Banks, Wall St. Feel Pinch from Computer Intrusion 90
An anonymous reader writes "Financial institutions and companies in the securities/futures business are reporting sizable increases in the amount of losses and suspicious activity attributed to computer intrusions and identity theft, says the Washington Post's Security Fix blog. The Post obtained a confidential report compiled by the FDIC which analyzed Suspicious Activity Reports from the 2nd Quarter of 2007. SARs are filed when banks experience fraud or fishy transactions that exceed $5,000. The bank insurance agency found that losses from computer intrusions averaged $29,630 each — almost triple the estimated loss per SAR during the same time period in 2006 ($10,536). According to the Post, 'The report indicates that the 80 percent of the computer intrusions were classified as "unknown unauthorized access — online banking," and that "unknown unauthorized access to online banking has risen from 10 to 63 percent in the past year."' Another set of figures analyzed by The Post looks at similar increases affecting the securities and futures industry."
Well, this is good ... (Score:5, Insightful)
Re:Well, this is good ... (Score:4, Informative)
Re:Well, this is good ... (Score:4, Insightful)
There are probably some ways that security could be improved from the end-user's perspective as well. I understand that in some countries (I don't know if any U.S. banks do this) users of Internet banking services have a hardware device that plugs into their PC to identify them. I don't know how well that works, never having used anything like that myself, but if implemented correctly it would at least cut down on password phishing schemes.
Re:Well, this is good ... (Score:4, Interesting)
I'd rather have a separate "channel" of information to verify against. If one would use internet banking, then a txt msg containing pertinent info would be sent, with a reply "$dollar amount and yes" as confirmation.
Phones can be deactivated rather fast when it comes to stolen" and such things. It would provide extra security and very little hassle.
Re: (Score:1)
Your (debit) card has a crypto-chip on it and you have some universal device like a pocket calculator. I call them universal because they are not tied to a particular account/card. The authentication is done using a normal browser that supports shttp, and it is of the challenge-response type with the human component in the loop.
On the bank login page you receive a number. You slide your card into the device, you typ
Re: (Score:3)
I understand that in some countries (I don't know if any U.S. banks do this) users of Internet banking services have a hardware device that plugs into their PC to identify them
It doesn't plug into the computer, that would leave it vulnerable if the machine were compromised. It looks like those pocket calculators that everyone was handing out for publicity in the '80s and implements one-time passwords. Inside is a ROM chip with a secret number in it. The bank's site gives you a number, you enter it into the keypad, and then read the result of some permutation on the secret value and the number from the bank and enter it into the site. You can then access the site and anyone w
Re: (Score:2)
The banks can at least try
Re:Well, this is good ... (Score:5, Interesting)
Re:Well, this is good ... (Score:4, Informative)
Re: (Score:2, Interesting)
Re:Well, this is good ... (Score:4, Insightful)
Re: (Score:2, Insightful)
I have one of those RSA tokens (Score:4, Insightful)
This is genuine "two mode" authentication. Sure, if someone stole my computer AND my keychain the security is compromised. Or, if someone puts a gun to my head. But still, compared to current web login security, this system is a vast improvement.
All a bank has to do is say, "Here, this gizmo is free. And by the way, you have to use it if you want to do online banking." Managing these devices isn't any harder than managing ATM cards. Which people lose every day, and its not that big a deal.
Re: (Score:3)
I have one of those $5 PayPal security keys on my keychain. To pay by PayPal or access my account, I am asked first for my password and then asked for the current six-digit code from the security key. The six-digit code changes every 30 seconds.
As for on-line banking, I have never signed up for that because of my concerns about security. If a local bank ever started using two-factor authentication with a security key, I would gladly give on-line banking a try. Until then, I am not interested.
I frequ
Re: (Score:1)
Logging on with a number invalidates it, and any older ones you wrote down.
The only "altenate login" is via SMS (not free) so 98% of Icelanders with bank accounts carry this junk on their keychains. The other 2% regularly punch a bunch of passnumbers into a google doc/online email draf
Does nothing for man in the middle attacks ... (Score:2, Interesting)
The only solution is a separate device less easily owned than a PC which displays all the transaction details. Mobile phones would work (would be nice if they used better cryptography, but even without it's a lot more difficult to exploit on a large scale without physical presence).
If you read the article (Score:3, Insightful)
An RSA token is a terrible way to handle internal security for anything other than a VPN. Imaging typing in a one time password every single time you lock your computer, access an application, etc. It would drive most people to just leave their computers unlocked all the time and logged in.
Mobile phones can be used for two-factor - no HHAD (Score:1)
See for example http://nab.com.au/Personal_Finance/0,,84176,00.html [nab.com.au]
Tim
Re: (Score:3, Informative)
Re: (Score:2)
Some people moan about the various authentication schemes, but I don't think they are all that big of a deal (but I understand wh
Re: (Score:2)
But they don't. Only SALES pay out bonuses, so why invest in anything other than sales gimmicks?
