• 2025
  • April - 3 articles
  • March - 14 articles
  • February - 16 articles
  • January - 15 articles
  • 2024
  • December - 15 articles
  • November - 15 articles
  • October - 20 articles
  • September - 17 articles
  • August - 20 articles
  • July - 18 articles
  • June - 20 articles
  • May - 22 articles
  • April - 12 articles
  • March - 14 articles
  • February - 13 articles
  • January - 11 articles
  • 2023
  • December - 12 articles
  • November - 12 articles
  • October - 16 articles
  • September - 11 articles
  • August - 13 articles
  • July - 13 articles
  • June - 13 articles
  • May - 12 articles
  • April - 11 articles
  • March - 15 articles
  • February - 12 articles
  • January - 13 articles
  • 2022
  • December - 14 articles
  • November - 12 articles
  • October - 11 articles
  • September - 12 articles
  • August - 13 articles
  • July - 13 articles
  • June - 13 articles
  • May - 12 articles
  • April - 12 articles
  • March - 14 articles
  • February - 12 articles
  • January - 13 articles
  • 2021
  • December - 15 articles
  • November - 12 articles
  • October - 14 articles
  • September - 11 articles
  • August - 15 articles
  • July - 12 articles
  • June - 14 articles
  • May - 12 articles
  • April - 14 articles
  • March - 15 articles
  • February - 11 articles
  • January - 11 articles
  • 2020
  • December - 14 articles
  • November - 11 articles
  • October - 13 articles
  • September - 11 articles
  • August - 9 articles
  • July - 11 articles
  • June - 16 articles
  • May - 13 articles
  • April - 13 articles
  • March - 17 articles
  • February - 10 articles
  • January - 12 articles
  • 2019
  • December - 12 articles
  • November - 11 articles
  • October - 12 articles
  • September - 12 articles
  • August - 14 articles
  • July - 11 articles
  • June - 12 articles
  • May - 14 articles
  • April - 12 articles
  • March - 14 articles
  • February - 14 articles
  • January - 17 articles
  • 2018
  • December - 14 articles
  • November - 13 articles
  • October - 17 articles
  • September - 14 articles
  • August - 14 articles
  • July - 19 articles
  • June - 17 articles
  • May - 18 articles
  • April - 20 articles
  • March - 18 articles
  • February - 18 articles
  • January - 19 articles
  • 2017
  • December - 19 articles
  • November - 16 articles
  • October - 19 articles
  • September - 21 articles
  • August - 22 articles
  • July - 17 articles
  • June - 19 articles
  • May - 20 articles
  • April - 18 articles
  • March - 20 articles
  • February - 13 articles
  • January - 6 articles
  • 2016
  • December - 10 articles
  • November - 9 articles
  • October - 8 articles
  • September - 10 articles
  • August - 10 articles
  • July - 8 articles
  • June - 11 articles
  • May - 8 articles
  • April - 11 articles
  • March - 11 articles
  • February - 11 articles
  • January - 9 articles
  • 2015
  • December - 13 articles
  • November - 13 articles
  • October - 14 articles
  • September - 13 articles
  • August - 11 articles
  • July - 12 articles
  • June - 14 articles
  • May - 11 articles
  • April - 12 articles
  • March - 12 articles
  • February - 12 articles
  • January - 9 articles
  • 2014
  • December - 10 articles
  • November - 9 articles
  • October - 13 articles
  • September - 12 articles
  • August - 13 articles
  • July - 14 articles
  • June - 10 articles
  • May - 14 articles
  • April - 15 articles
  • March - 17 articles
  • February - 14 articles
  • January - 18 articles
  • 2013
  • December - 20 articles
  • November - 18 articles
  • October - 21 articles
  • September - 19 articles
  • August - 21 articles
  • July - 22 articles
  • June - 20 articles
  • May - 23 articles
  • April - 26 articles
  • March - 24 articles
  • February - 29 articles
  • January - 24 articles
  • 2012
  • December - 22 articles
  • November - 24 articles
  • October - 27 articles
  • September - 27 articles
  • August - 25 articles
  • July - 22 articles
  • June - 20 articles
  • May - 28 articles
  • April - 24 articles
  • March - 28 articles
  • February - 24 articles
  • January - 24 articles
  • 2011
  • December - 24 articles
  • November - 18 articles
  • October - 21 articles
  • September - 21 articles
  • August - 21 articles
  • July - 20 articles
  • June - 23 articles
  • May - 27 articles
  • April - 22 articles
  • March - 22 articles
  • February - 16 articles
  • January - 20 articles
  • 2010
  • December - 21 articles
  • November - 18 articles
  • October - 20 articles
  • September - 13 articles
  • August - 11 articles
  • July - 9 articles
  • June - 8 articles
  • May - 9 articles
  • April - 11 articles
  • March - 12 articles
  • February - 10 articles
  • January - 10 articles
  • 2009
  • December - 11 articles
  • November - 9 articles
  • October - 11 articles
  • September - 10 articles
  • August - 10 articles
  • July - 10 articles
  • June - 10 articles
  • May - 11 articles
  • April - 13 articles
  • March - 13 articles
  • February - 7 articles
  • January - 10 articles
  • 2008
  • December - 12 articles
  • November - 8 articles
  • October - 16 articles
  • September - 11 articles
  • August - 13 articles
  • July - 13 articles
  • June - 14 articles
  • May - 13 articles
  • April - 13 articles
  • March - 9 articles
  • February - 14 articles
  • January - 11 articles
  • 2007
  • December - 11 articles
  • November - 12 articles
  • October - 12 articles
  • September - 4 articles
  • August - 4 articles
  • July - 4 articles
  • June - 2 articles
  • May - 6 articles
  • April - 5 articles
  • March - 1 article
  • Tuesday, December 22, 2020

