Company: IBM United Kingdom Limited
Category: Risk Systems
Published: 22 June 2015
There's no silver bullet when it comes to stopping fraud. As financial institutions have deployed more sophisticated security solutions, criminals have created more complex and evasive tactics to bypass bank security and steal funds.
In fact, recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-f actor authentication, device ID systems, risk engines and behavioural analytic systems.
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction's lifecycle - pre- login, during login and post-login - and offers strategies to help financial organizations combat malware-driven attacks.