*Financial Fraud In Cyber Space Flashcards
➢ estimates Identity Theft generates 1 B (USD) per year globally.
➢Automated Teller Machine (ATM) Fraud (Philippines)
INTRODUCTION:
Bangko Sentral ng Pilipinas (BSP) confirmed 220 million pesos lost in ATM FRAUD
United Nations Office on Drugs and Crime (UNODC)
is one of the emerging forms of numerous variances of financial fraud in the Philippines.
➢The “budol-budol” and “dugo-dugo” modus-operandi now has its own online versions.
➢This art of deception find its way in the cyber space. The culprit now finds their victims through email, social media, dating sites, forums and even some fraud websites.
➢Through the social engineering method, the culprit will send email, chat message and text message, claiming to be close relative or friend of the victims who are based abroad and then offer a proposal such as mobile phone load business and the like.
➢Other more technically knowledgeable suspects executed the scheme through the hacked email or social media accounts, making the victims more convinced that the persons behind the transaction were their real relatives or friends.
➢If hacking is not possible a spoofing method then would play its role
Online Financial fraud
BANK RELATED FRAUD
ATM Fraud
Credit Card Fraud
●Thieves use hidden electronics to steal the personal information stored on your card and record your PIN number to access all that hard-earned cash in your account.
●That’s why skimming takes two separate components to work.
●The first part is the skimmer itself, a card reader placed over the ATM’s real card slot
●The second is a camera which is surreptitiously positioned to capture the PIN. Some use a keypad overlay for this purpose.
ATM SKIMMING
This device is overlaid onto an existing ATM machine keypad and allows the ATM machine to function properly while it records the keystrokes
ATM keypad overlay and ATM Card Skimmer
August 8, 2016 hacking of Automated Teller Machine (ATM) at Bonifacio High Streets Branch, BGC, Fort Bonifacio, Taguig City.
➢Recovered from the ______ suspect was a key to open the ATM
Hungarian
➢ are using a combination of low and high-tech attacks to make ATMS spit out cash.
➢ These attacks first started in 2016, when several banks in ______ discovered empty ATMs with a hole drilled in one of their sides.
Hackers
Europe and Russia
➢ATM thieves will drill a small hole, wide of about _____ centimeters (1.5 inches), on the side of the ATM’s PIN (numbers) pad. This hole was right near a crucial ATM component, a 10-pin header.
4
Attackers connected and hijacked ATM’s main bus
➢This _______ wasn’t just any connector, but the header for connecting straight to the ATM’s main bus, which interconnected all the other ATM’s components, from the screen to the PIN pad, and from the internal cash store to the ATM dispenser.
10-pin header
Attackers took complete control over ATMs
➢ATMs special software and use encryption is very easy to.
➢ATM operations is very easy to understand, which allows to reverse engineer the ATM’s inner workings.
➢There are plenty of ATM programming guides that have leaked online in the past.
➢The only downside of this attack was that crooks needed to carry a ____ with them in order to send commands to the ATM.
laptop
Purchases of goods utilizing credit cards that are:
➢counterfeit
➢fictitious
➢altered or forged from different banks
➢Acquired the bank account details
➢skimming devices
➢persons manning the sales at different gas stations
➢boutiques
➢different casinos-hotels and other merchants
On-line transaction:
➢websites
➢international debit card accounts
➢acquired from the Business Processing Outsource (BPO) clientele.
Part of the scam:
➢acquire rooms by online booking
➢sell the room accommodations to players at the Casino for a lower price.
➢ You simply have to type credit card number into www page of the vendor for online transaction
➢ If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonation the credit card owner
Credit card fraud
Skimming Device
Card reader and writer.
Credit card companies for the most part have moved away from “swipe and signature” credit cards to _________ by this point; the technology known as EMV (Europay, MasterCard, and Visa) which is supposed to provide consumers with an added layer of security
chip and pin cards
The cyber criminals had miniaturized the backpack setup into a tiny ____, a cheap and programmable device used by DIY hobbyists.
➢The size of the chip was not larger than the regular security chip used in credit cards. This may increase the thickness of the chip from 0.4mm to 0.7mm, but perfectly feasible when inserted into a PoS system.
-The criminal removed the chip from the original, solder it to the FUN card chip, and fixed both chips back-to-back onto the plastic body of another stolen card.
FUN card chip
– E-COMMERCE ACT OF 2000
Section 33. Penalties. - The following Acts, shall be penalized by fine and/or imprisonment,
R.A. 8792
Hacking