1. Prevention of Fraud, Forgeries in
Internet Banking and T24 System
Presented by
Md. Shazzad Hossain, CISA, CISM, CRISC
Senior Manager
IT Audit Department
Prime Bank Limited
Head Office
Dhaka, Bangladesh
2. Some points to be ponder
Banking and Bank
Fraud and Forgery
Internet
Internet Banking
How an Internet Banking Fraud happened
Prevention of Fraud in IB
3. Banking and Bank
• It is the business conducted or services offered by a bank.
• Simply the bank collects money from the depositors and invest the
depositors money with the intent to receive more.
• As such it can be said that banks run its business with public’s
money and act as a custodian of that money.
4. Fraud and Forgery
• Though the word Fraud and Forgery is used inter changeably; they are not
actually same.
Fraud: Fraud is a relatively broad term applied to any illegal act in
which the offender uses deceitful or deceptive means to carry out the
crime. In almost all instances of fraud, the offender is trying to obtain
something from the victim, whether the victim be an individual
person, group of people, or company. Furthermore, most fraud crimes
are committed to obtain money or access to money.
Forgery: Forgery is actually a type of fraud in which the offender uses
false, fabricated or fictitious documents in order to defraud a victim,
usually in an effort to secure money. A person can also be charged
with forgery if they alter or change an existing document for the
purpose of deceiving or defrauding the victim. Even something as
simple as signing another person's name on a check can be
considered forgery.
Fraud is a hidden crime. In every fraud situation, the fraudster tries to
conceal his/her crime. The method for concealing fraud are so numerous and
sometimes ingenious that almost anyone might be defrauded.
5. Internet
• The Internet is a global system of interconnected computer
networks that use the standard Internet protocol suite (TCP/IP) to
link several billion devices worldwide.
• It is a global network connecting millions of computers. More than
190 countries are linked into exchanges of data, news and
opinions. According to Internet Live Stats, as of December 30, 2014
there was an estimated 3,037,608,300 Internet users worldwide.
The number of Internet users represents nearly 40 percent of the
world's population. The largest number of Internet users by
country is China, followed by the United States and India.
• In September 2014, the total number of websites with a unique
hostname online exceeded 1 billion. This is an increase from one
website (info.cern.ch) in 1991.
6. Is Web and Internet the Same?
• The Internet is not synonymous with World Wide Web. The Internet
is a massive network of networks, a networking infrastructure. It
connects millions of computers together globally, forming a
network in which any computer can communicate with any other
computer as long as they are both connected to the Internet. The
World Wide Web, or simply Web, is a way of accessing information
over the medium of the Internet. It is an information-sharing model
that is built on top of the Internet.
7. Internet Banking
• Bank offer its product or service through many ways. Internet
Banking is one of them and most probably the recent addition in
our society.
• To avail this service one have to have a formal banking relationship
with bank and an internet connected PC or device.
• In our bank the internet banking is offered to our customer named
“ALTITUDE”.
• It is a secure, most robust and popular Internet Banking solution
in Bangladesh.
• As such it is not beyond the target of cyber criminals and prone to
fraud and forgery.
9. How an Internet Banking Fraud happened
• In most cases Internet Banking fraud initiated by taking the opportunity of one’s lack of
security knowledge.
• The process followed by fraudsters to steal money from internet banking users is nearly
always the same. They are:
i. Get the person’s Internet banking details, typically through a “Phishing
Attack”
ii. Get a banking account/s to which money can be transferred to and
withdrawn
iii. Clone the SIM card used by the person
iv. Hack the persons e-mail account
v. Create beneficiaries (using the list of banking accounts) and transfer
money to these beneficiaries and
vi. Withdraw the money from these accounts.
• In each of these steps the criminals can exploit different weaknesses in the system to
achieve their goal.
10. Phishing
• Phishing is a form of theft where the intent is
to steal your valuable personal data, such as
National Identification numbers, credit card
numbers, passwords, account data, or other
personal and critical information.
• Regardless of which story the phishers use, if
you fall prey to a phishing email, the end
result may be unauthorized fund transfer
which ultimately lead to an empty bank
account or other financial account. Identity
theft is also a very common result of
phishing scams.
• If this Phishing attack is more targeted and
specific to any person, organization etc. then
it is called Spare Phishing attack.
