IP Address
The usual victim's IP address/location, overall generating from known networks (the IP address is the victim's ISP address, and not the remote attacker's).
So-called "Fake Support" attacks target individuals and companies alike. The remote attacker, pretending to call in the name of a financial institution support, or a generic vendor support (e.g., Microsoft), asks the victim to install a remote controlling application (such as TeamViewer, AnyDesk, etc.). The victim is persuaded to follow the instructions from the attacker, as they seem to try to fix computer problems (which are typical) or checking if all is well following an update on the financial institution end. The attacker pretends to want to assist the victim in making sure that they can still access the e-banking portal and perform transactions.
Once the “test” transaction is submitted successfully, the attacker takes control of the victim's machine through the remote software, asks the victim to leave the computer on for a few minutes, and proceeds to perform a number of payments, typically to the same money mule account.
The attack is successful, for a number of reasons. First of all, the fraud detection engine of the financial service typically works on the following data points: IP addresses/location, Abnormal user behavior, Unknown recipients whitelisting. Second, unlike remote phishing attacks, or session hijacking attacks, this information is reported to the fraud engine.
The usual victim's IP address/location, overall generating from known networks (the IP address is the victim's ISP address, and not the remote attacker's).
The victim performs standard operations, such as entering a new payment and approving it when the step-up process is initialized, including performing the relevant MFA step.
Following the first payment, the money mule account is whitelisted and, no additional steps are required for performing subsequent transactions to the money mule account.
Futurae has developed a JavaScript component (blitz.js) that can be installed in the financial services e-banking portal. Blitz will record anonymized user details and activity and submit them to the Futurae processing server. The server constantly feeds on the received information and uses a trained algorithm to detect if the interaction happening on the e-banking website is local or from a remote actor. The Futurae server feedbacks to the Blitz component in real time when an attack is detected, and internally logs suspicious activity.
The feedback loop can be performed backend to frontend (typically used during PoC), or backend to backend (typically used for production systems). Furthermore, the solution can also be integrated with existing fraud detection mechanisms already in use by the financial institution.
The blitz.js component needs to be embedded on the e-banking website pages and initialized with a random identifier, that persists throughout a user session. We refer to the technical documentation for a correct initialization and usage.
The JavaScript component will perform the following operations, reporting to the Futurae server:
It will hook into the keypress and mouse movement events triggered by the user's browser, accumulate them in local storage, and report them in the following form: "key up", "key down", "mouse movement", "(x,y) coordinates", timestamp
The Blitz JavaScript operations have been tested on a variety of browsers (Chrome, Firefox, Safari, Opera, Internet Explorer down to IE11). Incompatible browsers would fail gracefully, with no degradation on user's experience (and, clearly, no possibility of attack detection).
The Futurae Server accepts incoming measurements only when properly authorized by a shared API key. For each session that is created, the server measures a variety of analytics and reports back through the feedback loop channel whether a remote user is interacting with the website.
The Futurae server does not store any sensitive user information or Personally identifiable information and is hosted on a FINMA-compliant Swiss cloud data center.
The best way to understand it all is to book a demo. Our team is proud to provide you with the best security design tailored to your needs, your users, and your vision.
Book a Demo Contact Sales