Blog Posts Process Analysis

Social Engineering and Push Payment Fraud – Who Should Pay?

Blog: Enterprise Decision Management Blog

Mobile transaction image with HACKED on it

In a previous blog I wrote about authorized push payment fraud and how social engineering leads to victims making inadvertent payments to fraudsters. I highlighted the case for banks to use behavioral analytics to identify suspicious payments before they are made. This is particularly important when an irrevocable, real-time payments scheme such as UK Faster Payments or SEPA CT Inst is used.

While the focus has often been on recovering losses from the bank of the victim, there are also instances where victims and authorities look to the receiving bank for recompense. Their case is that the receiving bank has been negligent in their account-opening procedures and opened an account for a fraudster using a stolen or synthetic identity. This account has then been used to accept the proceeds of the authorized push payment fraud.

In a recent case  a victim paid what they believed to be an invoice from their builder, only to find it wasn’t their builder they’d paid but a fraudster who had intercepted the invoicing process. In another case a victim transferred £4K from his bank account to buy a shepherd’s hut on Ebay. The hut never materialised and the payment made by bank transfer had gone to a fraudster. In both cases it appears that the fraudster had opened a bank account using either a stolen or synthetic identity; this bought the account-opening processes at the receiving banks into question.

On the surface it seems like an obvious answer – the receiving bank takes responsibility for the behavior of fraudsters they should not have opened accounts for, particularly when the account was opened using a stolen or synthetic identity. But this does not solve the problem of authorized push payment fraud for a number of reasons:

The Which Super Complaint shows that consumers are increasingly looking to banks to solve the issue of authorised push payment fraud. Even in cases where banks may not consider themselves to be liable, negative publicity and loss of reputation is significant. Consumers have been given the welcome ability to make irrevocable, real-time payments, but individuals are not equipped to deal with all of the consequences. For example they cannot spot patterns across thousands of payments that indicate fraud — but their bank could.

At present many banks look at application fraud, payment fraud and account takeover fraud in silos. This story illustrates the same fraud can take advantage of weaknesses at any point. By looking at fraud in a more holistic manner across the entire enterprise, banks can be better prepared to stop fraud at all stages of the customer and payment lifecycles.

FICO has been leading the way in taking an enterprise-wide approach to fraud detection and management using the industry-leading FICO Falcon fraud Platform.

For more on application fraud, see the posts from my colleague Liz Lasher.

The post Social Engineering and Push Payment Fraud – Who Should Pay? appeared first on FICO.

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/social-engineering-and-push-payment-fraud-who-should-pay/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×