SlideShare una empresa de Scribd logo
1 de 75
“ KYE” - KNOW YOUR ENEMY Understanding Payment Fraud Risks and Exposures   Andrea Wilson, CEO  First Atlantic Commerce Ltd
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Shadow Internet Economy ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
The Shadow Internet Economy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
The Shadow Internet Economy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
The Shadow Internet Economy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Shadow Internet Economy ,[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Copyright First Atlantic Commerce Ltd 2009
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
KYE  -  Know Your Enemy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
KYE – Know Your Enemy ,[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Copyright First Atlantic Commerce Ltd 2009 This is a phishing email  The Bank of Bermuda email domain was hijacked
Copyright First Atlantic Commerce Ltd 2009 Highjacked URL from Jliangpartnership.co.uk Copyright year is different This is the Phished site
Copyright First Atlantic Commerce Ltd 2009 This is the real web site
KYE – Know Your Enemy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Current Trends in Phishing Anti Phishing Network Group 2008 Statistics April May June         Number of unique phishing emails rec'd by APWG from consumers 24,924 23,762 28,151 Number of unique phishing web sites detected 20,410 20,317 18,509 Number of brands hijacked by Phishers 276 294 227 Country hosting the most phishing websites CHINA Turkey USA Contain some form of target name in the URL 28.30% 23.20% 26.10% Longest time online for Phished site 30 days 31 days 30 days Source:www.apwg.org
Current Trends in Phishing Countries Hosting Phishing Sites in Q2 2008       www.apwg.org       APRIL   MAY   JUNE China 25.15% Turkey 25.73% USA 18.93% USA 16.68% USA 17.16% Turkey 17.92% Russia 8.23% Japan 11.23% Poland 13.56% Poland 7.15% China 9.17% Greece 6.86% Turkey 5.79% Poland 7.41% China 5.87% Germany 3.97% Russia 3.27% Russia 4.28% Republic of Korea 3.12% Greece 2.11% France 2.48% Greece 2.61% France 2.08% Republic of Korea 2.38% France 2.32% Republic of Korea 1.60% Bulgaria 2.28% Romania 2.21% Netherlands 1.60% UK 2.16%
Current Trends in Phishing ,[object Object],[object Object],[object Object],[object Object],  April May June USA 38.67% 32.12% 30.98% China 9.68% 28.67% 24.95% Russia 8.23% 6.06% 5.74% Republic of Korea 3.81% 2.18% 2.17%
Copyright First Atlantic Commerce Ltd 2009
Copyright First Atlantic Commerce Ltd 2009
Current Trends in Online Fraud Copyright First Atlantic Commerce Ltd 2009
Copyright First Atlantic Commerce Ltd 2009 22,169 Downloads
Current Trends in Online Fraud Copyright First Atlantic Commerce Ltd 2009
Current Trends in Online Fraud ,[object Object],[object Object],[object Object],[object Object],[object Object]
Card Fraud Worldwide 2007 ISSUER Total Volume ($billions) Fraud Losses ($billions)       VISA $5,636.26  $3.21  PIN Debit $2,347.40  $0.16  MasterCard $2,276.10  $1.50  AMEX $647.30  $0.22  Discover $118.91  $0.07  JCB $60.94  $0.04  Diners Club $30.11  $0.01  Magstripe credit/debit other $691.00  $0.15        TOTALS $11,808.02  $5.55  Source:  2008 Nilson Report Issue 915  
Online Fraud Statistics 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Fraud Statistics 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Fraud Statistics 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Fraud Statistics 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Online Fraud Statistics 2008 ,[object Object],[object Object],[object Object],[object Object]
Online Fraud Statistics 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Fraud Detection Tools ,[object Object],[object Object]
Current Fraud Detection Tools ,[object Object]
Current Fraud Detection Tools ,[object Object],[object Object],[object Object]
