Fraudsters find holes in debit card fraud detection
IDG News Service - Over the last few weeks, criminals have been exploiting weak fraud detection systems used for debit cards with "flash" attacks, where hundreds of withdrawals are made over a very short period of time.
Banking executives have noticed a rise in such attacks, where fraudsters withdraw money throughout a wide region within a span of just minutes, said Avivah Litan, a vice president at Gartner who frequently consults with banks about fraud issues.
"The fraud happens within 10 minutes in these geographic diverse locations," she said.
The amounts withdrawn are usually within a range that would not immediately raise a red flag, Litan said. She said a Canadian banker she recently spoke with said they noticed withdrawals from 100 ATMs all over Canada within 10 minutes.
The pattern is particularly interesting since it means that the criminal gangs are clearly coordinating the timing of the withdrawals using money mules, or people who are hired to do the risky job of taking a fraudulent payment cards to ATMs that are often under video surveillance.
The fraudsters seem to be primarily targeting debit cards, which have less sophisticated fraud detection systems in place than credit cards, Litan said.
Credit card systems are more likely to catch anomalies such as when a person uses a card in New York, and then just hours later a transaction with the same card shows up in California. Still, since the fraudsters in these cases are withdrawing small amounts from places close to where the victim is located, it makes it tricky to detect.
"There's no way to catch this fraud with the fraud detection systems unless they start looking at location or behavior," said Litan, who also wrote a blog post on the issue.
The fraudsters are believed to be obtaining card details and PIN (personal identification numbers) by compromising point-of-sale (POS) devices, Litan said. They do this by either surreptitiously sneaking into stores and replacing the POS terminals with special ones that record PINs and magnetic stripes details -- which contain account information -- or installing "skimming" devices to record the information, she said.
The skimming devices can be later retrieved, and some modified terminals are equipped with wireless transmitters to send the details to a remote server, Litan said.
The discount grocer Aldi acknowledged earlier this month that payment terminals at stores in 11 U.S. states were tampered with between June and August. More than 1,000 people who shopped at Aldi in the Chicago and Indianapolis areas reported fraudulent use of their cards.
The stolen account information can then be encoded onto blank payment cards. Those cards are then distributed to money mules -- often with the PIN taped to the card -- to hit the ATMs.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts