Just as well I don't use Online Banking
as I never trusted it in the first place, not even just "voice over the phone" banking facilities.
Cyber-crooks are blagging SIM cards that allow them to circumvent mobile-based banking security measures and swipe cash from punters' accounts. Security biz Trusteer has uncovered two elaborate techniques that will defeat out-of-band authentication mechanisms such as SMS-delivered one-time passwords (OTP) for online banking …
What is it with IT guys behaving like utter luddites and not being able to deal with change? I just don't get it, especially coming from such a fast moving industry.
At my previous work we decided to stop mirroring disks (by default) in the enterprise disk arrays and RAID5 them. You would have thought the world was going to end, if you'd listened to the UNIX team, they had loads of reasons all of which betrayed their lack of storage knowledge. In the end, no-one noticed the difference as the speed wasn't needed and we saved the company millions.
The reason why I don't use on line banking is that I read the terms and conditions and thought "stuff that". Almost all the responsibility to prove fraud has been offloaded to the customer. Eeasier to wander down to the bank occasionally and, incidentally, have one more person in a local job and paying a share of my council tax.
"...Almost all the responsibility to prove fraud has been offloaded to the customer..."
No it hasn't, that is specifically illegal in the UK/EU and has been for several years now. The bank has to prove fraudulent activity on your part, not the other way round.
Because then it's not really OTP which should rely purely on pre-agreed PIN generation, normally time-based, with no per-transaction interaction.
I think the target of these scams is eg PayPal who send PINs via SMS to the account holder's mobile as extra security over and above the usual userid/password, so they're not really talking about OTP either.
I bank online with HSBC and they have separate physical OTP generator keycards which are immune from these sort of scams (but have other limitations).
If we're really going to get pedantic (we are! we are!) then there are very few TLAs (3-letter acronyms) but a preponderance of TLIs (3-letter initialisms). An acronym has to be a meaningful word (like CAT, DOG, etc), so most of the 26^3 possibilities are necessarily initialisms.
And no, I'm not going to finish with the usual deeply-infuriating concluding phrase, "There, sorted it for you"...
Google TLA and, after an ad for "TLA Video", it comes up with Three Letter Acronym as it's first return. Admittedly the link is to Wikipedia which, as we all know, isn't always the most reliable of sources.
But, IMO, TLA stands for Three Letter Abbreviation as that's what the R.A.F. taught me and they're never, ever wrong. :-D
The effects of this scam are so fishy it would be bound to raise some suspicions...
On the other hand, I've yet to see a way to break my bank's (ubs in switzerland) e-banking.
Not only do you need to know a special 8-digit login but the password is generated using a bespoke smart card reader which then produces a code by combining a) 8 digits given by the site, b) a 6-digit PIN to unlock the smart card and c) a signature on the card's chip. Those passwords are only valid for 30 seconds; be slow and you missed it.
Finally, as a layer of security any payment to an account not paid to before requires the same authentication as above so even if someone hijacks a session they can't make payments to anything you haven't made a payment to before.
So unless you a) know my special code, b) grab hold of my smartcard and c) know my card's PIN you're stuffed. If you get all the above though, then you truly deserve the goodies :)
Intercept your post. Ask bank for new smartcard because you've "put it through the washing machine". Wait for replacement to arrive and steal it before it gets to your door. Clear out your account before you can do anything about it.
Skill needed: To work in the post office (or know someone who does) and be able to talk.
That's basically what these scams do, if you read the article. It's not a question of technical hacking but social engineering and interception. Your IMEI and/or a replacement SIM can be silently gathered quite easily without you ever knowing in similar ways and then they are in. The hack described involved visiting a police station and reporting someone else's mobile lost in order to get the police report on that - we can safely say these people are quite brazen!
The ways around it rely on the banks / phone companies to do their job - which is to VERIFY your identity for everything. That can't happen without falling into ridiculous scenarios (such as I've experienced) where companies WOULDN'T take a payment from me because I wasn't the account holder, but wouldn't take the payment from the account holder because it wasn't their card they were paying with. And try getting a PIN reset on a bank card you haven't used in 10 years and have forgotten all your codes and moved house in the meantime too.
