Fraudsters find holes in debit card fraud detection
IDG News Service - Over the last few weeks, criminals have been exploiting weak fraud detection systems used for debit cards with "flash" attacks, where hundreds of withdrawals are made over a very short period of time.
Banking executives have noticed a rise in such attacks, where fraudsters withdraw money throughout a wide region within a span of just minutes, said Avivah Litan, a vice president at Gartner who frequently consults with banks about fraud issues.
"The fraud happens within 10 minutes in these geographic diverse locations," she said.
The amounts withdrawn are usually within a range that would not immediately raise a red flag, Litan said. She said a Canadian banker she recently spoke with said they noticed withdrawals from 100 ATMs all over Canada within 10 minutes.
The pattern is particularly interesting since it means that the criminal gangs are clearly coordinating the timing of the withdrawals using money mules, or people who are hired to do the risky job of taking a fraudulent payment cards to ATMs that are often under video surveillance.
The fraudsters seem to be primarily targeting debit cards, which have less sophisticated fraud detection systems in place than credit cards, Litan said.
Credit card systems are more likely to catch anomalies such as when a person uses a card in New York, and then just hours later a transaction with the same card shows up in California. Still, since the fraudsters in these cases are withdrawing small amounts from places close to where the victim is located, it makes it tricky to detect.
"There's no way to catch this fraud with the fraud detection systems unless they start looking at location or behavior," said Litan, who also wrote a blog post on the issue.
The fraudsters are believed to be obtaining card details and PIN (personal identification numbers) by compromising point-of-sale (POS) devices, Litan said. They do this by either surreptitiously sneaking into stores and replacing the POS terminals with special ones that record PINs and magnetic stripes details -- which contain account information -- or installing "skimming" devices to record the information, she said.
The skimming devices can be later retrieved, and some modified terminals are equipped with wireless transmitters to send the details to a remote server, Litan said.
The discount grocer Aldi acknowledged earlier this month that payment terminals at stores in 11 U.S. states were tampered with between June and August. More than 1,000 people who shopped at Aldi in the Chicago and Indianapolis areas reported fraudulent use of their cards.
The stolen account information can then be encoded onto blank payment cards. Those cards are then distributed to money mules -- often with the PIN taped to the card -- to hit the ATMs.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts