Week 14 Reading Iib-1
Week 14 Reading Iib-1
READING MATERIAL
INNOVATIONS IN BANKING
Banks are considered as necessary equipment for the Indian economy. This particular
sector has been tremendously growing in the recent years after the nationalisation of Banks in
1969 and the liberalisation of economy in 1991.Due to the nature of their daily activity of
dealing with money, and even after having such a supervised and well-regulated system it is
very tempting for those who are either associated the system or outside to find faults in the
system and to make personal gains by fraud
WHAT IS A FRAUD?
Generally, A dishonest act or behaviour through which one person gains or tries to gain an
advantage over another which results in the loss of the victim, directly or indirectly is called
as fraud. Under the IPC, fraud has not been defined directly under any particular section, but
it provides for punishments for various acts which lead to commission of fraud. However,
sections dealing with cheating, concealment, forgery, counterfeiting, misappropriation and
breach of trust cover the same adequately.
“Offences related to banking activities are not only confined to banks but have a harmful
impact on their customers and society at large”
Many recent fraud incidents reported are related to fix deposits, loan disbursements, and
credit and debit card frauds and ATM based frauds. All these frauds show that not only they
undermine the profits, reliability of services and operating efficiencies but can also have an
impact on the society and the organisation itself. With the increase in the gravity of such
instances it is impacting the profitability of the sector and there is an increase in the NPAs.
This rise in the NPA is a serious threat to the Indian Banking Industry as the sturdiness of a
country’s banking and financial sector determines the quality of products and services. It is
also a direct indicator of the living standards and wellbeing of people. Thus, if there is high
level of NPAs in the banking system, then it reflects the distress of borrower and the
inefficiencies in the transmission mechanism. The Indian economy suffers greatly due to
these incidents. Fraud has also hampered the growth of this establishment/ industry. It is a
huge killer for the business sector and underlying factor to all human endeavours. It also
increases the corruption level of a country. Even after there are various measures taken by the
RBI to limit or decrease the frequency of frauds, the amount of money lost is still on the rise.
1. Identity Theft: This occurs when someone steals another person's personal
information, such as their name, Social Security number, or bank account details, to
carry out unauthorized transactions or open accounts in their name.
2. Account Takeover: In this type of fraud, criminals gain unauthorized access to a
bank account by obtaining the account holder's login credentials or other sensitive
information. Once they have control of the account, they may withdraw funds, make
unauthorized transactions, or manipulate account details.
3. Credit Card Fraud: Criminals may use stolen or counterfeit credit card information
to make unauthorized purchases or cash withdrawals. This can occur through various
methods, including skimming devices, phishing scams, or hacking into payment
systems.
4. Check Fraud: This involves forging or altering checks to withdraw funds from
someone else's account or to make purchases. Criminals may steal checks, intercept
them in the mail, or create counterfeit checks.
5. Phishing and Social Engineering: Fraudsters may use deceptive emails, phone calls,
or text messages to trick individuals into providing their personal or financial
information. They may pose as legitimate organizations, such as banks or government
agencies, to convince victims to disclose sensitive data.
6. Loan Fraud: This occurs when individuals provide false information or
documentation to obtain loans or credit, they are not eligible for. They may
misrepresent their income, assets, or employment status to secure loans with
fraudulent intent.
7. Insider Fraud: In some cases, employees or insiders within a bank may engage in
fraudulent activities, such as embezzlement, unauthorized trading, or manipulating
financial records for personal gain.
Banks employ various security measures and technologies, such as encryption, fraud
detection algorithms, biometric authentication, and transaction monitoring systems, to detect
and prevent fraudulent activities. Additionally, regulatory authorities often impose strict
compliance requirements on banks to mitigate the risk of fraud and ensure the integrity of the
financial system.
The introduction of plastic money also brought in the frauds as a natural evil fall out. As a
greater number of people using them there is more and more chances of fraud in the related
sector. The case is much worse in foreign countries where the general usage is much higher
than in India.
• Altered Cards
• White Plastics
• Impersonation frauds
• Stolen/lost card
• Counterfeit card
The genuine cards are stolen while in transit from the institution to the user or from the
owners and sometimes the card is stolen, and there is a misuse of the stolen cards. Even in
some cases the cardholders falsely report about their card being stolen and go on a shopping
spree before the acquirer bank suspends the transactions or block the card.
2. Altered Cards
An altered card is an original card only which is altered by the fraudster by giving a new
name and if replaces the signature strip also then he gets genuine account number from a
bunco bankster. It is very abnormal and can damage the security features of the card provided
by the bank.
