Corporate Account Takeover

What is Corporate Account Takeover?


Corporate Account Takeover is an evolving electronic crime typically involving the exploitation of businesses of all sizes, especially those with limited computer safeguards and minimal or no disbursement controls for use with their bank's online business banking system. These businesses are vulnerable to theft when cyber thieves gain access to its computer system to steal confidential banking information in order to impersonate the business and send unauthorized wire and ACH transactions to accounts controlled by the thieves. Municipalities, school districts, large non-profit organizations, corporate businesses and any customers that perform electronic transfers are potential targets. Losses from this form of cyber-crime range from the tens of thousands to the millions with the majority of these thefts not fully recovered. These thefts have affected both large and small banks.

This type of cyber-crime is a technologically advanced form of electronic theft. Malicious software, which is available over the internet, automates many elements of the crime including circumventing one time passwords, authentication tokens and other forms of multi-factor authentication. Awareness of online threats and education about common account takeover methods are helpful measures to protect against these threats. However, due to the dependence of banks on sound computer and disbursement controls of its customers, there is no single measure to stop these thefts entirely. Multiple controls or a "layered security" approach is required.


BASIC ONLINE SECURITY PRACTICES


  • Education is key – Train your employees
  • Secure your computer and networks
  • Limit administrative rights – Do not allow employees to install any software without receiving prior approval.
  • Install and maintain spam filters
  • Surf the internet carefully
  • Transmit wire transfer and ACH instructions via a dedicated and isolated device. Block access to web surfing, social network sites, external e-mail and any activity not related to banking.
  • Install and maintain real-time anti-virus and anti-spyware, desktop firewall and malware detection and removal software. Use these tools regularly to scan your computer. Allow for automatic updates and scheduled scans.
  • Install routers and firewalls to prevent unauthorized access to your computer or network. Change the default passwords on all network devices.
  • Install security updates (patches) to operating systems and all applications as they become available.
  • Block Pop-Ups
  • Use complex passwords and change them periodically.
  • Do not open attachments from e-mail. Be on the alert for suspicious e-mail.
  • Do not use public internet access points.
  • Monitor and reconcile bank accounts daily, especially near the end of the day.
  • Pay attention to suspicious activity and react quickly. Look out for unexplained account or network activity, pop-ups and suspicious e-mails. If detected, immediately contact your financial institution, stop all online activity and remove any systems that may have been compromised. Keep records of what happened.
  • Note any changes in the performance of your computer, i.e. dramatic loss of speed, computer locks up, unexpected rebooting, unusual pop-ups, etc.
  • Make sure your employees know how and to whom to report suspicious activity to at your company and the bank.

Contact the bank if you:


  • Suspect a fraudulent transaction
  • If you are trying to process an online wire or ACH batch and you receive a maintenance page.
  • If you receive an e-mail claiming to be from the bank and it is requesting personal/company information.

Incident Response Plans


Since each business is unique, customers should write their own incident response plan. A general template would include:


1. The direct contact numbers of key bank employees (including after-hours numbers);

2. Steps the account holder should consider to limit further unauthorized transactions, such as:

  • Changing passwords;
  • Disconnecting computers used for internet banking; and
  • Requesting a temporary hold on all other transactions until out-of-band confirmations can be made;

3. Information the account holder will provide to assist the bank in recovering their money;

4. Contacting their insurance carrier; and

5. Working with computer forensic specialists and law enforcement to review appropriate equipment.


Resources for Business Account Holders


1. The Better Business Bureau's website on Data Security Made Simpler:

http://www.bbb.org/datasecurity/

2. The Small Business Administration's (SBA) website on Protecting and Securing Customer Information:

http://community.sba.gov/community/blogs/community-blogs/business-law-advisor/how-smallbusiness-can-protect-and-secure-customer-information

3. The Federal Trade Commission's (FTC) interactive business guide for protecting data:

http://www.ftc.gov/bcp/edu/multimedia/interactive/infosecurity/index.html

4. The National Institute of Standards and Technology's (NIST) Fundamentals of Information Security for Small Businesses:

http://csrc.nist.gov/publications/nistir/ir7621/nistir-7621.pdf

5. The jointly issued "Fraud Advisory for Businesses: Corporate Account Takeover" from the U.S. Secret Service, FBI, IC3 and FS-ISAC available on the IC3 website:

http://www.ic3.gov/media/2010/CorporateAccountTakeover.pdf

6. NACHA – The Electronic Payments Association's website has numerous articles regarding Corporate Account Takeover for both financial institutions and banking customers:

http://www.nacha.org/c/Corporate_Account_Takeover_Resource_Center.cfm