online financial fraud infographic

1
of users regularly access online financial services 2 carry out financial operations from mobiles and only 42% use mobile protection 2 Internet dangers: PHISHING Computer dangers: TROJANS When visiting sites, reading emails When using infected sites, outdated software, suspicious links and attachments When using unprotected connections or Wi-Fi hotspots A fake letter from a bank or other payment system asking for account credentials of users received suspicious emails like this 2 FAKE BANKING FORMS Trojans intercept keystrokes or take screenshots, capturing sensitive info from regular or virtual keyboards. The Zbot Trojan is one of the most prominent examples. COLLECTING DATA WHEN IT’S ENTERED attacks with Zbot were recorded by Kaspersky Lab in 2013 1 USING WEB INJECTION Many mobile Trojans work in tandem with their big brothers to intercept data from phones: Carberp-in-the- Mobile, Zeus-in-the-Mobile, etc. more unique malware samples for Android OS were detected in 2013 1 BYPASSING TWO-FACTOR AUTHENTICATION A fake site invites users to submit their account credentials. The link imitates a real URL but leads to a phishing website of phishing sites mimic banking, financial and e-pay organizations 1 FAKE BANKING WEBSITES On unprotected Wi-Fi networks all data can be intercepted. Data on the screen can also be modified of public Wi-Fi users take no specific measures to protect themselves 2 TRAFFIC INTERCEPTION 23M URL to IP mapping is vital to web security. Modifying these settings can result in trusted URLs directing users to phishing sites users faced phishing attacks in 2013 1 DNS/PROXY SPOOFING Hacking banks is difficult – that's why criminals prefer to attack their customers Users are soft targets for financial cybercrime 1 800 000 users worldwide encountered financial malware attacks in 2013 1 don’t check website security when they enter confidential data 2 Holders of online bank accounts can be targeted in a number of ways: How can cybercriminals steal money from users? Connection dangers: INTERCEPTION 0 20 10 30 5 25 15 35 Trojans prompt users to enter data into rogue fields on legitimate pages. They can also imitate screens such as a list of user transactions or a simple “Blue screen” 30% 30% 34 % 34 % 21 % 21 % 98 98 % 28 % 28 % 38 % 38 % 1 Kaspersky Security Network 2 Consumer Security Risks Survey 2013, B2B International 3 According to the Security Service of Ukraine 268 % was stolen by cybercriminals using the Carberp Trojan in 2013 3 $250M ONLINE FINANCIAL FRAUD HOW CYBERCRIMINALS STEAL MONEY FROM USERS’ BANK ACCOUNTS 8M © 1997-2014 KASPERSKY LAB

Upload: prayukth-k-v

Post on 17-Jun-2015

173 views

Category:

Business


3 download

DESCRIPTION

Hacking banks is difficult..which is why hackers are targeting customers...

TRANSCRIPT

Page 1: Online financial fraud infographic

of users regularly access online�nancial services2

carry out �nancial operations from mobiles and only 42% use mobile protection2

Internet dangers:

PHISHING

Computer dangers:

TROJANS

When visitingsites, reading

emails

When usinginfected sites,

outdated software,suspicious links

and attachments

When usingunprotectedconnections orWi-Fi hotspots

A fake letter from a bank or other payment systemasking for account credentials

of users receivedsuspicious emailslike this2

FAKE BANKING FORMS

Trojans intercept keystrokes or take screenshots,capturing sensitive info from regular or virtualkeyboards. The Zbot Trojan is one of the most

prominent examples.

COLLECTING DATAWHEN IT’S ENTERED

attacks with Zbot were recorded byKaspersky Lab in 20131

USING WEBINJECTION

Many mobile Trojans work in tandemwith their big brothers to interceptdata from phones: Carberp-in-the-

Mobile, Zeus-in-the-Mobile, etc.

more unique malware samples forAndroid OS were detected in 20131

BYPASSING TWO-FACTORAUTHENTICATION

A fake site invites users to submit their accountcredentials. The link imitates a real URL but leadsto a phishing website

of phishing sitesmimic banking,�nancial and e-payorganizations1

FAKE BANKING WEBSITES

On unprotected Wi-Fi networks all data can beintercepted. Data on the screen can also be modi�ed

of public Wi-Fi userstake no speci�cmeasures toprotect themselves2

TRAFFIC INTERCEPTION

23MURL to IP mapping is vital to web security.Modifying these settings can result in trusted URLsdirecting users to phishing sites

users faced phishingattacks in 20131

DNS/PROXY SPOOFING

Hacking banks is di�cult – that's why criminals prefer to attack their customersUsers are soft targets for �nancial cybercrime

1 800 000users worldwide encountered �nancial malware attacks in 20131

don’t check website security when they enter con�dential data2

Holders of online bank accounts can be targeted in a number of ways:How can cybercriminals steal money from users?

Connection dangers:

INTERCEPTION

0

20

1030

5

25 15

35

Trojans prompt users to enter data into rogue�elds on legitimate pages. They can also imitate screens

such as a list of user transactions ora simple “Blue screen”

30%30% 34%34%

21%21%

98%98% 28%28% 38%38%

1 Kaspersky Security Network 2 Consumer Security Risks Survey 2013, B2B International 3 According to the Security Service of Ukraine

268%was stolen by cybercriminals using

the Carberp Trojan in 20133

$250M

ONLINE FINANCIAL FRAUDHOW CYBERCRIMINALS STEAL MONEY FROM USERS’ BANK ACCOUNTS

8M

© 1997-2014 KASPERSKY LAB