Community
The UK's House of Lords is calling on the government to make banks legally responsible for losses incurred by customers through electronic fraud (https://www.finextra.com/fullstory.asp?id=18699). That's because today's banking code leaves responsibility on consumers.
In practice the banks do not typically use the code to that effect, and refund fraudulent transactions that manage to pass through their ever-improving defence network. The day when a major bank tells its online customers it won't offer them guarantee against fraud, is the day people will start abandoning the online banking channel, preferring the good old phone and branch venues. Online banking will go down the drain.
I'll give you an analogy. Suppose the National Health Service Code said that people should take steps to protect themselves against contagious diseases, and if they happen to catch a virus, then it's their responsibility. They weren't careful enough, so they have to pay the bill.
That's because today, almost everyone can be infected, and worse – they won't even realise that until their bank account is emptied.
So lets just assume you got infected despite having the latest firewall and AV protection. Would you be able to spot the malicious Trojan?
Limbo sells for $350 in select fraud forums. It's been around for a couple of years, and by now has been outperformed by even nastier, more popular malware. But even Limbo will fool everyone infected with it into thinking it does not exist.
Limbo lives in your browser. To be more exact, it's in the twilight zone between the display layer that is presented to you, and the communication layer that gets the information from your bank.
Press the yellow lock on your browser, and you'll see the bank's certificate. Use the latest anti-fraud features of your browser, and it will show calming green.
But whatever the bank sends to your browser is now intercepted by Limbo, and when the page is presented to you, it looks different. This HTML injection technique allows Limbo to present whatever devious social engineering its controller wants you to see.
So if you login via user name and password, Limbo can just leave that on screen, grab that information and send it to the Trojan operator. It can also add some other innocent fields – like your ATM card number and PIN code - that will now look like part of the official login process.
These may raise some suspicion, but here's the thing with social engineering: once you're convinced you are communicating with the bank, you'll do anything the bank asks you in order to authenticate. And Limbo does not for a moment give you any hints you're talking to a Man in the Middle, and not directly with your bank.
If you have more sophisticated login process, such as a one-time access code, Limbo can accommodate that as well by making the appropriate changes on the screen. Theoretically it can defeat even transaction signing (but this requires an immediate generation of a transaction to a mule account, and that's difficult to do from an operational perspective).
The bottom line is this. The average user cannot be educated to follow this moving target called online fraud. Even if it did, today's malware makes sure he or she won't suspect a thing, and may be infected even if it has the latest end point protection.
This content is provided by an external author without editing by Finextra. It expresses the views and opinions of the author.
David Smith Information Analyst at ManpowerGroup
20 November
Konstantin Rabin Head of Marketing at Kontomatik
19 November
Ruoyu Xie Marketing Manager at Grand Compliance
Seth Perlman Global Head of Product at i2c Inc.
18 November
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.