In today’s digital landscape, organizations face an ever-increasing risk of falling victim to payment fraud. Cybercriminals are becoming more sophisticated, employing a variety of tactics to deceive companies and siphon off funds. Let’s delve into the challenges posed by payment fraud and explore strategies to safeguard against it.
According to a recent report by Trustpair, 96% of US companies encountered at least one fraud attempt in the past year. This staggering figure highlights the pervasive nature of the threat. But what forms do these attacks take?
Text Message Scams (50%): Fraudsters exploit SMS communication to trick employees into divulging sensitive information or transferring funds.
Fake Websites (48%): Bogus websites mimic legitimate ones, luring unsuspecting victims to share confidential data.
Social Media Deception (37%): Cybercriminals use social platforms to impersonate employees or manipulate them into making unauthorized transactions.
Hacking (31%): Breaches compromise systems, granting fraudsters access to financial data.
Business Email Compromise Scams (31%): Sophisticated email fraud targets finance departments, often involving CEO or CFO impersonations.
Deepfakes (11%): Artificially generated audio or video clips can deceive employees into taking fraudulent actions.
The consequences of successful fraud attacks are severe:
These financial hits not only impact the bottom line but also erode trust and credibility. C-level finance and treasury leaders recognize this, with 75% stating that they would sever ties with an organization that suffered payment fraud and lost their funds.
As organizations grapple with this menace, automation emerges as a critical tool. Here’s how it can help:
To protect against payment fraud, organizations should consider the following steps:
Education and Awareness: Train employees to recognize common fraud tactics and encourage vigilance.
Multi-Factor Authentication (MFA): Implement MFA for financial transactions to add an extra layer of security.
Regular Audits: Conduct periodic audits of financial processes and systems.
Collaboration: Foster collaboration between finance, IT, and security teams to stay ahead of emerging threats.
Real-Time Monitoring: Use advanced tools to monitor transactions and detect anomalies promptly.
Payment fraud is no longer a distant concern—it’s hitting organizations harder than ever before. By investing in robust safeguards, staying informed, and leveraging automation, companies can stay safe.
A new malware has been observed by the Research team at McAfee Corp. This malware is found to be attacking NTT DOCOMO customers in Japan.
The malware that is distributed via the Google Play Store pretends to be a legitimate mobile security app, but in reality, it is a fraud malware designed to steal passwords and abuse reverse proxy focusing on NTT DOCOMO mobile service customers.
The McAfee Cell Analysis team informed Google regarding the notoriety of the malware. In response, Google has made the application unavailable in Google Play Store and removed known Google Drive files that are associated with the malware. In addition to this, Google Play Shield has now alerted the customers by disabling the apps and displaying a warning.
The malware publishes malicious fake apps on Google Play Store with various developer accounts that appear like some legitimate apps. According to a tweet by Yusuke Osumi, a Security Researcher at Yahoo, the attacker lures the victims into installing the malware in their systems by sending them an SMS message with a Google Play Store link, reportedly sent from overseas. Additionally, they entice the users by displaying a requirement to update their security software.
This way, the victim ignorantly installs the fraudulent app from Google Play Store and ends up installing the malware. The malware asks the user for a community password but cleverly enough, it claims the password is incorrect, so the user has to enter a more precise password. It does not matter if the password is incorrect or not, as this community password can later be used by the attacker for the NTT DOCOMO fee services and gives way to online funds.
Thereafter, the malware displays a fake ‘Mobile Security’ structure on the user’s screen; the structure of this Mobile Security structure interestingly resembles that of an outdated display of McAfee cell security.
How does the malware function
A native library called ‘libmyapp.so’ written in Golang, is loaded through the app execution. When the library is loaded, it attempts to connect with C&C servers utilizing an Internet Socket. WAMP (Internet Software Messaging Protocol) is then employed to speak and initiate Distant Process Calls (DPC). When the link is formulated, the malware transmits the community data and the victim’s phone number, registering the client’s procedural commands. The connection is then processed when the command is received from the server like an Agent. Wherein, the socket is used to transmit the victim’s Community password to the attacker, when the victim enters his network password in the process.
The attacker makes fraudulent purchases using this leaked information. For this, the RPC command ‘toggle_wifi’ switch the victim’s Wi-Fi connection status, and a reverse proxy is provided to the attacker through ‘connect_to’. This would allow connecting the host behind a Community Handle Translation (NAT) or firewall. With the help of a proxy, now the attacker can ship by request through the victim’s community network.
Along with any other methods that the attackers may use, the malware can also use reverse proxy to acquire a user’s mobile and network information and implement an Agent service with WAMP for fraudulent motives. Thus, it is always advised by Mobile Security Organizations to be careful while entering a password or confidential information into a lesser-known or suspicious application.
"To test dozens of stolen cards, they “sold” the items to each other, after “haggling” those prices down to $1.00 USD— a typical price used to test hijacked payment details. Each listing was uncharacteristic for this marketplace, purchased on the same day, and included several fake reviews to strengthen the appearance of authenticity.", stated the report.