One of 'the big four' British banks halts internet 
      services
     
      news alert
        
        Sophisticated phishing scams erode confidence and automatic compensation 
        
     
   
  London, UK - 18 November 2004, 14:15 GMT - One of the UK's largest 
    banks has been forced to suspend some of its online banking services after 
    tens of thousands of customers were targeted by an email phishing scam. The 
    Financial Services Authority (FSA), the UK financial services regulator, had 
    warned last week that banks would have to step up preventive measures against 
    phishing. There are about 14 million online banking customers in the UK and 
    growing. 
    
    Over the weekend, there have been reports that several British banks will 
    stop compensating their customers for online financial fraud if they are found 
    to be negligent or reckless. For example, those users who are considered to 
    have ignored safety advice before losing money in online banking scams would 
    be denied compensation by banks. 
    
    NatWest - part of the The Royal Bank of Scotland and one of 'the big four' 
    - has as of yesterday stopped roughly one million online customers from setting 
    up new direct debits or standing orders in response to escalating and increasingly 
    sophisticated techniques deployed by fraudsters to steal personal banking 
    details by email.
    
    Customers at NatWest had reported that they had been sent bogus emails asking 
    them to divulge their personal details. The bank was left with no choice other 
    than to respond by shutting down certain key services. With new third-party 
    payments and standing orders currently on hold, any fraudster who had managed 
    to pick up a customer's personal details would not be able to move any money. 
    Customers have been advised to use other methods to set up such payments, 
    such as telephone banking, in the meantime. Banks have noticed a sharp increase 
    in the number of phishing emails sent by criminal syndicates over the past 
    year. In the scams, fraudsters invariably demand that recipients of emails 
    provide personal details, which amounts to identity theft.
    
    Ever since savvy online banking users have started to understand the modus 
    operandi of phishing scams, the criminal syndicates are sending out new types 
    of Trojans. Once the malware infects a Windows PC, it silently lies in the 
    background, waiting for the user to go to an online banking web site. Once 
    the Trojan detects that the browser is on a banking site, it comes alive and 
    begins capturing key strokes and appropriate screen images. The information 
    is then sent back to the criminal syndicate, which uses it to break into the 
    account. 
    
    There is a new phishing Trojan being distributed via email that hijacks users' 
    banking information, allowing hackers to empty their accounts. So far this 
    new type of Trojan has swept Brazil, where some arrests have been made, and 
    then the UK. The online customers of Barclays, HSBC, LloydsTSB and NatWest 
    have so far been targeted. The mi2g Intelligence Unit anticipates that it 
    will target Australian, US and Canadian bank users shortly, judging by the 
    phishing scams' geographic proliferation in 2003. The Trojan, once installed, 
    can sniff the user's name, password, and PIN number. The controllers of the 
    Trojan can then potentially do as they please with the bank account. 
    
    Simple rules to avoid falling for those scams include never responding to 
    e-mails asking for the user's security details and not to access the online 
    banking website via a link made available through an e-mail.
    
    Phishing scams recorded in 2004 against major banks and brand names have hit 
    an all time high of 137 major campaigns as opposed to 54 such high level incidents, 
    the mi2g Intelligence Unit chronicled for the whole of 2003. The total economic 
    damage from phishing scams worldwide is now estimated to lie between $42bn 
    and $49bn for 2004. Digital risk damages are calculated by the mi2g Intelligence 
    Unit on the basis of helpdesk support costs, overtime payments, contingency 
    outsourcing, loss of business, bandwidth clogging, productivity erosion, management 
    time reallocation, cost of recovery and software upgrades. When available, 
    Intellectual Property Rights (IPR) violations as well as customer and supplier 
    liability costs have also been included in the estimates.
    
    "There is a very clear path to solve the 
    phishing problem and it must be followed swiftly before it is too late. All 
    online customers should be authenticated in three layers through something 
    that they know, something that they carry and something that they are. This 
    is not happening at present." said DK 
    Matai, Executive Chairman, mi2g. "Unless 
    passwords and personal knowledge is coupled with smart card validation and 
    biometric authentication, these scams will continue to proliferate. This problem 
    is not just about money. It is first and foremost about identity theft and 
    the sense of total vulnerability it leaves victim customers with."
    
    [ENDS]
     
   
    mi2g is at the leading edge of building secure on-line banking, broking 
    and trading architectures. The principal applications of our technology are:
    
    1. D2-Banking; 
    2. Digital Risk Management; and 
    3. Bespoke Security Architecture.
    
    mi2g pioneers enterprise-wide security practices and technology to 
    save time and cut cost. We enhance comparative advantage within financial 
    services and government agencies. Our real time intelligence is deployed worldwide 
    for contingency capability, executive decision making and strategic threat 
    assessment.
    
    mi2g Research Methodology: The Frequently Asked Questions (FAQ) List 
    is available from here in pdf. Please 
    note terms and conditions of use listed on 
    www.mi2g.net
  
  Full details of the October 2004 report are available as of 1st November 
    2004 and can be ordered from here. 
    (To view contents sample please click here).