Tips for Understanding Fraud Risks

Explore top LinkedIn content from expert professionals.

Summary

Understanding fraud risks involves recognizing potential vulnerabilities and taking proactive measures to protect against financial losses and scams. As fraud tactics evolve with technology, staying vigilant and implementing robust safeguards is essential for businesses and individuals alike.

  • Verify all transactions: Independently research and confirm unusual payment requests by directly contacting the requestor or payee using verified contact information.
  • Conduct detailed reviews: Analyze transaction patterns, API endpoints, and system blind spots to identify weaknesses and create specific protection strategies.
  • Educate and monitor: Train your team on fraud detection methods, educate customers on safe practices, and use technology to monitor unusual behavioral patterns and unauthorized access.
Summarized by AI based on LinkedIn member posts
  • View profile for Brian Levine

    Cybersecurity & Data Privacy Leader • Founder & Executive Director of Former Gov • Speaker • Former DOJ Cybercrime Prosecutor • NYAG Regulator • Civil Litigator • Posts reflect my own views.

    14,737 followers

    It is becoming difficult to identify and prevent wire transfer fraud (WTF). Recently, a threat actor was able to steal $25M by using Deep Fake AI to impersonate a CEO and other management on a video call.  See https://lnkd.in/ermje-5j. In an even more challenging example, a small bank's ACTUAL long-time CEO was dupped, and caused his employees to make ten wire transfers equaling more than $47M. See https://lnkd.in/eh-Xqagv. If we can't trust a real looking/sounding fake CEO and we can't trust an ACTUAL CEO, how can we ever prevent WTF? Here are some tips:   1. INDEPENDENT RESEARCH: At least one employee involved in an "unusual" wire transfer (i.e., unusual considering size, payee, payment method, situation, need for speed, new wire information, etc.) should independently research the transaction to confirm its validity. This employee should fill out pre-prepared worksheets to document that all of the steps below were taken. Such investigation might include: •  Speaking directly with the person requesting the wire or the change in the wire to understand: (a) the purpose of the wire; (b) the origin of the request; and (c) how the request was made (e.g., by email). Always call that person directly using his or her known contact information. Also, consider speaking directly with the originator of the request, if that is someone different than the requestor.    •  Independently looking up the payee (perhaps on a personal device, in case the network is infected) to understand what the payee does, whether the payment makes sense, and whether there are any reputational issues with the payee (e.g., check the BBB website, State AGs, or other sites.)     • Independently finding the true phone number of the payee, and calling the payee to verify the wire transfer information is accurate.    • Speaking directly with someone more senior than the requestor to confirm the transaction is legitimate. If the requestor is the CEO, and the transaction is significant enough, speak with someone on the board or outside counsel.  In advance, create a contact list with the relevant approvers.        2. DUAL CONTROL: At least two employees should approve every significant transfer. Ideally, there are technical controls (e.g., two separate MFA approvals) to ensure both employees have approved.   3. WRITTEN PROCEDURE:  Your procedure should be documented and updated annually. Written validation logs should also be retained.   4. TRAINING: Everyone involved should be trained on the procedure upon onboarding and at least annually.   5. TABLETOP EXERCISES: This is another big one. Consider conducting "WTF tabletop exercises" at least annually. Test your procedure with challenging situations, such as a deep fake CEO or a real CEO who has been dupped.    6. ESCROW OPTIONS: For significant transactions, consider whether there are options to transfer the funds into an escrow or other safe account until you can fully validate the payee or the transaction.    

  • View profile for Brian D.

    safeguard | tracking AI’s impact on payments, identity, & risk | author & advisor | may 3-6, CO

    17,642 followers

    Today I'll spend 90 minutes mapping a single fraud attack vector. You should too. As fraud leaders, we've lost the art of the deep dive into our own risk surface. We all want automated detection, ML models, real-time alerts. But to catch sophisticated fraud rings, you need to do more. A lot more. Often manual. Things I'm doing today while mapping a gift card fraud exposure: • Trace every path money can exit through gift cards • Document each API endpoint that touches value • Pull 90 days of transaction patterns • Map which teams own which signals • Identify every decision point in the flow • Cross-reference with our current rule coverage • Find the operational constraints fraudsters face • Calculate unit economics of the attack • Review support tickets for missed patterns • Check which vendors can see these signals • Test our detection at each step manually • Document blind spots between systems • Build out full attack scenario doc And at that point, you know enough to defend it properly. From there, you can build hyper-specific rules, choose the right tools, and brief your team on exactly what to watch for. My guess is you'll cut fraud losses by 40% this year if you take this truly deep approach to understanding your risk surface. And I guarantee your team will appreciate knowing exactly what they're defending against vs being told to "just watch for suspicious activity." ps... Most fraud happens where nobody's looking. This process forces you to look everywhere.

  • View profile for Tamas Kadar

    Co-Founder and CEO at SEON | Democratizing Fraud Prevention for Businesses Globally

    11,275 followers

    Being in the fraud prevention industry gives me an insider’s view of how fraud attacks work - including seeing new patterns emerge. Here are recent insights on how fraudsters are increasingly targeting people to take control of their bank accounts and initiate unauthorized wire transfers. 📞 The Phone Call Scam: Scammers exploit the vulnerability in PSTN to spoof caller IDs, making it seem like the call is coming from a trusted bank. A number of well-known VoIP providers make this possible. 🔓 Remote Access: Once they establish contact, scammers mention there is some suspicious activity or other important reason behind their call. They then persuade victims to install remote desktop applications like AnyDesk, or to turn on WhatsApp or Skype's screen sharing. This allows them to access banking apps and initiate transfers. This helps them to intercept login data and one-time passcodes. Banks also don't insure against such scams, leaving victims exposed. 🤖 AI in Voice Scams: Imagine combining voice recognition with GPT-based text-to-speech technology. Scammers scale their operations massively, this is a future risk we must prepare for now. So what proactive measures can banks and digital wallets take? 1. Customer Education: Many banks already do this; keeping their customers informed about official communication channels and the importance of calling back through their verified numbers. 2. One-Time Passcodes for Payments: OTPs aren’t just for logins but also useful for transactions, with detailed payment information included. 3. Being On a Call During Transactions: The top FinTechs are already looking into, or developing technology to detect if a customer is on a call (phone, WhatsApp, Skype) during banking activities. 4. Detect Remote Access: Implement detection mechanisms for any remote access protocol usage during banking sessions. 5. Behavior and Velocity-Based Rules: Sophisticated monitoring should be used to flag activities in real-time based on unusual behaviour and transaction speed. 6. Device, Browser, and Proxy Monitoring: This is a quick win, as there are many technologies available to flag unusual devices, browsers, and proxy usage that deviates from the customer's norm. 7. Multiple Users on Same Device/IP: Ability to identify and flag multiple customers who are using the same device or IP address in one way to detect bots. 8. Monitoring Bank Drops and Crypto Exchanges: Pay special attention to transactions involving neobanks, crypto exchanges, or other out-of-norm receiving parties, to identify potential fraud. Some of them might not ask for ID and even if they do, it can be easily faked with photoshopped templates. Hope you find that useful, and in the meantime, I’d love to hear what other emerging threats you’ve seen or heard of. Fostering these open conversations is what enables us all to unite together against combating fraud 👊 #FraudPrevention #CyberSecurity #DigitalBanking #ScamAwareness #AIinFraudDetection

Explore categories