Re: (Score:2)
Just register my number with the bank, and when I log in, I first enter my username and password, and then, on a second screen, the 6 digit code that has just been texted to my phone. Voila. Ivan Hacker who has a keystroke logger on my Linux box can't use the username and password anyway, and the
Re: (Score:1)
In the EU, most banks have 2-factor authentication, and there are still successful phishing trips made against the banks.
The attacker targets one bank and scripts the attack accordingly. Email is sent (spammed) and some of the banks users end up with the malware. The attack occurs next time the user logs in to their bank, the malware detects the bank transaction and snaps up th
Re: (Score:2)
Yeah, I mean, if writing a check to someone meant that they knew they'd actually get the money, then retailers would definitely stop accepting checks. If writing a check to someone meant that they didn't get reusable routing and account numbers, then consumers would definitely stop writing them. I mean, who in their right mind would use something so difficult?
Versus versus versus (Score:2)
verses [cambridge.org]
versus [cambridge.org]
Re:Well, this is good ... (Score:4, Informative)
How do you protect against this sort of thing? The banks have certain heuristics that deal with detecting fraudulent transactions, but this really seems like one of those cases where what you know (passphrase) + who you are (biometrics) would go a long way towards a solution.
Re: (Score:3, Informative)
Re: (Score:2)
An extra advantage is that it works on any platform, as it's basically a website, and th
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
First things first (Score:1)
An extra factor is fine, but start with what works best. What you have.
Re: (Score:2)
A server that calls your cell phone, and makes you punch in a number before letting the web user log in all the way would stop 95% of all fraudulant transactions. You could do that with credit cards too.
Making this shit works is SIMPLE. Getting through the "we don't see a reason to spend money on that" blockage in the average banker-PHB is the problem. Make the fraud
Re:Well, this is good ... (Score:5, Informative)
We spend a sizeable amount of both time and money securing systems against outside access.
The problem as reported in TFA is in the end-user zone. Malware, trojans etc. are used to steal identities og businesses or persons.
True, most of these problems could be mitigated (for now) if the banks switched to some kind of one-time-pad system, but apparently for now the cost of the system are greater than losses due to attacks.
That's a fucking dangerous gamble (Score:1)
He'd be able to make his money off put options rather than directly stolen money
The banks chose their beds (Score:2)
What do you want now? Sympathy or praise for choosing expediency over security?
The problem is not and never has been the end user. We have know for decades that a significant proportion of end users are thieving sociopathic scum. We've had syste
Re: (Score:1, Flamebait)
Generally speaking, "IT guys" know nothing about security and get quite belligerent when you try to tell them how to do their jobs (e.g. advising them to institute allow-by-exception policies). It's the techs and the CIOs more than the CFOs who make this a problem.
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
And to the other person who r
Re: (Score:1)
The best systems I have seen in use, are either electronic dongles (eg. http://rsa.com/node.aspx?id=1156 [rsa.com]), or paper-based one-time pads with challenge-response pairs.
/Crafack
Re: (Score:1, Flamebait)
Egg, in the UK, offer a 'Money Manager' service. This runs as an ActiveX control. This means that, in order to be able to use it, you have to be using IE, on Windows, with ActiveX enabled, which is about the least secure computing configuration possible.
Re: (Score:2)
p0wnd! (Score:2, Funny)
Re:p0wnd! (Score:4, Insightful)
Re: (Score:2)
???
You might need to switch to a new credit union or bank. Both places I bank with require me to show an ID just to check the frigging balance. The *only* thing I can do without an ID is dep
beancounters and shortcuts (Score:5, Insightful)
Re:beancounters and shortcuts (Score:5, Interesting)
Intrusion detection systems are how old? Who really is the enemy as far as the computer system can tell? If you don't know, or are not sure of the answer, you have something in common with the people that have to make decisions with the security of your financial information. I'm not saying that it's a total lost cause, but think about it, have you heard of CSO CIO or CISO? These are the guys that are supposed to make such decisions. Does your bank have any of those positions? Oh wait, is it really the bank that is fully to blame? Did your login get compromised by some software on the 'build-a-better-model-airplane' website?
Better yet, did the bank's EDI software get compromised because one of their partners has an IT guy that watches porn at work during the grueling month-end process?
The truth is that a secure system cannot trust anyone or anything. Getting to your money in a secure system will not be easy, and will be a deterrent to using computerized banking. That is just how it is. Ever since there were banks, people have been trying to rob them. Security issues should not be news. What is news is that the banks and financial institutions are reporting that they are having trouble with security in a time when just about the entire industry has been hurt by the sub-prime issue? I smell a kind of rat here.
Re: (Score:3)
The trouble with this is that your IP address changes all the time when your are travelling and there are lots of parts of the world where my (international GSM) phone doesn't work.
Re: (Score:1)
Re: (Score:2)
Its the same as a multimillion dollar bust when you figure things at 'street value' to pump your stats for the budget bean counters.
