SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Frequently Asked Questions (FAQ)


1) What is Corporate Account Take Over Fraud (CAT)?
   a) CAT results in fraudulent transfers of funds from the accounts of business banking customers. In
      general, the victim is tricked into installing malicious “Banking Trojan” software on their computer by
      clicking on a link to a virus infected Web page in a spoofed email. Through this malicious software, the
      perpetrator steals the victim’s logon credentials and gains access to the customer’s account through
      the business web banking site.
2) Where does the money go?
   a) Stolen funds are generally sent via ACH or wire transfer to foreign accounts or to “money mules” in the
      United States who then transfer the money overseas via popular money transfer services.
3) Who is perpetrating CAT fraud?
   a) According to Federal law enforcement agencies, Eastern European organized crime groups are believed
      to be predominantly responsible.
4) What types of companies are targeted?
   a) Cyber criminals once attacked mostly large corporations, but have now begun to target municipalities,
      smaller businesses and non-profit organizations such as schools and hospitals.
5) How are businesses tricked into installing the malicious “Banking Trojan” software?
   a) Perpetrators use various techniques, but generally send targeted emails which appear to be sent by
      official entities such as the FDIC, the Federal Reserve Bank, the American Bankers Association (ABA) or
      NACHA which falsely suggest that there is a problem with a transaction, wire transfer, ACH batch or
      bank account. These spoofed messages contain links to web sites which host malicious software often
      called “Banking Trojans” which are automatically installed on victim’s computers when they visit the
      web site.
6) Does anti-virus software protect against this type of threat?
   a) Banking Trojan software is often customized by the fraudster for each attack and is rarely detected or
      removed by current anti-virus software.
7) Who would be responsible for losses resulting from CAT fraud?
   a) While Federal Reserve Board Regulation E (12 CFR 205) affords certain protections to consumer bank
      accounts against fraudulent losses, business accounts, including small business “DBA” accounts, are
      not afforded these same protections. Liability for a fraudulent loss in a business account would be
      dependent upon the specific circumstances of the incident and the terms and conditions of the account
      agreement and related contracts between the customer and the bank.
   b) NACHA rules govern ACH transactions and related dispute resolutions, while Federal Reserve Board
      rules and procedures may affect wire transfer activity. In addition, UCC provisions for the applicable
      states may also apply.
8) What should a business do if they believe they may be a victim of CAT fraud?
   a) Cease all online activity, disconnect the computer from the network (leaving it turned on), and contact
      the bank immediately.
9) What is the source of this information and where can I learn more about CAT fraud?
   a) This information was taken from an FBI publication titled “Fraud Advisory for Business: Corporate
      Account Take Over,” which also contains more information about this type of fraud.
Glossary of Terms


Banking Trojan – Malicious software that may allow a hacker remote access to a targeted computer system.
Once a Banking Trojan has been installed, the hacker may gain remote access to the computer and may be
able to perform various operations such as stealing web banking credentials or initiating unauthorized funds
transfers.

Credentials – Information needed to log into a secure computer system which may include a user name,
password or token code.

Keystroke logger – Malicious software used to monitor a user's activities by recording every keystroke the
user makes with the intent to steal passwords and confidential information. (source: zdnet.com)

Malware – (Short for MALicious softWARE) Software designed to compromise computers or computer
information. Examples include viruses, worms, spyware and Trojan horse applications such as “banking
Trojans.”

Money mule - A person who transfers stolen money as a part of a fraudulent scam, either in person, through
a courier service or electronically. Money mules may or may not be aware that the money they are transferring
is stolen. The stolen funds are generally transferred from the victim's country to the scam operator's country.
(source: Wikipedia.org)

Phishing – The fraudulent process of attempting to acquire sensitive information such as usernames,
passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
(Phishing is a form of social engineering using spoofed email.)

Spear phishing – A method of Phishing whereby individuals or businesses are specifically targeted.

Social engineering - Manipulating people into performing actions or divulging confidential information by
trickery, rather than by physically breaking in or by using technical techniques.

Spoofed email - E-mail sent so that the sender’s address and other parts of the message are altered to
appear as though the e-mail originated from a different source. The message may incorporate graphics taken
from a legitimate entity’s web site to give the appearance of authenticity.

Mais conteúdo relacionado

Mais procurados

The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and PhishingMason Bird
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishingMH BS
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemNarendra Singh
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 

Mais procurados (19)

Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Phishing
PhishingPhishing
Phishing
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing
PhishingPhishing
Phishing
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Phishing
PhishingPhishing
Phishing
 

Semelhante a Jon handout 2

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 

Semelhante a Jon handout 2 (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 

Mais de Cheryl White

Mais de Cheryl White (16)

Scott giffen ppoint
Scott giffen ppointScott giffen ppoint
Scott giffen ppoint
 
Ryder ppoint
Ryder ppointRyder ppoint
Ryder ppoint
 
Otc ppoint
Otc ppointOtc ppoint
Otc ppoint
 
La rose presentation
La rose presentationLa rose presentation
La rose presentation
 