Current Fraud Detection Tools – USA/Canada Current Fraud Detection Tools   2006 2007 2008 >$25mm/yr Address Verification AVS 79% 80% 78% 87% Card Verification CVV2/CVC2 69% 74% 74% 80% Fraud Screening (internal) 38% 39% 27% 42% IP Geolocation (Address Point Verify) 35% 37% 35% 48% Negative Lists (in house) 34% 36% 38% 67% Order Velocity Monitoring 33% 35% 28% 54% Automated Decision Scoring 32% 34% 34% 50% Manual Review 25% 22% 22% 33% Chargeback Management 22% 20% 20% 33% Customer behaviour analysis   29% 20% 22% Customer order history     47% 54% 3-D Secure (VBV and SecureCode) 29% 25% 27% 39% Positive Lists   17% 17% 32% Device fingerprinting     6% 7% Consumer challenge questions 5% 6% 5% 7%
Current Fraud Detection Tools ,[object Object],[object Object],[object Object],[object Object],[object Object]
Current Fraud Detection Tools – Comparison Fraud Detection Tools >$25mm/yr North America 2008 UK Europe 2008       Card Verification CVV2/CVC2 80% 79% Address Verification AVS 87% 78% Manual Review 22% 67% 3-D Secure (VBV and SecureCode) 38% 59% 3rd Party ID checks 39% 49% Automated Decision Scoring 54% 30% Fraud screening (industry) 18% 36% Fraud screening internal 42% 38% Negative lists 18% 29% Chargeback Management 20% 37% Industry Hot Card information 18%   21% Customer Device Fingerprinting 7% 8% IP Geolocation 48% 26%
Top Fraud Detection Tools – to be implemented Fraud Detection Tools to be Implemented in 2009 North America UK Europe Customer Device Fingerprinting 47% 17% IP Geolocation 27% 11% Fraud services (internal) 20% 12% Customer Order History 17% 6% Card Verification CVV2/CVC2 16% 8% Customer Behaviour Screening 13%   13% 3-D Secure (VBV and SecureCode) 11% 19% Negative lists/Shared Services 10% 13% Telephone Verification 10% 19% Multi- Merchant Fraud Models 9% 15% 3rd Party ID checks 9% 20% Automated Decision Scoring 7% 18% Chargeback Management 7% 23% Address Verification AVS 6% 16%
Current Fraud Detection Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
An Example
The numbers in ( ) represent your own data ‘ Hits’ = Suspicious  Activity
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Current Fraud Detection Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Current Fraud Detection Tools ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chargebacks Vs Refunds Source:  Cybersource  2009 Online Fraud Report
Current Fraud Detection Tools Used ,[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
How Does 3-D Secure™ work? ,[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
How Does 3-D Secure™ Work? ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
What are the Problems with 3-D Secure ?  ,[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
What are the Problems with 3-D Secure?  ,[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
This is a phishing site
This link redirects to the phish site
What are the Problems with 3-D Secure?  Copyright First Atlantic Commerce Ltd 2009
VBV Enrolment Phishing Scam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
VBV Enrolment Phishing Scam ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Copyright First Atlantic Commerce Ltd 2009
Copyright First Atlantic Commerce Ltd 2009
Copyright First Atlantic Commerce Ltd 2009
Copyright First Atlantic Commerce Ltd 2009 This is legit VBV registration site
Copyright First Atlantic Commerce Ltd 2009 This is a phishing site
Summary –  Fraud Detection versus Prevention ,[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Summary –  Fraud Prevention ,[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Summary –  Fraud Prevention ,[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Summary –  Fraud Prevention ,[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Summary –  Fraud Prevention ,[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
Summary –  Fraud Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright First Atlantic Commerce Ltd 2009

