Scams can be complex, so let’s stop playing the blame game

As long as there has been the exchange of money, there has always been fraud. From Hegestratos, the first recorded fraudster in 350 BC Ancient Greece, to Charles Ponzi’s infamous scheme of redistributing investments, to the present day, criminals have always tried to find new and more sophisticated ways to dupe people out of their money.

Authorized Push Payments are the new big thing

For a long time, the blame has fallen on those defrauded. But the Financial Ombudsman Service has been making noise of late that this could be about to change, especially concerning APPS. Authorized Push Payments (APPs) are a type of scam that encourages someone, either an individual or business, to transfer money from their own account to a seemingly legitimate account. Once this is done, the money is usually quickly transferred to other accounts and out of the country, making it hard to recover.

In 2018, news broke of an APPS scam hitting a cancer patient and her elderly mother. They lost over £20,000 and their ability to pay for her care home. Wrongly or rightly, the bank claimed it was not liable. At that time, it was at the discretion of the bank to decide whether or not to reimburse the defrauded account. Should banks decide that the account owner was careless and grossly negligent for falling for the scam, they could refuse to reimburse the tricked customer.

The Financial Ombudsman Service later said, however, that this was unfair, hence banks now have to provide evidence that the consumers scammed were in fact grossly negligent. But before we start playing the blame game, let’s look at the bigger picture.

In 2017, 56% of fraud in the UK was cyber-related

These scams aren’t just a promise for fortune from a questionable ‘Nigerian Prince’, but rather, increasingly elaborate and realistic schemes. The reason for the growing complexity of user-targeted fraud is that criminals always pick on the weakest link. Where once this may have been the banks themselves, today banks and building societies have many security protocols in place to help prevent crime. According to UK Finance, they stopped £2 for every £3 in attempted fraud in 2017.

As it’s become more difficult and expensive to target the tech itself, it’s no wonder that fraudsters are going after customers with renewed vigour, in a manner that would make Hegestratos proud. By manipulating the insecure behavior of people, they manage to bypass what are otherwise secure systems. That’s why the FOS has also warned that people must adopt simple behaviors, such as not writing your PIN on the front of your credit card or automatically taking unsolicited email communications purporting to be from your bank at face value.

There should never be a single point of vulnerability, layering up is key

We don’t know how much the burden of responsibility will shift from customer to bank in the future, but what’s apparent is that further user education must be combined with a layered approach to cybersecurity across all business/consumer relationships – i.e. there’s never a single point of vulnerability for criminals to exploit. This of course will mean there’s no single point of culpability either.

Whether it’s a combination of two-factor authentication, biometrics, adoption of email protocols such as DMARC, security awareness training, the creation and enforcement of tighter policies and procedures, etc, the specifics may differ from organisation to organisation, but the rationale should remain consistent. Namely, we need to make the tech better to deal with these attacks, and humans less vulnerable. Ultimately, we need to adopt an attitude of shared responsibility for improving our defences, rather than just assigning blame when those defences are breached.

Find out more about Red Sift

Keen to find out more about Red Sift, what we do, and how our products help businesses keep their email infrastructure, employees, and domains secure? Get in touch with us below!

Get in touch

PUBLISHED BY

Clare Holmes

6 Sep. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Cybersecurity

Strengthening U.S. political campaigns against cyber threats: The urgent need for DMARC…

Sean Costigan

Securing political campaigns from cyber threats has never been more urgent. It is critical to secure communications that handle sensitive exchanges with voters, contributors, donations and coordinate complex operations. Campaigns make exceptionally rich targets for cyber espionage and exploitation, with our open-source research, demonstrating nearly 75% of US Senate campaign websites having not achieved…

Read more
Certificates

Apple & Chrome propose reduced certificate lifetime

Jack Lilley

The lifetime of SSL/ TLS certificates continues to grow shorter. Chrome initially proposed reducing certificate lifespans to 90 days to enhance security and mitigate risks associated with compromised certificates. Apple took this initiative further, proposing a draft ballot to shorten the maximum validity period for public SSL/TLS certificates to just 45 days by 2027.…

Read more
AI

Skill up your security: How defenders can harness AI

Jack Lilley

How can defenders identify and resolve security issues faster with Red Sift Radar, and what does it have to do with the movie Tenet? That was the key theme of this year’s 16th e-Crimes & Cybersecurity Mid-Year Summit education session, featuring Billy McDiarmid. If you missed the event, don’t worry—we’ve got you covered with…

Read more
Cybersecurity

Behind the Screens: North Korea’s Focus on DMARC in Email Espionage

Sean Costigan

If you missed our recent virtual fireside chat “Behind the Screens: North Korea’s Focus on DMARC in Email Espionage,” or couldn’t attend due to geographical restrictions, we’ve got you covered.  Joined by cybersecurity experts from the Federal Bureau of Investigation (FBI) and Stanford University, together with Red Sift, the session explored how the North…

Read more