There are some genius hacks, and some genius technology, but there's always an "analogue hole" in that it's very hard to prove that the person in front of you or speaking to you on the phone *IS* the account holder in all situations without also locking out the GENUINE account holder who's just forgotten their details. And a simple post-office intercept can overcome almost anything if someone is determined enough to target you in particular.
Don't be so complacent. Scams operate on your complacency. "This system is uncrackable" is akin to saying "This boat is unsinkable". Historically, it's been proved to be an incredibly stupid thing to say.
I've also got a UBS account. Even if somehow you get hold of a replacement card you'd still need the personal agreement number and 6 digit PIN as well as the card reader.
I'd guess they wouldn't send you a card without the agreement number.
I think it's the best method I've seen although I'm fairly happy with the hideous 20 digit passwords I use for my other accounts.
And to cap everything off, even if you could get the credentials OTP's are good for one single login and have a lifetime of 30 secionds.
So your only option is hijacking my session as described. But even this is planned for as any transfer to hitherto unknown/unused account requires authentication anew.
So at best you'd be able to pay my usual bills as those are the only account which have been credited by me in the past.
Actually there is a well known way of getting around this, through human engineering. Basically it works like this:
A man approaches you in a quiet street and tells you a hard luck story, how he has lost all his money, his return ticket etc. etc.
He then explains that the only thing of value he has left in the world is this big shiny gun...
unfortunately you might be open to a MITB (man in the browser) attack, this has been mentioned as a stealthy trojan that does nothing until it smells a bank website then opens up a real time channel to malware C&C centre sending screenshots/session cookies/everything to the far-end. Admittedly they'd have to be quick about it but there remains a risk!
Worrying data from Denmark "Recently, three major banks, Danish Bank, Nordea and Royal Bank concurrence tell (EPN.dk/PCWorld) that about one in five of their network operations now going on a smartphone." http://www.computerworld.dk/art/213750/saadan-bruger-danskerne-bankens-mobil-loesning TWENTY PERCENT!!!
Now try and implement your UBS level of security on a tiny mobe' screen whilst ambiental (or malware) CCTV from sixty metres away systems can accurately guess every PIN/OTP/RND number typed, whilst that fake-angry-birds app in parallel is busy chatting with criminals in Indonesia? money might start to leave the systems faster than even the banks can hose it in! but that only applies to 20% of online banking in Denmark...today...
... by ticking the box that says "I don't want this account to be accessible online" when I set up the account.
Seriously ... Who in their right mind does anything of a financial nature with TehIntreWebTubes[tm] as a go-between between themselves and a financial institution? The mind boggles.
Oh I don't know, anyone that doesn't want to queue for 6 hours on a bank, just to set up a new standing order?
Or doesn't fancy the idea of driving 10 miles to the nearest bank to transfer some money over to a friend.
Or maybe the same sort of idiot that buys stuff about 30 - 50% cheaper online rather that but up with quesuing in a shop to buy the same product, but this time having to put up with some miserable git behind the till trying to flog you £9.99 insurance on a £15 item.
You stick to the 1970's.
Somebody who doesn't live in the 1960's wearing a tin foil hat and who actually understands the real risks, rather then reading the sensationalist crap put out by the media.
Do you use a debit/credit card to buy things either in store or online, then you are at risk. Do you take money out of ATM, you are at risk. Oh and you know that nice call center agent you gave all your details to, well of course the computer system she uses is secure (?) but what about the pad and pencil she just wrote all your details down on and will sell it on to fraudsters who then phone up your bank and empty your account, this actually happens.
Trust me Online Banking is that last of your worries.
Oh I don't know, me perhaps?
Dealing with any bank face to face, is very much like trying to remove my eyes with a very small, very rusty pair of tweezers. Try being deaf. Dealing with most banks that demand you accept calls for transaction verification purposes isn't exactly my idea of fun.
