Security Awareness Information
This content is for information purposes only. Before acting on any ideas presented in this content; security, legal, technical, and reputational risks should be independently evaluated considering the unique factual circumstances surrounding each institution.
No computer system can provide absolute security under all conditions. Any views or opinions presented do not necessarily state or reflect those of Spectra Bank or any other entity.
What is Corporate Account Takeover?
A fast growing electronic crime where thieves typically use some form of malware to obtain login credentials to Corporate Online Banking accounts and fraudulently transfer funds from the account(s).
- Short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent.
- Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software.
Domestic and International Wire Transfers, Business-to-Business ACH payments, Online Bill Pay and electronic payroll payments have all been used to commit this crime.
How does it work?
- Criminals target victims by scams.
- Victim unknowingly installs software by clicking on a link or visiting an infected Internet site.
- Fraudsters begin monitoring the accounts.
- Victim logs on to their Online Banking.
- Fraudsters collect login credentials.
- Fraudsters wait for the right time and then, depending on the controls, log in after hours. Or if the victim is utilizing a token the fraudsters wait until the victim enters their code and hijack the session usually followed by a message that Online Banking is temporarily unavailable.
Where does it come from?
- Malicious website (including Social Networking sites)
- P2P downloads (e.g. LimeWire)
- Ads from popular websites
According to researchers in the first quarter of 2011, 76% of web resources used to spread malicious programs were found in 5 countries worldwide: United States, Russian Federation, Netherlands, China and Ukraine.
Current Trend Examples
- Form of malware that deceives or misleads users into paying for the fake or simulated removal of malware.
- Has become a growing and serious security threat in desktop computing.
- Mainly relies on social engineering in order to defeat the security software.
- Most have a Trojan Horse component which users are misled into installing.
- Browser plug-in (typically toolbar).
- Image, screensaver or ZIP file attached to an e-mail.
- Multimedia codec required to play a video clip.
- Software shared on peer-to-peer netowkrs.
- A free online malware scanning service.
- Criminally fraudulent process of attempting to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity in an electronic communication.
- Commonly used means:
- Social web sites
- Auction sites
- Online payment processors
- IT administrators
- What may be relied upon today as an indication that an email is authentic may become unreliable as electronic crimes evolve.
- This is why it is important to stay abreast of changing security trends.
- Some experts feel e-mail is the biggest security threat of all.
- The fastest, most effective method of spreading malicious code to the largest number of users.
- Also a large source of wasted technology resources.
- Examples of corporate e-mail waste:
- Electronic Greeting Cards
- Chain Letters
- Jokes and graphics
- Spam and junk e-mail
What can we do to Protect?
- Provide Security Awareness Training for our employees and customers
- Review our Contracts: Ensure that both parties understand their roles & responsibilities
- Make sure our customers are aware of basic online security standards
- Stay Informed: Attend webinars/seminars & other user ground meetings
- Develop a layered security approach
Layered Security Approach
- Monitoring of IP addresses
- New User Controls - Administrator can create a new user. Bank must activate user.
- Calendar File - Frequencies and Limits
- Dual Control Processing of files on separate devices - recommended
- Fax or Out of Band Confirmation
- Secure Browser Key
- Pattern Recognition Software
What can Businesses do to Protect?
- Education is Key - Train your employees
- Secure your computer and networks
- Limit Administrative Rights - Do not allow employees to install any software without receiving prior approval.
- Install and Maintain Spam Filters
- Surf the Internet carefully
- Install and Maintain real-time anti-virus and anti-spyware desktop firewall and malware detection and removal software. Use these tools regularly to scan your computer. Allow for automatic updates and scheduled scans.
- Install routers and firewalls to prevent unauthorized access to your computer or network. Change the default passwords on all network devices.
- Install security updates to operating systems and all applications as they become available.
- Block Pop-Ups
- Do not open attachments from e-mail - Be on the alert for suspicious emails
- Do not use public Internet access points
- Reconcile Accounts Daily
- Note any changes in the performance of your computer. Dramatic loss of speed, computer locks up, unexpected rebooting, unusual popups, etc.
- Make sure that your employees know how and to whom to report suspicious activity to at your company and the bank
- Contact the bank if you:
- Suspect a fraudulent transaction
- If you are trying to process an Online Wire or ACH Batch and receive a maintenance page
- If you receive an email claiming to be from the bank and it is requesting personal/company information