SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Downloaden Sie, um offline zu lesen
the cyberpsychology of online
fraud
Dr CiarĂĄn Mc Mahon
Central Bank, AMLD Away Day
November 6th, 2015
Introduction
• Emerging trends in cybercrime
• Architecture of compromise
• Victims of online fraud
• Psychology of cyberspace
• Cybercrime targeting financial institutions
Emerging trends In cybercrime
• Advanced persistent threats
– You are already hacked
• Cybercrime as a service
– everyone can be a hacker now
• Low-hanging fruit
– easier to steal a lamb than a sheep
• Blackmail
– information is the new money
Europol iOCTA Report 2015
• Cybercrime
– remains a growth industry
– becoming more aggressive and confrontational
– an extremely diverse range of criminality
– blurring of the lines between Advanced Persistent
Threat (APT) groups and profit-driven
cybercriminals
Europol iOCTA Report 2015
• CaaS – Cybercrime as a Service
– grants easy access to criminal products and
services, enables a broad base of unskilled,
entrylevel cybercriminals to launch attacks of a
scale and scope disproportionate to their technical
capability and asymmetric in terms of risks, costs
and profits.
• Mc Afee – ‘The Hidden Data Economy’
http://www.mcafee.com/us/resources/reports/rp-hidden-data-
economy.pdf
• “Software-generated” is a valid combination of a primary account
number (PAN), an expiration date, and a CVV2 number that has
been generated by software. Sellers refer to a valid number
combination as a “Random.” Valid credit card number generators
can be purchased or found for free online.
• “Fullzinfo” means the seller supplies all of the details about the
card and its owner, such as full name, billing address, payment
card number, expiration date, PIN number, social security
number, mother’s maiden name, date of birth, and CVV2.
The Hidden Data Economy
• Data is a key commodity in the digital
underground and almost any type of data is
of value to someone; whether it can be used
for the furtherance of fraud or for immediate
financial gain. (Europol iOCTA)
recent EU breaches
Europol iOCTA Report 2015
“While it is possible for organisations to
invest in technological means to protect
themselves, the human element will always
remain as an unpredictable variable and a
potential vulnerability. As such social
engineering is a common and effective tool
used for anything from complex multi-stage
attacks to fraud. “
PWC The Global State of Information Security Survey 2015
http://www.pwchk.com/webmedia/doc/635527689739110925_rcs_info_security_2015.pdf
Information Age - http://www.information-age.com/technology/security/123458744/2015-year-cyber-security-shows-its-human-side
Grant Forks Herald http://www.grandforksherald.com/news/business/3847833-cyber-security-professionals-say-employees-are-
biggest-threat-network-security
Databarracks Data Health Check - http://datahealthcheck.databarracks.com/
Clearswift -
https://www.clearswift.com/sites/default/files/documents/Infographics/Clearswift_What_is_your_employees_price_infographic.pdf
CIO - http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will-dominate-2015.html
Cyberpsychology is an emerging discipline which involves the study of the human mind and behaviour in the context of information
communication technology. It represents an incredibly valuable source of insight into information security behaviour.
Photo from Project Apollo Archive https://www.flickr.com/photos/projectapolloarchive/21713955181
• Presence
• The internet is designed to make communication effortless, so we should feel
totally immersed in it.
• A major goal for all ICT engineers is to ensure that users of their technology are
totally unaware of all of the computations and calculations that are going on
behind the scenes (Lombard & Ditton, 1997).
• Users act like ICT is invisible - “for mediated exchange to work as interpersonal
communication, there must be tacit agreement that the participants will proceed
as though they are communicating face to face” (Cathcart and Gumpert, 1986, p.
116)
• Cathcart, R., & Gumpert, G. (1986). The person-computer interaction: A unique
source. In B. D. Ruben (Ed.), Information and behavior (vo.l 1) (pp. 113–124).
New Brunswick, NJ: Transaction Publishers.
• Lombard, M., Ditton, T., & Media, M. (1997). At the heart of it all: The concept
of presence. Journal of Computer-Mediated Communication, 3(2), 1–23.
• Photo from https://pixabay.com/en/bokeh-background-
abstract-colorful-587113/z
•• LurkingLurking
• Anywhere up to 90% of the visitors to any online forum will read
everything, will be invisible and will not participate to any
meaningful or noticeable degree (Nonnecke, East, & Preece, 2001).
• Consequently it is very likely that when an employee is online:
they may assume that the only ones who they can see talking to
them are the only ones who are present. This is where insider
threats slip up – they don’t think anyone can see them.
• Nonnecke, B., East, K. S., & Preece, J. (2001). Why lurkers lurk.
In Americas Conference on Information Systems (pp. 1–10).
• Photo from https://pixabay.com/en/rabbit-hare-bunny-costume-
animal-542554/
• Self-disclosure
• When online, people are more likely to reveal personal information.
• People tend to reveal most personal information online when they are in
certain conditions (Joinson, 2001), namely heightened private self-
awareness and reduced public self-awareness.
• In other words, when someone is focussing on themselves, their person
and body, and feels anonymous and unseen, they are likely to reveal
information about themselves that they would not in a face-to-face
context.