3. White Plastics
The duplicate fraudulent cards are called as white plastics. They are the copy of the original
genuine cards. They have pictorial similarities but doesn’t have the safety features
4. Impersonation frauds
These are also called as application frauds. The fraudster assumes the name and address of
some well know personality and collects the card
5. Stolen/lost card
The card will be taken out of your ownership either by theft or because you lost it. It will then
be used by criminals who get their hands on it to make payments. It is hard to do so through
computers because they will need the PIN. Using a found or stolen card to create online
purchases
6. Counterfeit card
It generally occurs by skimming. This means that all your card details are held by a fake
magnetic swipe card. The fake card is exactly the copy of the original one. During
transactions, fraudsters can readily use the fake card
if the card details are known by someone, they can use the card for transacting without being
in the physical possession of it. It occurs primarily when your information is stolen by
different means. It can either be through phone, email or internet
Preventive Measures:
• Speeding up the transmission of information about the stolen or altered card through a
dedicated website.
• This allows them to steal sensitive data or perform other malicious activities.
4. Model Poisoning
Caching is a common term that refers to storing commonly requested data to save
time and minimize network traffic. Web cache poisoning involves adding notorious
websites to the cache by making requests from an attacker-controlled system. This
means that when the victim’s system makes a request, the notorious websites may be
served. These websites may contain links to other sites that host malicious software.
When the victim unknowingly accesses the site, the systems are infected with
malicious software.
When an attacker modifies the Media Access Control (MAC) address to update the
system’s ARP cache with false ARP request and response packets, the attack is called
ARP poisoning. The Address Resolution Protocol (ARP) associates a physical address
of a network interface to an IP address. Sending false ARP response causes a device
to update its cache with it, to be used for transaction routing. This attack can cause
traffic to be routed to attacker-controlled systems allowing the compromise of
sensitive data. Usually, this form of attack remains undetected by the victim.
4. Model Poisoning
This is a type of attack launched on artificial intelligence and machine learning systems.
Attackers influence the training datasets used to manipulate the results according to their
needs. With the rise in AI (Artificial Intelligence) and machine learning globally, notorious
actors will find more opportunities to exploit. Such vulnerabilities must be considered while
designing systems to minimize incidents of model poisoning.
Website Cloning
Website cloning is a method where cyber criminals create nearly identical websites to mirror
original ones out of malicious motives. The cloned websites have a URL which is close to the
original and can fool users by exchanging lookalike characters, doubling certain characters in
the URL, or registering a domain where a single letter is different
The cloned websites can be hosted with a bulletproof hosting company which do not honor
takedown requests. These are very popular because they allow the attacker to host content
that violates intellectual property or any other malicious content without the hosting provider
terminating their service when organizations or individuals file a takedown request. Lists of
bulletproof providers are freely available online, and some of them even advertise it as a
feature
Who is a target?
Cyber criminals use this method to target users indiscriminately, along with unsuspecting
victims who are not as likely to notice minor differences in websites and URLs. However,
even if users check the URL, there are techniques the attacker can use to make the URL
appear as showing the correct name.
Inspect the website’s SSL certificate to check the domain’s validity. In most browsers,
this is done by clicking the padlock icon next to the URL. Websites without SSL
certificates should be automatically treated as untrusted, especially if they ask for email
addresses, passwords, or other sensitive data. Check the expiration date of the SSL
certificate and when it was issued; if it is only a couple of days old, it could be evidence
of a newly registered domain with a fresh SSL certificate
Copy the URL of the website and paste it into a hosting checker website to figure out
where it is hosted. If the user sees that the website is hosted in a location where the
company does not normally do business, it should serve as a red flag
The user can use search engines to navigate to the website they want to visit if they prefer
not to use bookmarks. Official websites are positioned higher in the search results since
they existed longer and have more links from other websites pointing to them (an
important search engine metric).
Merchant frauds
A method used where goods or services are offered at very cheap prices but either
counterfeit products are shipped or actual good/service is never shipped. In these cases,
no-chargeback payment methods are used. Customer will not have access to the helpdesk
to raise concern. This is applicable for both retail and wholesale transactions.
There have been few cases where fake e-commerce marketplaces or customer support
numbers have been setup to lure people into fraudulent business. These sites or contact
details appear in web search results, accept orders from people and then dupe them. Fake
customer care numbers gather sensitive financial details or passwords and dupe the
customers.
Several cases of fake sellers also appear in genuine online retail marketplaces and defraud
customers with fake or non-existing products. Even merchants or sellers also have been
defrauded by criminals by falsely claiming failed delivery of products. The modus
operandi here is to abuse a social platform or a trusted marketplace to sell fake products.
In some of these platforms, the sellers are not sufficiently verified for their authenticity
**********************************************************************