11. How does Phishing work?
• A phisher will send you an email, an instant message or sometimes call you on the phone.
The message may appear to come from a friend, a business (your bank), a government agency
(the BB), or some other entity. Common phishing scams typically claim to be credit card
companies, banks, and major online retailers such as Ajker Deal, Bikroy.com or bdjobs, as
well as social networking sites like Facebook. Some phishing attempts are easy to identify
because they claim to come from businesses or companies that you have never dealt with;
others may be more difficult to identify, since they appear to originate from entities with
which you do business.
• A phishing message may indicate that the entity had problems with their computers or data
and that they simply need to verify your account information so you won't be inconvenienced
next time you try to use their services. The email message might suggest that a suspicious
purchase was made using your credit card, and that if you did not make this purchase, you
need to contact them by using the link included in the email.
• Another example is a message claiming that you have just won the lottery, that you should go
to the secure web link provided, enter your bank account information and they will deposit
your winnings into your account.
• Other variation might be an email claiming to be from retail shop claiming that due to an
accounting error, you are owed a refund. They ask that you go to a website and enter your
banking information so that they can process the refund.
12. Example of a Phishing email
From: Altitude Team [rj@calpoly.edu]
Sent: Friday, June 29, 2012 2:42 PM
Subject: Internet Banking Account Deletion Confirmation
Altitude! SERVICE ANNOUNCEMENT
Dear Account Holder,
1. You have requested your Internet Banking Account on June 29, 2012 at 11:02 PM BST to be
deactivated and deleted from a location in with this IP number; 201.130.47.33.
2. Click on (http://localhost/pib.primebank.com.bd/login.html) to cancel this request after log
into your account; else your internet banking account will be deactivated and deleted within 24 hours
3. Do not share your password with anyone for your security purpose.
Thank You for Being A Loyal Altitude User
Altitude Team
14. Other Means
• Other ways in which the login details can be attained include
computers in public areas (such as Internet cafés, airport or
hotel lobby) which record sensitive information through
keystroke logging software installed in that computer or
shoulder surfing.
• Trojans or malware also provides criminals access to a
victim’s computer or smart phone which installed in those
device through exploiting the vulnerability of out dated
antivirus, insecure connection to public/free Wi-Fi hotspot,
infected USB devices.
• However, phishing remains the most popular way in which
personal banking details are stolen.
16. Prevention of Internet Banking Fraud
• Awareness is the main and first shield
to prevent IB fraud. Knowledge and
awareness is like light. As beside
mentioned shadow can be removed by
spotting light on it; fraud can mostly be
eliminated in IB by building awareness
like that.
17. Prevention of Internet Banking Fraud (contd..)
To avoid to be a victim of Internet Banking fraud, following tips
should be kept in mind:
• Remember, legitimate businesses should NEVER ask you for your
personal or financial information via email.
• If it appears to be a phishing email, simply delete it.
• Do not click on any links listed within the email message, and do
not open any attachments contained within the email. Many
phishing messages and sites not only attempt to get your personal
information, they may also attempt to install malicious code on
your computer.
• Do not enter personal information in a pop-up screen. Legitimate
companies, agencies, and organizations don't ask for personal
information via pop-up screens.
18. Prevention of Internet Banking Fraud (contd..)
• If you get an email or phone call from a person posing as a bank
official or service desk officer, take the name and phone number of
the person calling. Tell them that you cannot talk now. Look up the
contact information of the business and contact them
independently to verify the legitimacy of the phone call.
• Review your credit card and bank statements, along with bills from
any other companies with which you do business, looking for
unauthorized charges or withdrawals.
• Choose strong passwords for your accounts, do not use the same
password for every account and most importantly never save it in
your browser.
• Remember when you put your credentials on the Internet, always
make sure that the site you use to enter such information is
secure.
19. Prevention of Internet Banking Fraud (contd..)
• Always keep antivirus of your PC or device(if any) updated and run
virus scan regularly
• Make sure that latest patch of OS has been deployed
• Change your password periodically as per Information Security
Policy
• Avoid using insecure public Wi-Fi hotspot or other peoples
PC/Laptop to log into the Internet Banking solution
• Watch out for shoulder surfers (people who watch over your
shoulder when you type in your passwords).
• Always lock or log off of your computer before walking away from it!