• Self-disclosure of this kind likely a critical factor in cyberbullying - it’s
also a pretty useful tool in honeypot operations.
• Joinson, A. N. (2001). Self-disclosure in computer-mediated
communication: The role of self-awareness and visual anonymity.
European Journal of Psychological Assessment, 31, 177–192.
• Photo from https://picjumbo.com/colorful-funfair-bokeh/
• Online disinhibition
• When online, people loosen up, feel less restrained, and express
themselves more openly
• Everyday users on the Internet—as well as clinicians and
researchers have noted how people say and do things in
cyberspace that they wouldn’t ordinarily say and do in the face-to-
face world. They loosen up, feel less restrained, and express
themselves more openly. So pervasive is the phenomenon that a
term has surfaced for it: the online disinhibition effect. (Suler,
2004, p.321)
• Suler, J. (2004). The online disinhibition effect. CyberPsychology
& Behavior, 7(3), 321–326.
• Photo from https://pixabay.com/en/concert-people-crowd-audience-
731227
• Minimisation of status and authority
• In the traditional philosophy of the internet there is no centralised
control, everyone is equal, and its only purpose is sharing ideas
• While online a person’s status in the face-to-face world may not be
known to others and may not have as much impact. Authority
figures express their status and power in their dress, body
language, and in the trappings of their environmental settings. The
absence of those cues in the text environments of cyberspace
reduces the impact of their authority. (Suler, 2004, p. 324)
• Suler, J. (2004). The online disinhibition effect. CyberPsychology
& Behavior, 7(3), 321–326.
• Photo from http://www.gratisography.com/
• Traditionally, society is built on a close relationship
between authoritative texts and authority figures
• Knowledge linked to power, not only assumes the
authority of 'the truth' but has the power to make itself
true. All knowledge, once applied in the real world, has
effects, and in that sense at least, 'becomes true.'
Knowledge, once used to regulate the conduct of others,
entails constraint, regulation and the disciplining of
practice. (Foucault,1977, p.27)
• Foucault, M. (1977). Discipline and punish. London:
Tavistock.
• Photo from
https://www.flickr.com/photos/drgbb/2227885657
• Web 2.0 has the power to radically change these knowledge and power relationships
– “Wikipedia provokes divisive debates precisely because academics realise that Web 2.0 has the
potential to radically transform pedagogic and research practices in higher education – and hence
irrevocably change traditional academic power and authority arrangements.” Eijkman (2010, p.
182)
• Eijkman, H. (2010). Academics and Wikipedia: Reframing Web 2.0 as a disruptor of traditional
academic power-knowledge arrangements. Campus-Wide Information Systems.
http://doi.org/10.1108/10650741011054474
• Photo from the Opte Project http://www.opte.org/the-internet/
• How do leaderless networks work? Quote from a book on direct
action, about the Occupy Wall Street Movement:
– “Before long, people were organizing them everywhere. Someone
came up with the theory that the result was a kind of global brain: the
interconnections of communication are such that you can imagine
people not just communicating but acting, and acting damn
effectively, without leadership, a secretariat, without even formal
information channels. It's a little like ants meeting in an ant-heap, all
waving their antennae at each other, and information just gets
around-even though there's no chain of command or even
hierarchical information structure. Of course it would be impossible
without the Internet.” (Graeber, 2009)
• Graeber, D. (2009). Direct Action. An Ethnography. Oakland,
CA: AK Press
• Photo from http://anondesign.deviantart.com/art/Anonymous-
Logo-with-Slogan-Perfect-Symmetry-408650529
• http://www.csmonitor.com/USA/USA-
Update/2015/0605/OPM-hack-What-criminal-hackers-can-
do-with-your-personal-data-video
• OPM offering potentially affected individuals
• credit report access,
• credit monitoring and
• identify theft insurance and recovery services
• As of yesterday, less than a quarter of the 21m affected
had been notified
• http://news.yahoo.com/three-quarters-u-opm-hack-victims-
still-dark-184307823.html
• From
http://20committee.com/2015/06/08/hacking-
as-offensive-counterintelligence/
Offensive Counterintelligence
value of a hacked email account
• Image from
http://krebsonsecurity.com/2013/06/the-value-of-
a-hacked-email-account/
• Phishing: 23% will open message, further 11%
will open attachment
Verizon, 2015 Data Breach Investigations Report,
http://www. verizonenterprise.com/DBIR/2015/,
2015
attack lifecycle
• From Mandiant’s APT1 report -
http://intelreport.mandiant.com/Mandiant_A
PT1_Report.pdf
would you click?
VICTIMOLOGY ONLINE
Victims of Phishing
• Jagatic, Johnson, Jakobsson, &
Menczer (2007)
Victims of Phishing
• Rocha Flores, Holm, Nohlberg &
Ekstedt (2015)
– Resistance to phishing:
• Intention to resist social engineering
• general information security awareness
• formal IS training
• computer experience
Victims of Phishing
• Alsharnouby, Alaca, & Chiasson (2015)
– eye tracking testing legitimacy of websites
• users successfully detected only 53% of phishing
websites
– even when primed to identify them
• generally spend very little time gazing at security
indicators
• general technical proficiency does not correlate with
improved detection scores.
