Skip to main content

Look out for These Four 2012 Bank Fraud Trends

May 30, 2012

Credit Card Fraud:

This is another scam that allows fraudsters to use stolen pre-paid gift cards to steal your money. Fraudsters will begin by demagnetizing the magnetic strip (rendering the card useless), apply a chemical wash to remove the printed card number and then re-embossing the card with valid information from a purchased list of compromised credit cards. With this method, the card swipe fails at the POS, but the retail associate is happy to key in the transaction manually and viola … high-tech (and easy) credit card fraud.

Phishing Schemes Continue:

Phishing scams have been impacting financial institutions for over six years and, during this time, they have become increasingly complex and convincing.

  • Phishing attacks impact all account holders; however, the majority of attacks will continue to focus on commercial accounts and businesses. These accounts are targeted due to the nature of the account -- most commercial accounts will contain larger amounts of money that can become a quick and easy target to criminals who can easily initiate money transfers via wire transfers or ACH.
  • It has become increasingly difficult for customers to discern real bank communication from phishing attempts. The best defense against a phishing outbreak continues to be customer education, password complexity and aging policies. It seems like a small thing, but where phishing is concerned, regular password changes can dramatically reduce the chance of compromised credentials being used to commit fraud.

Outsourced Processing:

Many financial institutions have turned to third-party transaction processing networks to manage transaction processing. This provides a cost-effective means to handle the processing volume but also adds to the overall risk to the organization that is often overlooked through standard security practices and validation.

Organizations cannot assume that these third party providers are practicing the same level of security for these hosted systems.  This is an area where it pays to conduct a thorough security assessment to ensure these remotely connected systems are adequate to protect your sensitive customer transaction data.

Insider Threat:

This year we have watched headline news reports detailing the results of insider fraud impacting several larger organizations. According to expert Tom Wills, senior security and fraud analyst at Javelin Strategy & Research, next year doesn't look any better. As organizations continue to “outsource” computing and transaction processing to outside organizations in what RSA refers to as "the hyper extended enterprise," an insider is no longer just an immediate employee or hired contractor -- he or she has to now be viewed as anyone with authorized access to the bank's network resources, suppliers and partners as well.

    6Labs Experts

By: 6Labs Experts

Research and Industry thought leadership

See More

Related Blogs

May 10, 2018

Observations on Smoke Tests – Part 3

While attending one of our technology partner’s security training courses, the instructor presented on their product’s various features and capabiliti...

See Details

April 20, 2018

Customization of IAM Solutions: Risks of Having it Your Way

Forty years ago Burger King launched a revolution in customization, declaring that they could provide you the power of creating your perfect burger co...

See Details

April 18, 2018

Testing Password Reset Token Predictability with the Reset-A-Tron Burp Extension

Most web applications provide a 'forgot my password' feature where a recovery or reset token is delivered to the associated account email address. Usu...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy


January 24, 2018

Identity and Access Management Capabilities

We can help enable your business while reducing risk.

See Details

July 21, 2015

Network Security Solutions

Learn how we help protect your environment while maintaining connectivity.

See Details

September 20, 2017

PCI Compliance

Go beyond the PCI compliance checklist.

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.