    Brace for heightened fraud in 2021, experts warn

    Shock reverberated nationwide on Dec. 13, 2020, when the Cybersecurity and Infrastructure Security Agency published an advisory detailing how cybercriminals—identified by U.S. National Security analysts as Russian state-sponsored cyber actors—had breached the highest levels of the U.S. government. Analysts, have said, however, that numerous cyber criminals are on the hunt, creating a new normal of heightened cyber assaults on businesses and governments alike.

    The advanced persistent threat (APT) began in March 2020, when adversaries employed a series of tactics, techniques and procedures (TTP) to escape detection as they infiltrated numerous government departments.

    "The adversary is using a complex network of IP addresses to obscure their activity, which can result in a detection opportunity referred to as 'impossible travel,'" CISA analysts wrote. "Impossible travel occurs when a user logs in from multiple IP addresses that are a significant geographic distance apart (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the time period between the logins)."

    CISA analysts also detected "impossible tokens" that were neither linked to legitimate users nor used within their hour of issuance. These anomalies raised concerns among investigators that key personnel, IT email accounts and operational security agencies had been compromised. An alert, posted Dec. 21, 2020, called for increased operational security measures to ensure all staff members are sufficiently aware of "applicable handling caveats," CISA administrators stated.

    Multiple vulnerabilities

    A Dec. 7, 2020, bulletin from the U.S. National Security Agency, traced the APT to March 2020, when bad actors exploited vulnerabilities in VMware products. "Russian state-sponsored malicious cyber actors are exploiting a vulnerability in VMware Access and VMware Manager products, allowing the actors access to protected data and abusing federated authentication," NSA analysts wrote, adding that VMware released a patch for the Command Injection Vulnerability on Dec. 3, 2020, approximately nine months after criminals had gained access to classified government departments and data.

    CISA forensic investigators are pursuing evidence of initial access vectors in March 2020, when bad actors injected malware into SolarWinds, an enterprise network software suite used by select government agencies. The audit trail suggests the adversary may have more TTP and attack vectors to deploy, CISA stated.

    Formidable enemy

    CISA further noted that the attacker collected information from victim environments by "compromising the SAML signing certificate using their escalated Active Directory privileges." Key systems that use SAML include hosted email services, hosted business intelligence applications, travel systems, timecard systems and file storage services such as SharePoint, according to the CISA advisory.

    Shelly Palmer, business consultant and technology advisor, published What You Should Know About the SolarWinds Hack, on Dec. 20, 2020, urging organizations to protect internet-facing systems. "A security system is only as secure as the third-party-provided FTE who writes their password on a Post-it note," Palmer wrote.

    Palmer added that the high-profile cyberattack highlights the need for formal document classification. Implement cybersecurity protocols to protect the most sensitive documents, he stated, and buy cybersecurity insurance to cover the rest.

    New normal fraud

    On Dec. 15, 2020, Arkose Labs hosted a webinar titled 7 Top Fraud Trends in 2021 and Beyond. The session featured Johnny Ayers, founder and CEO at Socure and Kevin Gosschalk, founder and CEO at Arkose Labs, who made the following predictions:

    Ayers proposed that the digital world has created a complex, dynamic landscape for consumers and merchants as well as a potential goldmine for cybercriminals. "I think that you're going to continue to see these really creative phishing and social engineering attacks, just because there's a lot of unsuspecting government agencies and consumers," he said, adding that privacy regulations can make it more difficult for organizations to authenticate legitimate consumers.

    Gosschalk agreed, stating, "[T]hat's a fascinating point: as consumers become more privacy centric, it makes the job of identifying bad people that much harder because it's that much easier for them to hide under the radar."

    Gosschalk went on to say that as criminals continue to exploit vulnerabilities, individuals and organizations must evaluate their digital assets to determine which products or services present money-making opportunities to criminals. Then they can figure out how to remove the attacker's financial incentive, he stated.

    Whether you want to upgrade your POS offerings, find a payment gateway partner, bone up on fintech regs or PCI requirements, find an upcoming trade show, read about faster payments, or discover the latest innovations in merchant acquiring, The Green Sheet is the resource for you. Since 1983, we've helped empower and connect payments professionals, starting with the merchant level salespeople who bring tailored payment acceptance and digital commerce tools, along with a host of other business services to merchants across the globe. The Green Sheet Inc. is also a proud affiliate of Bankcard Life, a premier community that provides industry-leading training and resources for payment professionals.

    Notice to readers: These are archived articles. Contact information, links and other details may be out of date. We regret any inconvenience.

    skyscraper ad