In other news... (Score:3, Funny)
Maybe... (Score:2)
Example of identity theft (Score:2, Funny)
Re: (Score:1)
The problem is the user, not the security (Score:5, Insightful)
Now, you may say, "Just add more questions that only the user will know to their online banking logins!". The issue is, the phishers will just pull those same security questions from the banking site. I've even seen ones where they will have you do the initial login then they will login to your banking site and pass the actual security questions to you to answer, allowing them to completely bypass any security measures that your bank has setup. One thing that Chase does that might help a little bit is if you login to your online banking site from somewhere not already verified (different IP address) they will make you send an activation code to your Cell Phone or your registered account e-mail address before they will let you logon and do anything. This might help a little bit, but i'm sure the scammers will find a way around it. Also, those type of security measures are only implemented by large companies, leaving the smaller banks (and their customers) out in the cold when it comes to security.
So basically my point is, we shouldn't focus so much on network security measures as we should on user education. Network security is great, but when your users can be tricked into giving away their most personal information no amount of network security is going to protect them from themselves.
Re: (Score:2)
www.chase.com/(reverse)1.0.0.721
Hmm. Or I could even use the % code for the dots. Jumble it up even further..
Re: (Score:2)
What are the banks going to do? Send thousands if not millions of their customers to security education classes? That might cost more than then phishing attacks themselves.
It would be more prudent if banks got more hostile with large transactions and who does what with
Re: (Score:2)
Fake bank web sites is just one of the dangers, as isnt the only (main?) way to give away your login info. Trojan/Keyloggers are far more dangerous, as you dont need to do anything "unsafe" like putting your id/password in an untrusted/unsecure site, but identify as usual in your current safe/certified/encrypted site, and you could be giving away not just your user/password, but also where you are using them.
How you educate an average windo
Re: (Score:3, Interesting)
I would like to see operating systems that offer the option of only executing code that has been digitally signed. Banks should give their customers authentication devices. This can be as simple as
Re: (Score:2)
It is very hard to believe that a bank will not ask you for a username and password via email when you know from experience that they will cold call you and ask you to authenticate with them while treating you like a complete lunatic if you ask them to prove who they are. Combined with the fact that they all want to know my mother's maiden name (something anyone could simply look up), presumably with the idea that any employee of any institution I deal with should be able to impersonate me....
Of course, the
Re: (Score:1)
You asked for this (Score:2)
*When I say you, I mean the american population, even if you never beleive, milllions will.
Cheap, Good, Easy to Use Security is possible .... (Score:2)
Banks, Insurances, Id-Thefts, Medical, Personal, Professional
Silly, Id-insurance you pay for, because governments, credit companies, banks
The only ban
Only a USA problem? (Score:5, Informative)
I know the procedures for 5 or 6 banks in 3 different European countries, and all of them require a lot more to authenticate me.
The 3 procedures are:
* Bank 1 (the simplest, and first system I have seen, some 10 years ago).
- authenticate with user id (unrelated to name or account number) and password
- be prompted to enter a one-time number from a list which I received by postal (registered) mail (it asks for the number at row x, column y)
All other banks have long moved to something like the 2 others:
* Bank 2.
- put a special card received from the bank into a special calculator also received from the bank and enter password
- enter user id (unrelated to name or account number) on bank web site
- receive a one-time 6 digit number and type it into the special calculator
- the calculator gives an 8 or 10 alphanumeric one-time password to enter into the web form
* Bank 3.
- I can't remember the details, but as with bank 2, there is a special device and procedure to follow involving password, user id, device id and one-time numbers exchanged between the device and the bank's site.
- On top of that, the bank sends me an email every time I connect, with the date, time, the IP address from which I connected, and the money operations performed if any.
Re:Only a USA problem? (Score:4, Interesting)
Make ssn more secure! (Score:3, Interesting)
What is needed, if they want to keep the system at least a little similar, is to simply add a PIN. Keep the pin separate, never printed, just like a PIN for a bank card. The PIN must be used for opening any account or using the SSN in any manner an ID thief might. For general use only ssn is required, same as it is today. This alone would cut back on ID theft, as it would break the current method of "ssn + name = free$$" by requiring a PIN that only the original holder of the SSN should know, rather than requiring a simple to find number and some info thats publicly available.
Tm
Tm
Re: (Score:3, Insightful)
How about stock market "insider" info? (Score:1)
Scenario 1: As Company C prepares its year-end report, hacker H sniffs the CEO/CFO mail conversation and sees that market expectations will be greatly exceeded or greatly dissapointing. He thereafter invests in suitable warrants and profits.
Scenario 2: If the hacker has penetrated the network well, he could seriously disrupt stock market value by releasing trade secrets, destroying servers,
Banks are AWOL on this (Score:1)
Technology exists today where every time you would use your card at a data connected store - your use number would change. The number would be visible on a super thin LCD or E-paper display on the card.
Thus every time you use your card, except on phone or web purchases, the number changes.