Banking Frauds_IS PPT

18
anking Related echnological Fraud : Sunayana Sahu

Transcript of Banking Frauds_IS PPT

Page 1: Banking Frauds_IS PPT

Banking Related Technological Frauds

: Sunayana Sahu

Page 2: Banking Frauds_IS PPT

Net banking/on-line banking frauds• Phishing• Vishing• Skimming• Spoofing

Money Laundering

ATM Frauds

Page 3: Banking Frauds_IS PPT

NET BANKING/ON-LINE BANKING FRAUDS

Page 4: Banking Frauds_IS PPT

PHISINGPhishing is an attempt by fraudsters to 'fish' for your banking details. A phishing attempt usually is in the form of an e-mail that appears to be from your bank.

The e-mail usually encourages you to click a link in it that takes you to a fraudulent log-on page designed to capture your details.

What?

Page 5: Banking Frauds_IS PPT

How do fraudster

s operate

?

•Persuading to give away confidential information •such as their credit card details or online banking passwords •on replica bank or credit card provider Web sites.

•However, one click on the link activates the downloading of a Trojan worm.•This malware then monitors the user's surfing activity •and when they enter their bank URL transports them to a bogus Web site, •giving criminals easy access to any confidential passwords and log-in details.

Page 6: Banking Frauds_IS PPT

Web site spoofing is the act of creating a web site, as a hoax, with the intention of performing fraud.

To make spoof sites seem legitimate, phishers use the names, logos, graphics and even code of the actual web site.

Fraudsters send e-mails with a link to a spoofed web site asking you to update or confirm account related information.

This is done with the intention of obtaining sensitive account related information like your Internet Banking user ID, password, PIN, credit card / debit card / bank account number, card verification value (CVV) number, etc..

SPOOFING

Page 7: Banking Frauds_IS PPT

Skimming is a method used by fraudsters to capture your personal or account information from your credit card.

Your card is swiped through the skimmer and the information contained in the magnetic strip on the card is then read into and stored on the skimmer or an attached computer.

SKIMMING

Page 8: Banking Frauds_IS PPT

Vishing is a combination of Voice and Phishing that uses Voice over Internet Protocol (VoIP) technology wherein fraudsters feigning to represent real companies such as banks attempt to trick unsuspecting customers into providing their personal and financial details over the phone.

VISHING

Page 9: Banking Frauds_IS PPT

The fraudster sets up an automatic dialler which uses a modem to call all the phone numbers in a region.

When the phone is answered, an automated recording is played to alert the customer that his/her credit card has had illegal activity and that the customer should call the recorded phone number immediately. The phone number is with a caller identifier that makes it appear that they are calling from the financial company they are feigning to represent.

When the customer calls the number, it is answered by a computer-generated voice that tells the customer they have reached 'account verification' and instructs the consumer to enter his/her 16-digit credit card number on the key-pad.

Modus Operandi

Page 10: Banking Frauds_IS PPT

Once a customer enters his/her credit card number, the 'visher' has all of the information necessary to place fraudulent charges on his/her card. Those responding are also asked for the security number found on the rear of the card.

The call can then be used to obtain additional details such as security PIN, expiry date, date of birth, bank account number, etc.

Page 11: Banking Frauds_IS PPT

Spam is an electronic 'junk mail' or unwanted messages sent to your email account or mobile phone.

They may try to persuade you to buy a product or service, or visit a website where you can make purchases; or they may attempt to trick you into divulging your bank account or credit card details.

Spam

Page 12: Banking Frauds_IS PPT

Spyware such as Trojan Horse is generally considered to be software that is secretly installed on a computer and takes things from it without the permission or knowledge of the user.

Spyware may take personal information, business information, bandwidth; or processing capacity and secretly gives it to someone else.

Spyware

Page 13: Banking Frauds_IS PPT

MONEY LAUNDERING

Page 14: Banking Frauds_IS PPT

ATM FRAUDS

METHODS

By placing a device on an ATM that

prevents the machine from reading a card

Use of Skimmers and

fake Cards.

DUPLICATE ATMs

Page 15: Banking Frauds_IS PPT

TECHNOLOGICAL SOLUTIONS• Biometric tokens• Enhanced security• ATM Monitoring• Customized software's• Customer motivation• Alerts

Preventive Solutions

Page 16: Banking Frauds_IS PPT

CONCLUSIONDifficult to Investigate – being Faceless, No-

scene Crime. Being high tech crime, the normal investigator

does not have the proper background and knowledge. Special investigators have to be created to carry out the investigations.

The Reserve Bank of India has come up with different proposals to counter these frauds, they have enacted Electronic Fund Transfer Act and regulations have been amended. But the experience is limited and is in a very immature state.

Page 17: Banking Frauds_IS PPT

The existing enacted laws of India are not at all adequate to counter cyber crimes. The Indian Penal code, evidence act, and criminal procedure code had no clue about computers when they were codified. It is highly required to frame and enact laws which would deal with those subjects which are new to the country specially cyber law; Intellectual property right etc.

Page 18: Banking Frauds_IS PPT

Thank You.