Scams can be complex, so let’s stop playing the blame game

As long as there has been the exchange of money, there has always been fraud. From Hegestratos, the first recorded fraudster in 350 BC Ancient Greece, to Charles Ponzi’s infamous scheme of redistributing investments, to the present day, criminals have always tried to find new and more sophisticated ways to dupe people out of their money.

Authorized Push Payments are the new big thing

For a long time, the blame has fallen on those defrauded. But the Financial Ombudsman Service has been making noise of late that this could be about to change, especially concerning APPS. Authorized Push Payments (APPs) are a type of scam that encourages someone, either an individual or business, to transfer money from their own account to a seemingly legitimate account. Once this is done, the money is usually quickly transferred to other accounts and out of the country, making it hard to recover.

In 2018, news broke of an APPS scam hitting a cancer patient and her elderly mother. They lost over £20,000 and their ability to pay for her care home. Wrongly or rightly, the bank claimed it was not liable. At that time, it was at the discretion of the bank to decide whether or not to reimburse the defrauded account. Should banks decide that the account owner was careless and grossly negligent for falling for the scam, they could refuse to reimburse the tricked customer.

The Financial Ombudsman Service later said, however, that this was unfair, hence banks now have to provide evidence that the consumers scammed were in fact grossly negligent. But before we start playing the blame game, let’s look at the bigger picture.

In 2017, 56% of fraud in the UK was cyber-related

These scams aren’t just a promise for fortune from a questionable ‘Nigerian Prince’, but rather, increasingly elaborate and realistic schemes. The reason for the growing complexity of user-targeted fraud is that criminals always pick on the weakest link. Where once this may have been the banks themselves, today banks and building societies have many security protocols in place to help prevent crime. According to UK Finance, they stopped £2 for every £3 in attempted fraud in 2017.

As it’s become more difficult and expensive to target the tech itself, it’s no wonder that fraudsters are going after customers with renewed vigour, in a manner that would make Hegestratos proud. By manipulating the insecure behavior of people, they manage to bypass what are otherwise secure systems. That’s why the FOS has also warned that people must adopt simple behaviors, such as not writing your PIN on the front of your credit card or automatically taking unsolicited email communications purporting to be from your bank at face value.

There should never be a single point of vulnerability, layering up is key

We don’t know how much the burden of responsibility will shift from customer to bank in the future, but what’s apparent is that further user education must be combined with a layered approach to cybersecurity across all business/consumer relationships – i.e. there’s never a single point of vulnerability for criminals to exploit. This of course will mean there’s no single point of culpability either.

Whether it’s a combination of two-factor authentication, biometrics, adoption of email protocols such as DMARC, security awareness training, the creation and enforcement of tighter policies and procedures, etc, the specifics may differ from organisation to organisation, but the rationale should remain consistent. Namely, we need to make the tech better to deal with these attacks, and humans less vulnerable. Ultimately, we need to adopt an attitude of shared responsibility for improving our defences, rather than just assigning blame when those defences are breached.

Find out more about Red Sift

Keen to find out more about Red Sift, what we do, and how our products help businesses keep their email infrastructure, employees, and domains secure? Get in touch with us below!

Get in touch

PUBLISHED BY

Clare Holmes

6 Sep. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
DMARC

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail…

Francesca Rünger-Field

Navigating G-Cloud 14 for DMARC solutions: A guide for former NCSC Mail Check users With the NCSC discontinuing key features of its Mail Check service, including DMARC aggregate and TLS reporting, after March 2025, UK public sector organisations must prepare for this change by transitioning to alternative email security solutions. To support this shift,…

Read more
DMARC

Mail Check is changing: What UK public sector organisations must know about…

Jack Lilley

The National Cyber Security Centre (NCSC) has suggested a change to Mail Check services starting on 24 March 2025. This change mainly involves ending DMARC aggregate reporting. This change comes as a measure to expand the services provided by Mail Check to any UK based organisation, while also limiting the cost and complexity of…

Read more
DMARC

Beyond DMARC: How Red Sift OnDMARC supports comprehensive DNS hygiene

Red Sift

Registrable domains and DNS play a crucial role in establishing online identity and trust, but their importance is often taken for granted. During new service setups, record updates are often overlooked, accumulating outdated entries. As infrastructure teams become increasingly overstretched,  services may be incorrectly shut down without proper cleanup, leaving behind a sprawl of…

Read more
DKIM

First look at DKIM2: The next generation of DKIM

Red Sift

In 2011, the original DomainKeys Identified Mail (DKIM1) standard was published. It outlined a method allowing a domain to sign emails, enabling recipients to verify that the email originated from an entity holding a private key that matches the public key published in the domain’s DNS records. Now in 2024, DKIM is ready for…

Read more