Más contenido relacionado

La actualidad más candente

Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International PerspectiveSteve Mitchinson
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats- Mark - Fullbright
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017malvvv
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?NormShield
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 

La actualidad más candente (19)

Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech TalentRansomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 

Destacado

Global Consumers React to Rising Payment Fraud
Global Consumers React to Rising Payment FraudGlobal Consumers React to Rising Payment Fraud
Global Consumers React to Rising Payment FraudACI Worldwide
 
RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013EMC
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyEldos Kuriakose
 
Architecture and Development of NFC Applications
Architecture and Development of NFC ApplicationsArchitecture and Development of NFC Applications
Architecture and Development of NFC ApplicationsThomas de Lazzari
 

Destacado (9)

Nicolas Vedrenne, Payment Fraud
Nicolas Vedrenne, Payment FraudNicolas Vedrenne, Payment Fraud
Nicolas Vedrenne, Payment Fraud
 
Global Consumers React to Rising Payment Fraud
Global Consumers React to Rising Payment FraudGlobal Consumers React to Rising Payment Fraud
Global Consumers React to Rising Payment Fraud
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013RSA E-Commerce Fraud Trends 2013
RSA E-Commerce Fraud Trends 2013
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
Mobile Payment Security Trends for the Future
Mobile Payment Security Trends for the FutureMobile Payment Security Trends for the Future
Mobile Payment Security Trends for the Future
 
Architecture and Development of NFC Applications
Architecture and Development of NFC ApplicationsArchitecture and Development of NFC Applications
Architecture and Development of NFC Applications
 

Similar a Driving Payment Innovation - Know Your Enemy

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Executive Leaders Network
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud managementrkappear
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Know Your Enemy
Know Your EnemyKnow Your Enemy
Know Your Enemytlineshill
 
NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTesth9gfhypx97
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxerlindaw
 

Similar a Driving Payment Innovation - Know Your Enemy (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
 
Top 5 cyber crimes of 2014
Top 5 cyber crimes of 2014Top 5 cyber crimes of 2014
Top 5 cyber crimes of 2014
 
Phishing
PhishingPhishing
Phishing
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Know Your Enemy
Know Your EnemyKnow Your Enemy
Know Your Enemy
 
NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
ihegc012
ihegc012ihegc012
ihegc012
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
 

Último

8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 

Último (20)

