Fraudsters find holes in debit card fraud detection
IDG News Service - Over the last few weeks, criminals have been exploiting weak fraud detection systems used for debit cards with "flash" attacks, where hundreds of withdrawals are made over a very short period of time.
Banking executives have noticed a rise in such attacks, where fraudsters withdraw money throughout a wide region within a span of just minutes, said Avivah Litan, a vice president at Gartner who frequently consults with banks about fraud issues.
"The fraud happens within 10 minutes in these geographic diverse locations," she said.
The amounts withdrawn are usually within a range that would not immediately raise a red flag, Litan said. She said a Canadian banker she recently spoke with said they noticed withdrawals from 100 ATMs all over Canada within 10 minutes.
The pattern is particularly interesting since it means that the criminal gangs are clearly coordinating the timing of the withdrawals using money mules, or people who are hired to do the risky job of taking a fraudulent payment cards to ATMs that are often under video surveillance.
The fraudsters seem to be primarily targeting debit cards, which have less sophisticated fraud detection systems in place than credit cards, Litan said.
Credit card systems are more likely to catch anomalies such as when a person uses a card in New York, and then just hours later a transaction with the same card shows up in California. Still, since the fraudsters in these cases are withdrawing small amounts from places close to where the victim is located, it makes it tricky to detect.
"There's no way to catch this fraud with the fraud detection systems unless they start looking at location or behavior," said Litan, who also wrote a blog post on the issue.
The fraudsters are believed to be obtaining card details and PIN (personal identification numbers) by compromising point-of-sale (POS) devices, Litan said. They do this by either surreptitiously sneaking into stores and replacing the POS terminals with special ones that record PINs and magnetic stripes details -- which contain account information -- or installing "skimming" devices to record the information, she said.
The skimming devices can be later retrieved, and some modified terminals are equipped with wireless transmitters to send the details to a remote server, Litan said.
The discount grocer Aldi acknowledged earlier this month that payment terminals at stores in 11 U.S. states were tampered with between June and August. More than 1,000 people who shopped at Aldi in the Chicago and Indianapolis areas reported fraudulent use of their cards.
The stolen account information can then be encoded onto blank payment cards. Those cards are then distributed to money mules -- often with the PIN taped to the card -- to hit the ATMs.
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!