
 Secure identity assurance with built-in mobile
authentication service and one-time-passwords
 Centrally manage policies to protect enterprise
from fraud and malware:
 Deploy Trusteer Pinpoint without modifying apps
 Block the OWASP top 10 vulnerabilities
 Reduce TCO and time to value with an modular
“all-in-one” access appliance in virtual and hardware
form factors
 Deliver built-in integrations with, MobileFirst
Platform, MobileFirst Protect, Microsoft Office 365,
SAP, Websphere and more
Web & Mobile Access / SSO
Risk-based Enforcement
Web, Fraud & Malware
Protection
IBM Security Access
Manager
Identity Federation
30 IBM Security
Use a pre-integrated, holistic solution that addresses business
needs and security
Don’t prototype integrating multiple point solutions to protect critical assets
Seamless
identity
verification
Centralized
fraud
prevention
Extensive
authentication
tools
Holistic
toolset
Address full
compromise
cycle
Accurate
fraud
detection
Questions?
IBM SECURITY
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express
or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of,
creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these
materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may
change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and
other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks
or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or
product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are
designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective.
IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT
OF ANY PARTY.
FOLLOW US ON:
THANK YOU

More Related Content

What's hot

Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
IBM Security
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
IBM Security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
IBM Security
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
IBM Security
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
IBM Security
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
IBM Security
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
IBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
IBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security
 

What's hot (20)

Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 

Viewers also liked

iovation presents Fighting CNP Fraud - April 2016
iovation presents Fighting CNP Fraud - April 2016 iovation presents Fighting CNP Fraud - April 2016
iovation presents Fighting CNP Fraud - April 2016
TransUnion
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
David Jones
 
The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention
TransUnion
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
Alejandro Correa Bahnsen, PhD
 
Tracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup Landscape
Tracxn
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
Amazon Web Services
 
Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
Christian Gügi
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
Gwen (Chen) Shapira
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
Dominic Sroda Korkoryi
 
Web Trends to Watch in 2014
Web Trends to Watch in 2014Web Trends to Watch in 2014
Web Trends to Watch in 2014
David King
 

Viewers also liked (11)

iovation presents Fighting CNP Fraud - April 2016
iovation presents Fighting CNP Fraud - April 2016 iovation presents Fighting CNP Fraud - April 2016
iovation presents Fighting CNP Fraud - April 2016
 
The Rise and Rise of Web Fraud
The Rise and Rise of Web FraudThe Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
 
The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention The When, Why and How of Mobile Fraud Prevention
The When, Why and How of Mobile Fraud Prevention
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 
Tracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup Landscape
 
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
AWS re:Invent 2016: Fraud Detection with Amazon Machine Learning on AWS (FIN301)
 
Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Web Trends to Watch in 2014
Web Trends to Watch in 2014Web Trends to Watch in 2014
Web Trends to Watch in 2014
 

Similar to Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraudsters Out

Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
xband
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
Symosis Security (Previously C-Level Security)
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
Ramya Nellutla
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
Jay McLaughlin
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
Killian Delaney
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
Wen-Pai Lu
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
Jürgen Ambrosi
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
Sarah Freemantle
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
IBM Security
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Amazon Web Services
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
Thomas Springer
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
IBM Security
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
Katherine Cola
 

Similar to Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraudsters Out (20)

Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 

More from IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
IBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
IBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
IBM Security
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
IBM Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 

More from IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 

Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraudsters Out

  • 1. Outsmart Fraudsters GIVING CUSTOMERS A GREAT USER EXPERIENCE WHILE KEEPING FRAUDSTERS OUT Shaked Vax June 2016 Trusteer Product Strategist - IBM Security Brian Mulligan Offering Manager Access and Directory - IBM Security
  • 2. 2 IBM Security Agenda • The evolution of online fraud vs. identity verification • Fraud is a problem of establishing an identity claim ̶ Applying intelligent access management ̶ Adding frictionless identity assurance • An integrated identity-focused approach to fraud reduction
  • 3. Online Fraud EVOLUTION VS. IDENTITY VERIFICATION SOLUTIONS
  • 4. 4 IBM Security Account Takeover, New Account Fraud Cybercrime Attack Vectors Advanced Threats (Employees) WWW Online/Mobile Banking Money, Intellectual Property, Business Data Mobile Fraud Risk Phishing and Malware Fraud
  • 5. 5 IBM Security Financial cybercrime trends • Malware eco-system managed like Software & SaaS commodity ̶ Agile development cycle – Dyre, Ramnit, Bugat updates weekly ̶ Gangs with Start-up mentality. Use analytics to track success ̶ Malware is built to bypass dynamic analysis ̶ Malware is environment-aware • Region-specific cybercrime intensifies : Targeted malware campaigns • Phishing… the same old phish with twists • Mobile threats rising : Cross channel fraud • Social engineering + Mobile malware = Broken 2 factor authentication • Fraud via user’s device on the rise – RAT/Proxy • Focusing on high value targets Cybercrime gangs are relentlessly, successfully focused towards fraud
  • 6. 6 IBM Security Dyre – A global 2014-2015 rock star US Department of Homeland Security Dyre Alert October First reports of attacks against US/UK targets June Attacks against Targets in Australia and China December 2014 Over 100 firms targeted November Used as APT in Attack against salesforce.com September Attacks against Romanian, German and Swiss Banks October 2014 2015 Dyre Wolf against high value targets incl. DDOS ($5M from Ryanair) April 2015 Dridex Malware launches Dyre like attacks January 2016 Keeps evolving with innovations: Server Side web-injects, Anti- sandboxing, Randomized Config File Names March-June 2015 2016 Dyre Gang takedown in Moscow. Code Leaked? November 2015 Attacks against Spanish & LATAM Spanish speaking Banks July
  • 7. 7 IBM Security Dyre data collection ==Programs== User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 Dyre collects… • OS attributes • Browser attributes • Installed programs • Services • Passwords over secure connection
  • 9. 9 IBM Security April-May 2016 GozNym attacking world wide
  • 10. 10 IBM Security Meet GozNym – the new “two-headed beast” • Malware Installer (“Dropper”) active since mid-2013 • Highly effective infector and powerful launcher for other malware • Infiltrating computers through exploit kits ̶ Drive by infections, Spam campaigns and poisoned Word documents, launched into action when users enable macros • Stealthy and highly persistent on infected machines ̶ Uses heavy obfuscation techniques via encryption, anti VM and anti-research capabilities to evade analysis and AV detection • Connection with Gozi banking Trojans debuted in Q4- 2015 ̶ Until then was recognized as a ransomware dropper • Believed to be operated by one group, and developed on an ongoing basis by the same developer(s). • Alter web sessions and trick users into divulging authentication details • Capable of ̶ Web-form grabbing ̶ Social engineering ̶ Redirection and session manipulation • Like Dyre and Dridex ̶ Screen grabbing (screenshots) • Used to execute banking account takeover attacks • LogMeIn remote desktop tool (RAT) may be used by operators ̶ Perform fraud directly from the infected device • April 2016, IBM Trusteer research discover an unprecedented code merge between Gozi ISFB and the Nymaim downloader Trojan • Combining two top-notch malware strains: Gozi ISFBNaymaim
  • 11. 11 IBM Security Mobile fraud: The appearance of PC-grade mobile malware • “GM Bot” / “Mazar Banking Software” • Extensive PC malware-like capabilities including: ̶ Dynamic configuration via C&C ̶ Configurable banking app injection/overlay capabilities ̶ Ready made modules being sold to attack WW banks and financial services ̶ On-Mobile full fraud lifecycle – Credential stealing, 2FA circumvent, block user/authorization ̶ Flash News: GM Bot Code Leak !! ̶ Flash News 2: GM BOT 2.0 released
  • 12. 12 IBM Security The mobile channel threats Understanding the mobile risk landscape Customer Sensitive Information Stealing Mobile Channel Misuse Cross-Channel Fraud • Credentials stealing • Personal Identifiable Information (PII) • Financial records • Full account takeover on mobile channel • Use of mobile by fraudsters as an anonymous channel to perform the ATO • Leverage mobile to enable fraud on other channels (e.g. web) • Circumvent Out of Band (OOB) two-factor authentication (2FA) Criminal
  • 13. 13 IBM Security Online Banking Cross Channel Attacks – OOB pin stealing via mobile malware Credentials Theft LOGIN App Login Mobile Device Risk Factors Device Attributes • Jailbroken / Rooted Device • Malware Infection • New device ID • Unpatched OS • Unsecure Wi-Fi connection • Rogue App Account Risk Device Risk+ Account Compromise History Phished Credentials Malware Infections, Phishing Incident (stolen credentials) The bank’s mobile banking app Credentials, data Customer Criminal
  • 14. 14 IBM Security Viruses & worms Focused on nuisance & damage 2003 APT/High-value targeted attacks Business email compromise, Dyre Wolf bank employees/systems compromise 2015 Online/Mobile cross- channel attacks Leverage mobile anonymity, bypass SMS OTP, 2FA 2012 MiTM/MiTB Inject transactions steal secondary authentication 2006 Online fraud methodologies vs. identity verification 2nd Factor Auth Circumvention Device ID & Risk Engine Evasion RATs - RDP/VNC, PC-grade mobile malware Bypass device ID, overlay mobile app 2014 Single Factor Auth Stealing Phishing & keyloggers Bypass static username/password 2004 MitB with login blocking, automated scripts Steal credentials, bypass device ID & risk engines 2009 Leveraging Mobile Channel
  • 15. Fraud is a problem of establishing an identity claim BALANCING FRAUD PREVENTION AND BUSINESS NEEDS
  • 16. 16 IBM Security Stopping fraud means accurately identifying the user
  • 17. 17 IBM Security The traditional security vs. convenience tradeoff High Usability Expectations Demand for Increased Assurance
  • 18. 18 IBM Security Embrace context for intelligent, risk-based access • Dynamic user risk assessment using contextual information ̶ Device, user, environment, resource, malware, device management status and past user behavior • Protect critical sensitive assets depending on the risk context ̶ Strong and multi-factor authentication, limit access to sensitive information/operations • Central integration and enforcement ̶ No need to modify backend applications ̶ Unified risk-based access policy management and enforcement Mobile Web Hybrid Native Apps
  • 19. 19 IBM Security Assess risk use context. What is context? Identity Groups, roles, credential attributes, organization Endpoints Device fingerprint, Screen resolution, Fonts, OS, Browser, Plugins etc Environment Geographic location, network, local time . . . etc Resource / Action The application being requested and what is being done. Behavior Analytics of user historical and current resource usage.
  • 20. 20 IBM Security Recognize that achieving absolute certainty about an identity's legitimacy is impossible. Focus instead on assessing the probability that an identity claim is legitimate. GARTNER 2015
  • 21. 21 IBM Security Balancing identity verification and usability
  • 22. 22 IBM Security Frictionless authentication through a new factor: Something you DO! Comprehensive Behavioral Based Profile Profile Anomalies detection Rogue Activity Identification
  • 23. 23 IBM Security Behavior based profiling • Proactively analyze hundreds of parameters to authenticate users against a uniquely created user profile • Profile is based on user interaction patterns, account usage and frequently used devices, learned during service accesses • User is authenticated by a much richer identifying data set that can augment traditional authentication factors • No user interaction is required in most logins ̶ Only when suspicion arises – user is presented with authentication challenges
  • 24. 24 IBM Security User identity verification through anomaly detection • Different devices / accounts • Deviation in access times / locations • Velocity – irrational location change • Language User/Account behavior anomalies • Navigation patterns – jumping between unlinked pages • Clipboard – pasting page address • Automation – link clicking • User interaction – deviation in typing/mouse movements Session flow anomalies • Device ID spoofing • Interaction patterns • Suspicious geographies • Proxy usage • RAT usage Device
  • 25. 25 IBM Security Identifying rogue activity • Clientless detection of MitB malware • Detecting PC, Mac and mobile devices malware • Detection updates, addressing evolving threats and new attack vectors, deployed automatically • No customer interaction or business interruption required Malware detection • Unique detection of machine remote take over by RATs Remote Access Trojans (RATs) use detection • Identifying known attackers using a world wide fraudsters database Known fraudsters detection
  • 27. 27 IBM Security Holistic fraud protection solution • Detect identity and fraud accurately • Manage centralized context based access policies balancing security and usability • Enforce fraud prevention measures using explicit-authentication and access- authorization • E.g. require additional 2nd factor authentication via SMS on access to highly sensitive operations (money transfers) • Limit operations if there is a significant risk a particular user is compromised (prevent “add payee”) • Provide remediation facilities to infected user to regain full business activity • Clean and re-credential Addressing the cycle - Detect–Prevent–Remediate • Deploy Trusteer’s Pinpoint fraud protection and dynamic authentication via ISAM • Allows integrating and protecting multiple applications at once (without any changes to their application) Accelerate deployment of fraud protection and dynamic authentication Full Fraud Lifecycle management Prevent
  • 28. 28 IBM Security How it works? Trusteer Pinpoint & IBM Security Access Manager X-Force / Trusteer Security Research customer Authentication, Verification, Access Policy Management Web/Mobile Application snippet Pinpoint Identify Detection Service Session assessment LineofBusiness/Frauddepartment Session Session& devicedata Session Management On-demand remediation (Rapport for remediation) ISAM
  • 29. 29 IBM Security Additional benefits from IBM Security Access Manager (ISAM)  Enforce identity- and risk-aware application access for web and mobile devices  Secure identity assurance with built-in mobile authentication service and one-time-passwords  Centrally manage policies to protect enterprise from fraud and malware:  Deploy Trusteer Pinpoint without modifying apps  Block the OWASP top 10 vulnerabilities  Reduce TCO and time to value with an modular “all-in-one” access appliance in virtual and hardware form factors  Deliver built-in integrations with, MobileFirst Platform, MobileFirst Protect, Microsoft Office 365, SAP, Websphere and more Web & Mobile Access / SSO Risk-based Enforcement Web, Fraud & Malware Protection IBM Security Access Manager Identity Federation
  • 30. 30 IBM Security Use a pre-integrated, holistic solution that addresses business needs and security Don’t prototype integrating multiple point solutions to protect critical assets Seamless identity verification Centralized fraud prevention Extensive authentication tools Holistic toolset Address full compromise cycle Accurate fraud detection
  • 32. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. FOLLOW US ON: THANK YOU