No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 

Driving Payment Innovation - Know Your Enemy

  • 1. “ KYE” - KNOW YOUR ENEMY Understanding Payment Fraud Risks and Exposures Andrea Wilson, CEO First Atlantic Commerce Ltd
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Copyright First Atlantic Commerce Ltd 2009
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Copyright First Atlantic Commerce Ltd 2009 This is a phishing email The Bank of Bermuda email domain was hijacked
  • 14. Copyright First Atlantic Commerce Ltd 2009 Highjacked URL from Jliangpartnership.co.uk Copyright year is different This is the Phished site
  • 15. Copyright First Atlantic Commerce Ltd 2009 This is the real web site
  • 16.
  • 17. Current Trends in Phishing Anti Phishing Network Group 2008 Statistics April May June         Number of unique phishing emails rec'd by APWG from consumers 24,924 23,762 28,151 Number of unique phishing web sites detected 20,410 20,317 18,509 Number of brands hijacked by Phishers 276 294 227 Country hosting the most phishing websites CHINA Turkey USA Contain some form of target name in the URL 28.30% 23.20% 26.10% Longest time online for Phished site 30 days 31 days 30 days Source:www.apwg.org
  • 18. Current Trends in Phishing Countries Hosting Phishing Sites in Q2 2008       www.apwg.org       APRIL   MAY   JUNE China 25.15% Turkey 25.73% USA 18.93% USA 16.68% USA 17.16% Turkey 17.92% Russia 8.23% Japan 11.23% Poland 13.56% Poland 7.15% China 9.17% Greece 6.86% Turkey 5.79% Poland 7.41% China 5.87% Germany 3.97% Russia 3.27% Russia 4.28% Republic of Korea 3.12% Greece 2.11% France 2.48% Greece 2.61% France 2.08% Republic of Korea 2.38% France 2.32% Republic of Korea 1.60% Bulgaria 2.28% Romania 2.21% Netherlands 1.60% UK 2.16%
  • 19.
  • 20. Copyright First Atlantic Commerce Ltd 2009
  • 21. Copyright First Atlantic Commerce Ltd 2009
  • 22. Current Trends in Online Fraud Copyright First Atlantic Commerce Ltd 2009
  • 23. Copyright First Atlantic Commerce Ltd 2009 22,169 Downloads
  • 24. Current Trends in Online Fraud Copyright First Atlantic Commerce Ltd 2009
  • 25.
  • 26. Card Fraud Worldwide 2007 ISSUER Total Volume ($billions) Fraud Losses ($billions)       VISA $5,636.26 $3.21 PIN Debit $2,347.40 $0.16 MasterCard $2,276.10 $1.50 AMEX $647.30 $0.22 Discover $118.91 $0.07 JCB $60.94 $0.04 Diners Club $30.11 $0.01 Magstripe credit/debit other $691.00 $0.15       TOTALS $11,808.02 $5.55 Source: 2008 Nilson Report Issue 915  
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Current Fraud Detection Tools – USA/Canada Current Fraud Detection Tools 2006 2007 2008 >$25mm/yr Address Verification AVS 79% 80% 78% 87% Card Verification CVV2/CVC2 69% 74% 74% 80% Fraud Screening (internal) 38% 39% 27% 42% IP Geolocation (Address Point Verify) 35% 37% 35% 48% Negative Lists (in house) 34% 36% 38% 67% Order Velocity Monitoring 33% 35% 28% 54% Automated Decision Scoring 32% 34% 34% 50% Manual Review 25% 22% 22% 33% Chargeback Management 22% 20% 20% 33% Customer behaviour analysis   29% 20% 22% Customer order history     47% 54% 3-D Secure (VBV and SecureCode) 29% 25% 27% 39% Positive Lists   17% 17% 32% Device fingerprinting     6% 7% Consumer challenge questions 5% 6% 5% 7%
  • 37.
  • 38. Current Fraud Detection Tools – Comparison Fraud Detection Tools >$25mm/yr North America 2008 UK Europe 2008       Card Verification CVV2/CVC2 80% 79% Address Verification AVS 87% 78% Manual Review 22% 67% 3-D Secure (VBV and SecureCode) 38% 59% 3rd Party ID checks 39% 49% Automated Decision Scoring 54% 30% Fraud screening (industry) 18% 36% Fraud screening internal 42% 38% Negative lists 18% 29% Chargeback Management 20% 37% Industry Hot Card information 18%   21% Customer Device Fingerprinting 7% 8% IP Geolocation 48% 26%
  • 39. Top Fraud Detection Tools – to be implemented Fraud Detection Tools to be Implemented in 2009 North America UK Europe Customer Device Fingerprinting 47% 17% IP Geolocation 27% 11% Fraud services (internal) 20% 12% Customer Order History 17% 6% Card Verification CVV2/CVC2 16% 8% Customer Behaviour Screening 13%   13% 3-D Secure (VBV and SecureCode) 11% 19% Negative lists/Shared Services 10% 13% Telephone Verification 10% 19% Multi- Merchant Fraud Models 9% 15% 3rd Party ID checks 9% 20% Automated Decision Scoring 7% 18% Chargeback Management 7% 23% Address Verification AVS 6% 16%
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 46. The numbers in ( ) represent your own data ‘ Hits’ = Suspicious Activity
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Chargebacks Vs Refunds Source: Cybersource 2009 Online Fraud Report
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59. This is a phishing site
  • 60. This link redirects to the phish site
  • 61. What are the Problems with 3-D Secure? Copyright First Atlantic Commerce Ltd 2009
  • 62.
  • 63.
  • 64. Copyright First Atlantic Commerce Ltd 2009
  • 65. Copyright First Atlantic Commerce Ltd 2009
  • 66. Copyright First Atlantic Commerce Ltd 2009
  • 67. Copyright First Atlantic Commerce Ltd 2009 This is legit VBV registration site
  • 68. Copyright First Atlantic Commerce Ltd 2009 This is a phishing site
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.