Transactional Insurance Fraud Threats

34
2015 Pindrop Security. Confidential. TRANSACTIONAL INSURANCE FRAUD THREATS Matt Garland, Vice President of Research Pindrop Security August 26, 2015

Transcript of Transactional Insurance Fraud Threats

Page 1: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

TRANSACTIONAL INSURANCE FRAUD THREATS

Matt Garland, Vice President of ResearchPindrop SecurityAugust 26, 2015

Page 2: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

NOTE

These slides are from a webinar held August 26,

2015.

You may view a recording of the webinar at

www.pindropsecurity.com/webcast-archive

Page 3: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

Physical

THE PHONE IS THE WEAKEST LINK

1995 2010

Page 4: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

Physical Online

THE PHONE IS THE WEAKEST LINK

1995 2010

Page 5: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

Physical PhoneOnline

THE PHONE IS THE WEAKEST LINK

1995 2010

Page 6: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE VULNERABILITIES

Page 7: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

CUSTOMER SERVICE REPRESENTATIVES

• Human Element• Social Engineering• Focused on customer

service

Page 8: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

KNOWLEDGE BASED AUTHENTICATION

• Social Media• Online Black Markets• Data Breaches• High Failure Rates (15-

15%)

Page 9: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

CALLER ID / ANI

• Easy and cheap to spoof caller ID and ANI

Page 10: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

VOICE BIOMETRICS

• Voice Distortion• Background Noise• Call Quality• Enrollment• Privacy Issues

Page 11: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

THE GROWTH OF PHONE FRAUD

Page 12: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

RISING PHONE FRAUD

Page 13: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

PHONE FRAUD RATES

Avg. C

all C

enter

Banks

Brokera

ges

Credit C

ardReta

il

Mobile

Dev

ice In

suran

ce1 in 2200 1 in 2650 1 in 3000

1 in 900 1 in 1000

1 in 300

Page 14: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

FRAUD EXPOSURE

Banks Brokerages Credit Card Mobile Device Insurance

$0

$2,000,000

$4,000,000

$6,000,000

$8,000,000

$10,000,000

$12,000,000

$14,000,000

$16,000,000

Page 15: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

OTHER LOSSES

Reputational Risk

Page 16: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

OTHER LOSSES

Customer Privacy /Data Breaches

Reputational Risk

Page 17: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

OTHER LOSSES

Customer Privacy /Data Breaches

Customer ExperienceReputational Risk

Page 18: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD TECHNIQUES

Page 19: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD STEPS

Reconnaissance Account Takeover Fraud Triggers Monetize the Attack

Page 20: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD STEPS

Reconnaissance Account Takeover Fraud Triggers Monetize the Attack

Page 21: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD STEPS

Reconnaissance Account Takeover Fraud Triggers Monetize the Attack

Page 22: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD STEPS

Reconnaissance Account Takeover Fraud Triggers Monetize the Attack

Page 23: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

RECONNAISSANCE

• Identify policy holders• Determine policy value• Collect KBA answers

Page 24: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

ACCOUNT TAKEOVER

• Change contact information• Reset password• Setup online account

Page 25: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

REDUCE FRAUD TRIGGERS

• Verification intercept

Page 26: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

MONETIZING ATTACKS

• Loans or surrenders of policies

• Loans or liquidation of retirement accounts

• File fraudulent claims

Page 27: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

DETECTING PHONE FRAUD

Page 28: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

BEST PRACTICES

Track Phone Fraud

Page 29: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

BEST PRACTICES

Track Phone Fraud Detect Phone Fraud

Page 30: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

BEST PRACTICES

Track Phone Fraud Detect Phone Fraud Authenticate Callers

Page 31: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

LOSS• Packet loss • Robotization • Dropped frames

SPECTRUM• Quantization • Frequency filters• Codec artifacts

NOISE• Clarity• Correlation • Signal-to-noise ratio

147 audio features

UniquePhone

Geo-Location Risk Factors

PHONEPRINTING™

Phoneprint™

Call AudioRequires 15 seconds

of call audio

Risk Score

Call Type

Page 32: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

RISK BASED AUTHENTICATION

Quick verification of good calls reduces call

time and improves customer satisfaction

Bad callers are flagged and losses stopped

Page 33: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

CONCLUSION

• The phone channel represents the weakest link for transactional fraud attempts

• Phone channel fraud is a significant and increasing risk for insurance providers

• Best Practices• Monitor and track fraud back to phone channel• Use PhoneprintingTM to detect phone fraud• Implement risk-based authentication

Page 34: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PINDROP SECURITYPhone Fraud Stops Here.

For more information contact [email protected]