SlideShare une entreprise Scribd logo
1  sur  46
How to protect your
conveyancing practice from
payment redirection fraud?
Practical tips to defend your business from cyber attacks
Who we are
Nicholas
Technology and legal expert with over 20 years of industry
experience
Gabor
Cybersecurity expert with over ten years experience, having
worked in both private and public sectors
Who we are
www.ironbastion.com.au
We defend small to midsize businesses
from cyber scams and hacking
What we are covering tonight…
1) Why cybercriminals target conveyancing
practices
2) The consequences of being scammed
3) How payment redirection fraud works
4) How to protect your practice
5) Questions
Would everyone please stand up…
Before we begin, a small exercise
Sit down if you….
❌ Have a business computer which does not have anti-
virus
❌ Have advanced phishing protection in place?
❌ Do not know what two factor authentication (2FA) is,
or have never used 2FA for your email
❌ Do you provide phishing awareness training to your
employees?
Anyone still standing?
❌ Have used 2FA but turned it off because it was too
inconvenient
1) Why cybercriminals target
conveyancers?
1) Why cybercriminals target conveyancers?
• Practitioners are low hanging
fruit for cybercriminals.
• underinvestment in security
• bad advice
• no advice
• High-value financial transactions
• Insecure communication
channels
• New e-conveyancing platforms
1) Why cybercriminals target conveyancers?
In-house research of conveyancers:*
• ISP provided email (e.g TPG) - 20%
• Webmail (e.g. Hotmail) - 10 %
• Office 365 - 70%
* Non-representative sample
1) Why cybercriminals target conveyancers?
Anti-phishing
protection:
• Yes - 0%
• No - 100%
Two-factor:
• Yes - 10%
• No - 90%
Password
reuse:
• Yes - 90%
• No - 10%
Paid antivirus:
• Yes - 90%
• No - 10%
You do not have to look far for Aussie examples
•“MasterChef finalist caught in conveyancing
hacker attack”
•Mid-May, a client lost about $700,000
•May 31 when a client lost more than $1 million
https://www.propertyobserver.com.au/forward-planning/advice-and-hot-topics/85862-pexa-warning-as-conveyancing-fraud-funds-
end-up-in-thailand.html
https://www.smh.com.au/business/companies/masterchef-finalist-caught-in-conveyancing-hacker-attack-20180622-p4zn4o.html
2) Consequences?
2) Consequences?
•Breach of confidential information
• copy of identity documents
• personal details
•Financial
•Lawsuits
•Reputation
Try Googling your brand..
once you
have suffer
a publicised
data breach
3) How payment
redirection scams work
3) How payment redirection scams work
As easy as 1-2-3
1. Steal mailbox passwords
• Phishing
• Data breaches
2. Intercept emails
3. Tamper with payment instructions
Phishing
• Social Engineering
• Exploits the weaknesses in people – ‘click whirr’ behavioural
responses
• Fake logins that capture credentials
Credentials from Data Breaches
• Websites get hacked.
• People reuse same
email and password
across multiple online
accounts.
Credentials from Data Breaches
Secret: “hackers” log into your webmail
4) How to protect
your practice
4) How to protect your practice
1.Two-factor
authentication (2FA)
2.Stop email spoofing
3.Better antivirus
4.Anti-phishing services
4) How to protect your practice
1.Two-factor
authentication (2FA)
2.Stop email spoofing
3.Better antivirus
4.Anti-phishing services
I. Two-factor authentication (2FA)
Powerful security
measure protecting
from:
•Bad passwords
•Stolen passwords
•Leaked passwords
I. Two-factor authentication (2FA)
I. Two-factor authentication (2FA)
How to turn on:
https://blog.ironbastio
n.com.au/how-to-
prevent-payment-
misdirection-fraud-at-
your-conveyancing-
practice-2fa/
4) How to protect your practice
1.Two-factor
authentication (2FA)
2.Stop email spoofing
3.Better antivirus
4.Anti-phishing services
II. Stop email spoofing
II. Stop email spoofing
How to impersonate
Saul Goodman <saul.goodman@sgassociates.com>
• Method #1 – Email Address Spoofing:
Saul’s email address and his name are spoofed on an incoming
email so that the sender appears to be:
Saul Goodman <saul.goodman@sgassociates.com>
• Method #2 – Display Name Spoofing:
Only Saul’s name is spoofed, but not the email address:
Saul Goodman <saul.goodman1337@gmail.com>
II. Stop email spoofing
Method #1 – Email Address Spoofing:
Saul’s email address and his name are spoofed on an incoming email
so that the sender appears to be:
Saul Goodman <saul.goodman@sgassociates.com>.
 SPF/DKIM/DMARC DNS records
More: https://blog.ironbastion.com.au/email-impersonation-scams-
phishing-what-your-staff-can-do/
II. Stop email spoofing
• Method #2 – Display Name Spoofing:
Only Saul’s name is spoofed, but not the email address:
Saul Goodman <saul.goodman1337@gmail.com>.
Add warning banners
Use anti-phishing services
More: https://blog.ironbastion.com.au/email-impersonation-
scams-phishing-what-your-staff-can-do/
4) How to protect your practice
1.Two-factor
authentication (2FA)
2.Stop email spoofing
3.Better antivirus
4.Anti-phishing services
III. Better antivirus
Keeps your computer safe from:
• Ransomware
• Phishing
• Keyloggers
• Miscellaneous wizardry
III. Better antivirus
Buy the business version
any of these:
•avast!
•Avira
•Bitdefender
•ESET
•Kaspersky
4) How to protect your practice
1.Two-factor
authentication (2FA)
2.Stop email spoofing
3.Better antivirus
4.Anti-phishing services
IV. Anti-phishing services (email)
Pre-screens your incoming emails
• Superior to your spam filter
• Machine learning & AI powered
• Text semantics
• Web link protection
• Deep analysis of file attachments
IV. Anti-phishing services (email)
• Typically available as separate services
for your email platform
• Works with every platform
(Office 365, G Suite, GoDaddy, etc.)
• We suggest you to research what
providers are available on the market
providing managed anti-phishing services
IV. Anti-phishing services (web browsing)
Web browsing protection protects
from phishing attempts arriving in:
• Private emails
• Instant messengers (WeChat, etc.)
• Text messages
IV. Anti-phishing services (web browsing)
Blocks access to phishing websites
on:
• Computers and smartphones
• In the office or on the road
• Protects your staff at home
IV. Anti-phishing service (II.)
III. Anti-phishing services (phishing awareness)
4% of people in any given phishing
campaign will click on a phishing email*
1.Phish your own staff
2.Identify vulnerable people
3.Target them with training materials
* https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_en_xg.pdf
5) Where to get help
5) Where to get help
• Report the scam to ACCC ScamWatch,
ACORN and ACSC
• Victims of identity theft: you should contact
IDCARE, NFP helping people
• Have a conversation with your IT Service
Provider, or staff. Use these slides as a talking
point!
6) Questions?
💌 nick@ironbastion.com.au
💌 gabor@ironbastion.com.au
🌏 www.ironbastion.com.au
Attribution
• https://blog.cryptoaustralia.org.au/2018/07/19/how-to-protect-your-legal-
practice-from-payment-redirection-fraud/
• Cruz/Kavadias/Szathmari – How to Protect Your Legal Practice from Payment
Redirection Fraud

