MitP blends new and old fraud techniques to trick banking customers into authorizing transactions via the phone channel. MitP builds on the successes realized from Man-in-the-Browser (MitB) attacks in which criminals use Trojans to infect a usersâ Internet Browser to âmodify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host application.â [i] MitP also leverages âsocial engineeringâ, which in this case is the act of using trickery or deception during a phone conversation to convince an individual to divulge information.
In a typical MitP attack, a fraudster impersonates a bank representative and calls the banking customer to inform him/her that his/her savings, checking or card account may have been breached or compromised. The fraudster advises the customer that in order to remedy the situation he/she should remain on the line and verify a few account details. At the same time, the fraudster initiates a call to the customerâs bank and connects the customer with a real bank representative while the fraudster remains muted on the line. The bank requests authentication information, such as social security number, passwords and other personal information, which is then provided by the customer. Once the personal information is provided, the fraudster quickly ends the conference line and informs the customer that the issue has been resolved. Meanwhile, with the personal information gathered during the call, the fraudster can take over the customerâs phone banking relationship and transfer money out of the customerâs accounts.
For consumers - Actimize recommends that banking customers never share account or personal information with anyone that calls and requests to âverifyâ banking credentials. Customers should always tell such callers that they will call the bank to provide such information using the bankâs phone number listed on the back of an ATM, debit or credit card. While this sounds obvious, many consumers do not take this simple precaution.
For Banks â Actimize recommends banks combine cross channel behaviour profiling and anomaly detection technologies with better call center processes and training. Call center employees should be trained to listen more closely and ask who originated the call. Attacks may be thwarted or losses minimized if bank employees ask simple (but random instead of static) security questions at various points in the phone conversation when confirming personal credentials. Fraudsters are less likely to trick customers into sharing answers to several security questions.
âAs consumers shift more financial transactions to secure online arenas, fraudsters have become more creative in utilizing traditional telephones,â said James Van Dyke, president and founder of Javelin Strategy & Research. âAccess through mail and telephone transactions grew from 3 percent of ID theft in 2006 to 40 percent in 2007 [ii] and fraudsters are getting creative and leveraging new techniques to commit fraud, so consumers need to be as diligent as ever in protecting their personal information.â
âWe help many of the largest retail banks, investment banks and brokerage firms protect themselves and their clients from all types of cross-channel fraud attacks,â says Paul Henninger, director of fraud solutions at Actimize. âWith our unique perspective into the operations of financial institutions around the world, we can spot trends as they occur. Weâve noticed an accelerating trend in Man-in-the-Phone attacks. We hope that by publicizing this new trend, we can help reduce its impact on individuals and our banking clients.â
Actimize is uniquely positioned to detect contact center fraud attacks. The company provides real-time cross-channel fraud prevention for many of the worldâs banks across phone, IVR, Web, mobile, ATM, Debit and other channels. Its parent company, NICE Systems is the industry-leading provider of recording, monitoring and analytics solutions for managing interactions, security and compliance at enterprises, contact centres, trading floors, branches and back offices.