Jack & ted ppoint
Jack & ted ppointJack & ted ppoint
Jack & ted ppoint
 
Dyer ppoint
Dyer ppointDyer ppoint
Dyer ppoint
 
2013 sustainability conference powerpoint
2013 sustainability conference powerpoint2013 sustainability conference powerpoint
2013 sustainability conference powerpoint
 
Jon handout 4
Jon handout 4Jon handout 4
Jon handout 4
 
Jon handout 3
Jon handout 3Jon handout 3
Jon handout 3
 
Jon handout 1
Jon handout 1Jon handout 1
Jon handout 1
 
Regina ppoint
Regina ppointRegina ppoint
Regina ppoint
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
Conference powerpoint
Conference powerpointConference powerpoint
Conference powerpoint
 
Joel ppoint
Joel ppointJoel ppoint
Joel ppoint
 
Bios and descriptions
Bios and descriptionsBios and descriptions
Bios and descriptions
 
Bev ppoint
Bev ppointBev ppoint
Bev ppoint
 

Jon handout 2

  • 1. Frequently Asked Questions (FAQ) 1) What is Corporate Account Take Over Fraud (CAT)? a) CAT results in fraudulent transfers of funds from the accounts of business banking customers. In general, the victim is tricked into installing malicious “Banking Trojan” software on their computer by clicking on a link to a virus infected Web page in a spoofed email. Through this malicious software, the perpetrator steals the victim’s logon credentials and gains access to the customer’s account through the business web banking site. 2) Where does the money go? a) Stolen funds are generally sent via ACH or wire transfer to foreign accounts or to “money mules” in the United States who then transfer the money overseas via popular money transfer services. 3) Who is perpetrating CAT fraud? a) According to Federal law enforcement agencies, Eastern European organized crime groups are believed to be predominantly responsible. 4) What types of companies are targeted? a) Cyber criminals once attacked mostly large corporations, but have now begun to target municipalities, smaller businesses and non-profit organizations such as schools and hospitals. 5) How are businesses tricked into installing the malicious “Banking Trojan” software? a) Perpetrators use various techniques, but generally send targeted emails which appear to be sent by official entities such as the FDIC, the Federal Reserve Bank, the American Bankers Association (ABA) or NACHA which falsely suggest that there is a problem with a transaction, wire transfer, ACH batch or bank account. These spoofed messages contain links to web sites which host malicious software often called “Banking Trojans” which are automatically installed on victim’s computers when they visit the web site. 6) Does anti-virus software protect against this type of threat? a) Banking Trojan software is often customized by the fraudster for each attack and is rarely detected or removed by current anti-virus software. 7) Who would be responsible for losses resulting from CAT fraud? a) While Federal Reserve Board Regulation E (12 CFR 205) affords certain protections to consumer bank accounts against fraudulent losses, business accounts, including small business “DBA” accounts, are not afforded these same protections. Liability for a fraudulent loss in a business account would be dependent upon the specific circumstances of the incident and the terms and conditions of the account agreement and related contracts between the customer and the bank. b) NACHA rules govern ACH transactions and related dispute resolutions, while Federal Reserve Board rules and procedures may affect wire transfer activity. In addition, UCC provisions for the applicable states may also apply. 8) What should a business do if they believe they may be a victim of CAT fraud? a) Cease all online activity, disconnect the computer from the network (leaving it turned on), and contact the bank immediately. 9) What is the source of this information and where can I learn more about CAT fraud? a) This information was taken from an FBI publication titled “Fraud Advisory for Business: Corporate Account Take Over,” which also contains more information about this type of fraud.
  • 2. Glossary of Terms Banking Trojan – Malicious software that may allow a hacker remote access to a targeted computer system. Once a Banking Trojan has been installed, the hacker may gain remote access to the computer and may be able to perform various operations such as stealing web banking credentials or initiating unauthorized funds transfers. Credentials – Information needed to log into a secure computer system which may include a user name, password or token code. Keystroke logger – Malicious software used to monitor a user's activities by recording every keystroke the user makes with the intent to steal passwords and confidential information. (source: zdnet.com) Malware – (Short for MALicious softWARE) Software designed to compromise computers or computer information. Examples include viruses, worms, spyware and Trojan horse applications such as “banking Trojans.” Money mule - A person who transfers stolen money as a part of a fraudulent scam, either in person, through a courier service or electronically. Money mules may or may not be aware that the money they are transferring is stolen. The stolen funds are generally transferred from the victim's country to the scam operator's country. (source: Wikipedia.org) Phishing – The fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. (Phishing is a form of social engineering using spoofed email.) Spear phishing – A method of Phishing whereby individuals or businesses are specifically targeted. Social engineering - Manipulating people into performing actions or divulging confidential information by trickery, rather than by physically breaking in or by using technical techniques. Spoofed email - E-mail sent so that the sender’s address and other parts of the message are altered to appear as though the e-mail originated from a different source. The message may incorporate graphics taken from a legitimate entity’s web site to give the appearance of authenticity.