Contenu connexe

Plus de Gabor Szathmari (6)

Privacy for journalists introduction
Privacy for journalists introductionPrivacy for journalists introduction
Privacy for journalists introduction
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for Journalists
 
Privacy for Journalists Introduction
Privacy for Journalists IntroductionPrivacy for Journalists Introduction
Privacy for Journalists Introduction
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
 
When the CDN goes bananas
When the CDN goes bananasWhen the CDN goes bananas
When the CDN goes bananas
 
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Iron Bastion - How to protect your conveyancing practice from payment redirection fraud

  • 1. How to protect your conveyancing practice from payment redirection fraud? Practical tips to defend your business from cyber attacks
  • 2. Who we are Nicholas Technology and legal expert with over 20 years of industry experience Gabor Cybersecurity expert with over ten years experience, having worked in both private and public sectors
  • 3. Who we are www.ironbastion.com.au We defend small to midsize businesses from cyber scams and hacking
  • 4. What we are covering tonight… 1) Why cybercriminals target conveyancing practices 2) The consequences of being scammed 3) How payment redirection fraud works 4) How to protect your practice 5) Questions
  • 5. Would everyone please stand up… Before we begin, a small exercise
  • 6. Sit down if you…. ❌ Have a business computer which does not have anti- virus ❌ Have advanced phishing protection in place? ❌ Do not know what two factor authentication (2FA) is, or have never used 2FA for your email ❌ Do you provide phishing awareness training to your employees? Anyone still standing? ❌ Have used 2FA but turned it off because it was too inconvenient
  • 7. 1) Why cybercriminals target conveyancers?
  • 8. 1) Why cybercriminals target conveyancers? • Practitioners are low hanging fruit for cybercriminals. • underinvestment in security • bad advice • no advice • High-value financial transactions • Insecure communication channels • New e-conveyancing platforms
  • 9. 1) Why cybercriminals target conveyancers? In-house research of conveyancers:* • ISP provided email (e.g TPG) - 20% • Webmail (e.g. Hotmail) - 10 % • Office 365 - 70% * Non-representative sample
  • 10. 1) Why cybercriminals target conveyancers? Anti-phishing protection: • Yes - 0% • No - 100% Two-factor: • Yes - 10% • No - 90% Password reuse: • Yes - 90% • No - 10% Paid antivirus: • Yes - 90% • No - 10%
  • 11. You do not have to look far for Aussie examples •“MasterChef finalist caught in conveyancing hacker attack” •Mid-May, a client lost about $700,000 •May 31 when a client lost more than $1 million https://www.propertyobserver.com.au/forward-planning/advice-and-hot-topics/85862-pexa-warning-as-conveyancing-fraud-funds- end-up-in-thailand.html https://www.smh.com.au/business/companies/masterchef-finalist-caught-in-conveyancing-hacker-attack-20180622-p4zn4o.html
  • 13. 2) Consequences? •Breach of confidential information • copy of identity documents • personal details •Financial •Lawsuits •Reputation
  • 14. Try Googling your brand.. once you have suffer a publicised data breach
  • 16. 3) How payment redirection scams work As easy as 1-2-3 1. Steal mailbox passwords • Phishing • Data breaches 2. Intercept emails 3. Tamper with payment instructions
  • 17. Phishing • Social Engineering • Exploits the weaknesses in people – ‘click whirr’ behavioural responses • Fake logins that capture credentials
  • 18. Credentials from Data Breaches • Websites get hacked. • People reuse same email and password across multiple online accounts.
  • 20. Secret: “hackers” log into your webmail
  • 21. 4) How to protect your practice
  • 22. 4) How to protect your practice 1.Two-factor authentication (2FA) 2.Stop email spoofing 3.Better antivirus 4.Anti-phishing services
  • 23. 4) How to protect your practice 1.Two-factor authentication (2FA) 2.Stop email spoofing 3.Better antivirus 4.Anti-phishing services
  • 24. I. Two-factor authentication (2FA) Powerful security measure protecting from: •Bad passwords •Stolen passwords •Leaked passwords
  • 26. I. Two-factor authentication (2FA) How to turn on: https://blog.ironbastio n.com.au/how-to- prevent-payment- misdirection-fraud-at- your-conveyancing- practice-2fa/
  • 27. 4) How to protect your practice 1.Two-factor authentication (2FA) 2.Stop email spoofing 3.Better antivirus 4.Anti-phishing services
  • 28. II. Stop email spoofing
  • 29. II. Stop email spoofing How to impersonate Saul Goodman <saul.goodman@sgassociates.com> • Method #1 – Email Address Spoofing: Saul’s email address and his name are spoofed on an incoming email so that the sender appears to be: Saul Goodman <saul.goodman@sgassociates.com> • Method #2 – Display Name Spoofing: Only Saul’s name is spoofed, but not the email address: Saul Goodman <saul.goodman1337@gmail.com>
  • 30. II. Stop email spoofing Method #1 – Email Address Spoofing: Saul’s email address and his name are spoofed on an incoming email so that the sender appears to be: Saul Goodman <saul.goodman@sgassociates.com>.  SPF/DKIM/DMARC DNS records More: https://blog.ironbastion.com.au/email-impersonation-scams- phishing-what-your-staff-can-do/
  • 31. II. Stop email spoofing • Method #2 – Display Name Spoofing: Only Saul’s name is spoofed, but not the email address: Saul Goodman <saul.goodman1337@gmail.com>. Add warning banners Use anti-phishing services More: https://blog.ironbastion.com.au/email-impersonation- scams-phishing-what-your-staff-can-do/
  • 32. 4) How to protect your practice 1.Two-factor authentication (2FA) 2.Stop email spoofing 3.Better antivirus 4.Anti-phishing services
  • 33. III. Better antivirus Keeps your computer safe from: • Ransomware • Phishing • Keyloggers • Miscellaneous wizardry
  • 34. III. Better antivirus Buy the business version any of these: •avast! •Avira •Bitdefender •ESET •Kaspersky
  • 35. 4) How to protect your practice 1.Two-factor authentication (2FA) 2.Stop email spoofing 3.Better antivirus 4.Anti-phishing services
  • 36. IV. Anti-phishing services (email) Pre-screens your incoming emails • Superior to your spam filter • Machine learning & AI powered • Text semantics • Web link protection • Deep analysis of file attachments
  • 37. IV. Anti-phishing services (email) • Typically available as separate services for your email platform • Works with every platform (Office 365, G Suite, GoDaddy, etc.) • We suggest you to research what providers are available on the market providing managed anti-phishing services
  • 38. IV. Anti-phishing services (web browsing) Web browsing protection protects from phishing attempts arriving in: • Private emails • Instant messengers (WeChat, etc.) • Text messages
  • 39.
  • 40. IV. Anti-phishing services (web browsing) Blocks access to phishing websites on: • Computers and smartphones • In the office or on the road • Protects your staff at home
  • 42. III. Anti-phishing services (phishing awareness) 4% of people in any given phishing campaign will click on a phishing email* 1.Phish your own staff 2.Identify vulnerable people 3.Target them with training materials * https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_en_xg.pdf
  • 43. 5) Where to get help
  • 44. 5) Where to get help • Report the scam to ACCC ScamWatch, ACORN and ACSC • Victims of identity theft: you should contact IDCARE, NFP helping people • Have a conversation with your IT Service Provider, or staff. Use these slides as a talking point!
  • 45. 6) Questions? 💌 nick@ironbastion.com.au 💌 gabor@ironbastion.com.au 🌏 www.ironbastion.com.au