Corporate Account Takeover
Protecting Your Business From Financial Fraud
Corporate Account Takeover Protecting Your Business From Financial - - PowerPoint PPT Presentation
Corporate Account Takeover Protecting Your Business From Financial Fraud Legal Notice This presentation is for informational purposes and is not intended to provide legal advice. The guidance included is not an exhaustive list of actions, and
Protecting Your Business From Financial Fraud
This presentation is for informational purposes and is not intended to provide legal advice. The guidance included is not an exhaustive list of actions, and security threats change constantly.
stealing the business’s valid online banking credentials - such as usernames, passwords, authentication questions & answers, security keys.
business utilizes to send ACH payments, wire transfers, or other transfers to the thieves’ own accounts.
Target Victims Install Malware Online Banking Collect & Transmit Data Initiate Funds Transfer(s)
1 2 3 4 5
Criminals target victims by way of phishing, spear phishing or social engineering techniques. The victims unknowingly install malware on their computers,
screen shot capabilities. The victims visit their online banking website and logon per the standard process. The malware collects and transmits data back to the criminals through a backdoor connection. The criminals leverage the victim’s online banking credentials to initiate a funds transfer from the victim’s account.
steal an identity or cause the user to download malware.
malware.
hide malicious code.
software applications to gain access to system information and resources.
US Secret Service (USSS) FBI Financial Services – Information Sharing & Analysis Center (FS-ISAC) Internet Crime Complaint Center (IC3)
large businesses
business or organization through other ways:
Call the business at a number known to be authentic Go to the business’ legitimate website
Use strong passwords Change passwords often – typically every 30-60 days Don’t share passwords Lock workstations when stepping away
No administrative privileges No web browsing or email capabilities on computers used for online banking or to access other online payment systems
and removal software
as they become available
hotels, airports, etc.) when accessing accounts or other personal information
separate computers
methods such as call backs, SMS texts, and batch limits
a message that the system is unavailable
activity and remove any computer systems that may be compromised from the network
suspicious activity
Disable online access to accounts Change online banking passwords Open new account(s) as appropriate Request a review of transactions Request a review of online banking accounts to determine if information was changed or new users were added
and the steps taken to report the incident – make sure to notify:
Your financial institution(s) Agencies such as the Federal Trade Commission or IC3 All consumers that were affected by the fraud Any other businesses or organizations that may have been impacted
been compromised