0% found this document useful (0 votes)
49 views

05 Assignment 1

The document summarizes a cybercrime incident where users of the Banco De Oro (BDO) bank in the Philippines had money illegally transferred from their accounts in December 2021. Five suspects were later arrested, including one who posed as a surveyor to steal identification information, one who sold email addresses with banking login credentials, and two who provided access to bank accounts and payment systems to commit fraud. The document poses three guide questions about cybersecurity technologies that could help prevent such incidents for the bank and its users and the overall significance of cybersecurity.

Uploaded by

the shy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

05 Assignment 1

The document summarizes a cybercrime incident where users of the Banco De Oro (BDO) bank in the Philippines had money illegally transferred from their accounts in December 2021. Five suspects were later arrested, including one who posed as a surveyor to steal identification information, one who sold email addresses with banking login credentials, and two who provided access to bank accounts and payment systems to commit fraud. The document poses three guide questions about cybersecurity technologies that could help prevent such incidents for the bank and its users and the overall significance of cybersecurity.

Uploaded by

the shy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

IT2222

05 Assignment 1

Name Date
Section Score

Direction: Assess the given scenario and provide applicable cybersecurity technologies by answering the guide
questions in at least three (3) sentences each. (3 items x 10 points)

Scenario:

In December 2021, Banco De Oro users took to social media to complain about illegal transactions made using their
accounts to transfer money to the UninonBank account of a certain “Mark Nagoyo.” A common pattern among the victims
is that the alleged cybercriminals were somehow able to access the victims’ BDO accounts even if they were careful
about not clicking any suspected phishing links and ensuring not to reveal any of their banking details in public.

A month later, five (5) suspects of the BDO hacking were arrested and charged by the National Bureau of Investigation
(NBI).

Ronelyn Panaligan, one of the suspects, acts as a “verifier” and pretends to conduct a survey and ask victims for their
identification cards with photographs in exchange for PHP50 in prepaid credit loan for “participating in the survey”. The
information and photographs of the victims, without their knowledge, would be used to apply for verified GCash or
Paymaya accounts. And after securing the debit cards, would offer them for sale to other fraudsters looking to cash out
funds from illegitimate sources.

Clay Revillosa, a third-year college student, was found to be selling 800,000 mailing lists or e-mail addresses containing
login credentials of online banking accounts for PHP30,000.

As for Ifesincachi Fountain Anaekwe and Chukwuemeka Pete, the DOJ said, they are the brains behind the “Mark
Nagoyo Group” and provided access devices such as bank accounts, crypto wallets, or even point of sale (POS) terminals
of legitimate merchants to fraudsters.

Jherom Anthony Taupa was found to be selling a “SCAMPAGE” for P2,000. It is a phishing website that is an imitation of
the website of GCash. The "SCAMPAGE" was used to harvest the login details, usernames, passwords, and mobile
personal identification numbers (MPINs) of victims who would access it under the mistaken belief that they were
accessing the GCash official portal.

Source: https://www.rappler.com/business/bdo-clients-lose-money-due-alleged-online-banking-hack/

Guide Questions:

1. What should possible cybersecurity technology BDO apply to prevent such scenarios? Match the cybercrime
offense to the possible cybersecurity technology.
2. Which cybersecurity technologies should bank users apply to avoid falling from such crimes?
3. In your opinion, what is the significance of cybersecurity technologies in situations like this?

GRADING RUBRIC:
Performance Standards Points
The student provided a justified explanation of the question. 5
The student provided a clear answer in at least three (3) sentences of explanation. 5
Total 10

05 Assignment 1 *Property of STI


Page 1 of 1

You might also like