chp 7 cs
chp 7 cs
Content:
7.1Real-Life Examples
7.2 Mini-Cases
7.3 Illustrations of Financial Frauds in Cyber Domain
7.4 Digital Signature-Related Crime Scenarios
7.5 Digital Forensics Case Illustrations
7.6 Online Scams
7.1Real-Life Examples:
MGM: SEPTEMBER 2023
MGM Resorts reported on September 11, 2023 that a “cybersecurity issue” began
affecting some of its systems. The hotel/casino chain promptly shut down these
systems in order to protect themselves. Subsequently, hotel room digital keys and
slot machines were out of order, causing nothing short of chaos for resort guests
and the organization itself.
Reports that the hackers used an employee's information on LinkedIn to
impersonate them in a call to MGM’s IT help desk. This act of social engineering
allowed the cybercriminals to then gain access to that employee’s credentials.
Though, MGM has not confirmed this.
While rumors continued to spread, MGM did not respond to a request for
information on who was behind the attack.
7.2 Mini-Cases:
CASE 1: A BUSINESS TRIP TO SOUTH AMERICA GOES SOUTH
SCENARIO:
ATTACK:
RESPONSE:
Realizing they had been defrauded, the firm contacted their bank and closed the
impacted account immediately. Their attempts to pursue reimbursement from the
bank were unsuccessful. The commercial account used at the ATM for local
currency had different protections from consumer accounts and the bank was not
required to reimburse them for their losses. The bank went on to deduct the
$1,000 overdraft fee from the firm owner’s personal account.
The firm severed ties with that bank. The new bank offered comprehensive fraud
protection guarantees.
The firm created two business accounts:
one for receiving funds and making small transfers
one for small expense payments
The firm updated travel protocols, banning the use of company-provided debit
cards. Employees now prepay expenses electronically, pay cash, or use a major
credit card, as necessary.
IMPACT:
The entire cash reserve for the small business was wiped out, netting losses of
almost $15,000.
LESSONS LEARNED:
1 Use major credit cards when traveling - they have more consumer fraud protection
than debit cards.
2 Get notified - set up transaction alerts with your credit and debit card companies
to monitor fraud.
3 Check your bank account frequently.
4 Create withdrawal alerts.
5 Understand your bank’s policies about covering losses from fraud.
DISCUSS:
Knowing how the firm responded, what would you have done differently?
What are some steps you think the firm could have taken to prevent this incident?
Is your business susceptible? How are you going to reduce your risk?
7.3 Illustrations of Financial Frauds in Cyber Domain:
1. WANNACRY RANSOMWARE ATTACK:
In May 2017, the WannaCry ransomware infected hundreds of thousands of
computers globally. Exploiting a vulnerability in Microsoft Windows, the malware
encrypted files and demanded ransom payments in Bitcoin. The attack affected
hospitals, businesses, and government agencies, highlighting the widespread
disruption that ransomware can cause.
2. EQUIFAX DATA BREACH:
In 2017, Equifax, a credit reporting firm, faced a huge data breach. Personal
information, including names, Social Security numbers, and birth dates of 147
million individuals, was compromised. The breach underscored the vulnerability
of personal data and the severe consequences of identity theft.
3. BUSINESS EMAIL COMPROMISE (BEC) SCAM ON TOYOTA BOSHOKU
CORPORATION:
In 2019, Toyota Boshoku Corporation, a subsidiary of Toyota, fell victim to a BEC
scam. Cybercriminals impersonated a legitimate business partner and tricked the
company into transferring approximately $37 million to fraudulent accounts. The
incident highlighted the financial impact and sophistication of BEC attacks on
large corporations.
4. SOLARWINDS SUPPLY CHAIN ATTACK:
In late 2020, the SolarWinds supply chain attack compromised the software
supply chain, impacting numerous organizations and government agencies.
Cybercriminals inserted a malicious code into the software update of SolarWinds'
Orion platform. This allowed them to gain unauthorized access to the networks of
SolarWinds customers, leading to extensive data breaches.