Some are better than others, but hey; it's okay, I'll just pop down the local branch and talk.. ah.
So, yes. I'd rather use it online without involving anybody in a branch or telephone centre, thanks.
"The one common thread in both schemes is that they are made possible by compromising the web browser with a Man in the Browser (MitB) attack to steal the victim’s credentials," explains Trusteer’s CTO Amit Klein."
What do Trusteer produce "secure browser technology to prevent MitM attackes"
Sorry but these Idiots who cry wolf every 5 minutes just to sell there own niche products just makes it harder for us that are trying to get businesses to take a better, measured approach to raise security in general, rather than make knee jerk reactions to the latest percieved threat.
Trusteer have previous as scaremongers and their 'Rapport' software is neither 'niche' (the big banks have bought in) nor much of a 'product' (it doesn't work: http://www.theregister.co.uk/2011/10/19/trusteer_rapport_follow_up/)
More essential reading here - http://www.digit-security.com/blog/?p=333 - and the forum thread here - http://www.pprune.org/archive/index.php/t-394494.html .
... can you report a mobile phone stolen without identifying yourself to the police properly? I mean, "name, telephone number, and other pesonal information" probably wouldn't cut it here in Germany. If you're not showing your ID card, passport or other solid identification, that wouldn't work.
Any country with an automated internet system for reporting lost/stolen property because having police to actually verify things costs too much and is very inefficient. It's the "other personal information" on which they are primarily depending, and which was probably also compromised by the malware on the system.
The UK! When my wife's bag was stolen (including mobile phone), all she did was telephone the local police station, tell them her name, where her bag was stolen from, and what was inside the bag, and they gave her a crime reference number there and then, over the phone.
Rang the telco with crime reference number and a new phone was dispatched there and then.
Not only will it not be found on the phone's battery (I just love the concept of the IMEI changing if you change the battery) but in a lot of cases #06# will not deliver any IMEI (produces an error message or a service not supported message instead). Also, I do some online things involving money and would immediately assume a scam if a bank/building society/pension fund manager/insurance company asked me for an IMEI (maybe I wouldn't be suspicious if I was taking out a new insurance policy to cover a mobile phone I hadn't previously insured with that company - but that never happens, since I don't buy expensive mobile phones and see no point in insuring the cheap ones I do buy).
... for UK and other large international banks. Yes, it is based on social manipulation, but it is ridiculously easy to 'swap' a SIM card (fraudulently). Just tell yout mobile operator that you lost/replaced your phone and want your number ported to a new SIM card; that's it and the 2nd factor of authentication is compromised. That is why this type of so-called 'SIM swap fraud' usually targets high-value customers in a one-off raid.
There are technological measures banks can take against this sort of fraud.
Surely the simple solution there is to require someone to attend a $TELCO store in person and present ID before being given the replacement SIM? Especially if it's a business phone.
I mean, yes, there are problems here, but mainly of the "Humans durr da durr durr" variety rather than the more-exciting-sounding-but-less-probable "ZOMG! THE TECHNOLOGY, IT HAS GONE EEEEEEEEVIL!" variety...
It's inevitable malware makers will target mobile devices. The challenge really is -- especially as we look to NFC and the 'iWallet' -- the challenge will be to ensure that device security is 100% -- we can't have a repeat of the bad days of the Windows era. Thing is there's lots of things users -- especially enterprise users -- can do to improve the security of their BYOD gadgets, as detailed in this here, http://blogs.orange-business.com/connecting-technology/2012/03/infographic-security-byod.html
"What is it with IT guys behaving like utter luddites and not being able to deal with change?"
I wonder if these luddites are the same group as those who rush to be the first to post a comment on any mobile phone review saying "All I want is a phone that can make and receive calls". Bloody annoying sods should go out and buy a phone already.
"I wonder if these luddites are the same group as those who rush to be the first to post a comment on any mobile phone review saying "All I want is a phone that can make and receive calls"."
Probably. Enjoy your crayons. Adults use real communications tools.
Biting the hand that feeds IT © 1998–2019