Page 26 - GS240101_Flipbook
P. 26

Co  v er St o r y
                                                      CoverStory

        driven by real-time payments. "The world is increasingly   he said, machine learning is becoming adept at reverse en-
        digital with more payment methods than ever before so   gineering code, which will help merchants and providers
        what was a simple matter of complexity will get ever more   verify and authenticate consumers and transactions.
        intricate," he said. "Factor in the volume of payments too;
        across the board the number of transactions using debit   Advanced, automated attacks
        cards is increasing, for example there were 2.2 billion debit   Jeff Zitomer, senior director, product management, emerg-
        card transactions in July 2023, 4.9 percent more than the   ing products at HUMAN, has observed that half of today's
        same period the year before."                           internet traffic is made up of bots. There are positive bots,
                                                                he said, such as Google's crawler, and there are malevolent
        Businesses need to meet this upward trajectory through-  bots that use advanced, automated technologies to attack
        out 2024, Dawson stated, noting that preparedness and   websites in ways that are difficult for service providers
        finding the right regulatory, security, processing and ac-  and end-users to detect. "Think of the Facebook 'Like' but-
        quiring partners will be key to success in the coming year.   ton, the checkout with PayPal button or the Klarna buy
        Payments are increasingly swift and convenient for shop-  now pay later button," he said. "These buttons use JavaS-
        pers, but underneath the surface they are vastly complex,   cript from PayPal, Klarna, Facebook, Pinterest and TikTok.
        with even the simplest transaction going through a num-  Then Google Analytics and advanced analytics vendors
        ber of different processes and entities before it is complete,   record these sessions and provide product managers with
        he added.                                               heat maps of where users are clicking on sites."

        Troy Leach, chief strategy officer at Cloud Security Al-  Through it all, he noted, JavaScript scrapes and records
        liance, agreed organizations must prepare for massive   user data, including payment card data and login creden-
        regulatory changes, particularly  regarding  third-party   tials, which advertisers leverage to retarget users with re-
        service providers, generative AI and geo-political impacts   cently viewed items. These activities use scripts that load
        on global cross-border payments.                        dynamically from across the internet, bypassing change
                                                                management and security controls while relying on third
        "For regulation, it will be looking at cloud and other ser-  party providers and leaving original website owners with
        vices that financial services are reliant upon and matur-  little to no control over what's running on end-user brows-
        ing demonstration to regulators of their resiliency," he   ers, he said.
        said.  "We already have clear expectations from DORA
        [Digital Operational Resiliency Act] in Europe with en-  PCI DSS v4.0 addressed these issues, Zitomer noted, with
        forcement planned for 2025-2026. PCI DSS v4.0 has many   the following requirements:
        new requirements for 'multi-tenant service providers,' and
        the U.S. Treasury along with several other U.S. federal     • Requirement 6.4.3: requires merchants to confirm
        agencies have begun work on exploring the role and influ-     scripts are authorized, have integrity and are in-
        ence of cloud service providers in critical infrastructure."   ventoried with written justification as to why each
                                                                      script is necessary.
        Human, artificial intelligence
                                                                    • Requirement 11.6.1: requires merchants to deploy
        Leach also expects generative AI to impact customer jour-     change and tamper detection mechanisms that alert
        neys in 2024. "We will likely see more code developed by      personnel when http headers and page content are
        machine learning that is truly built with security in the     modified without authorization, including those
        design, but we will also see faster exploits of known vul-    who outsource payment processing to  third-party
        nerabilities," he stated. Unfortunately, he noted, fraudsters   payment service providers.
        will also deploy AI-driven attacks, which will require a   Shadow APIs
        proportional response driven by machine learning and
        human intelligence rather than manual gatekeeping.      Unknown and unmanaged APIs, also called "shadow
                                                                APIs," pose security risks, as well, according to Laurent
        Crime-as-a-service offers AI tools to novice criminals with   Van Huffel, senior vice president, financial services at
        little technical knowledge, Leach noted, stating easy-to-  Axway. Citing the Cequence 2022 API Protection Report, he
        use interfaces like FraudGPT and WormGPT enable newly   noted that sophisticated attackers study APIs and exploit
        minted criminals to deploy a variety of scams and fraudu-  security flaws, such as weak authentication and excessive
        lent attacks at scale.                                  data exposure, while eluding detection.

        "Generative AI will create unique, well-crafted social en-  "Shadow API was the leading source of API security risks,
        gineering attacks that are much harder to detect, at a vol-  followed by API abuse or OWASP API10+ and the 'Unholy
        ume and quality never before seen," he said. "This includes   Trinity' of credential stuffing, shadow API and sensitive
        easy ways to circumvent several forms of bio-authentica-  data exposure," he said, adding that these risks highlight
        tion and to spoof people in authority using video and au-  the need for organizations to have visibility and control
        dio representations from credible-looking sources." In this   over all APIs. Protecting APIs will be critical in open
        climate, authentication will be disrupted like never before,   banking, Van Huffel said, adding that the Consumer Fi-
        Leach added, underscoring the need for multi-factor au-  nancial Protection Board's proposed personal data finan-
        thentication at all points of interaction. On the bright side,   cial rights rule, which is slated for enforcement in 2024,
        26
   21   22   23   24   25   26   27   28   29   30   31