Victims of fraud
• van Wilsem (2011)
– large-scale victimization survey data among the
Dutch general population (N = 6,201)
– those with low self-control run substantially
higher victimization risk
– as well as active online shoppers and people
participating in online forums.
Victims of fraud
• Button, Nicholls, Kerr, & Owen (2014)
• depth interviews & focus groups with online
fraud victims: reasons
– the diversity of frauds
– small amounts of money sought
– authority and legitimacy displayed by scammers
– visceral appeals
– embarrassing frauds
– pressure and coercion
– grooming
– fraud at a distance and multiple techniques
Victims of fraud
• Cross (2013)
– discourse surrounding online fraud is heavily
premised on idea that victims are both greedy
and gullible
– need to examine discourse on ‘victim blaming’ in
online fraud
– current discourse does not take into account the
level of deception and the targeting of
vulnerability that is employed by the offender in
perpetrating this type of crime
Victims of fraud
• Cross (2015)
– interviews with 85 seniors across Queensland, Australia,
who received fraudulent emails,
– victim-blaming discourse as an overwhelmingly powerful
and controlling discourse about online fraud
victimization.
– humour reinforces this discourse by isolating victims and
impacting on their ability to disclose to those around
them.
– Identifying and challenging this victim-blaming discourse,
as well as the role of humour and its social acceptance, is
a first step in the facilitation of victim recovery and future
well-being.
Victims of fraud
• Cross (2015) How to tackle cyber crime
before people even know they’re a victim
(The Conversation)
– Project Sunbird
Project Sunbird
• Identification
– police identify people who are sending money to five
known high-risk countries
• Intervention
– Department of Commerce send a letter to each person,
notifying them that they may be victims of fraud
• Interruption
– stoppage of payments and funds
• Intelligence
– from letter recipients from both agencies
• Investigation
– police on local and overseas offenders
cybercrime targeting Banks
• CEO fraud
– ‘business e-mail compromise’ or “Fake President”
• Bank malware
• Ransomware & extortion
• DDOS
CEO fraud
• FBI report January 2015
– October 2013 to August 2015
– Combined victims (US & non US): 8,179
– Combined exposed dollar loss: $798,897,959.25
– transfers reported to 72 countries;
– majority of transfers to Asian banks located
within China and Hong Kong
CEO fraud - Scenario
1. Establish contact
– impersonate a group executive (e.g. the president, CEO, CFO) or a trusted partner
(e.g. lawyers, notaries, auditors, accountants etc.) o
– contact a specific employee, manager, an accounts payable clerk
2. Urgent and exceptional request
– request an urgent bank transfer of a large amount to a foreign bank account.
3. Persuasive dialog
– Use of authority: It is an order to do this
– Secrecy: This project is still secret and its success depends on this transaction
– Valorization: I count on you for your efficiency and discretion
– Pressure: The success of the project rests on your shoulders
4. Transfer order
– Being unsuspicious, transfer will be done manually (using a direct phone call or fax to
a bank).
– does not follow the standard procedure but may be used by companies in urgent cases
or for flexibility reasons as an alternative to the standard procedure.
CEO fraud - Prevention
1. Inform staff that this fraud is ongoing
2. Test staff knowledge of extraordinary
transfer procedure
3. Include 2FA in extraordinary transfer
procedure
4. Ensure that staff know who CISO is
banking malware
• From Kaspersky Lab report Q3 2015
– blocked 625,669 online banking stealing
attempts, which is 17.2% lower than in Q2 2015
– Windows 7 x64 Edition accounted for 42.2% of
all banking Trojan attacks
– 2,516 detected mobile banker Trojans, which is a
fourfold increase on the previous quarter
Ransomware and extortion
• Increasingly directed at banks
– DDOS
• take down website (embarrassing)
– Exfiltration
• will release customer data if not paid
Ransomware and extortion
• Hackers Release Swiss Bank Data Over $12K
Unpaid Ransom (BloombergBusiness)
– small-scale demand -- $12,000 prevalence and ease of
a rapidly growing extortion industry that deals in
stolen or hijacked data
• Hacker who demanded Bitcoin from banks
jailed for blackmail and child pornography
(TheJournal)
– used a phishing program to obtain customer banking
details before threatening to release them if he was
not paid
Blackmail
• “The Ultimate Invasion of Privacy” (Slate)
– “How a Chinese hacker used my private
nickname, personal emails, and sensitive
documents to try to blackmail me.”
– US businessman working in China
Ransomware and extortion
• Bitcoin cyberextortionists are blackmailing
banks, corporations (arstechnica)
– intended to harass, extort and ultimately
embarrass the victim publicly
– between 1 and 100 bitcoins (about £160 to
ÂŁ16,000), a deadline for compliance, and warning
of a “small, demonstrative attack.
EU Directives
• Network and Information Security
• General Data Protection Regulation
– Both in the pipeline for some time and still being
negotiated
• Both have certain issues around mandatory reporting
of data breaches, whether to customers or regulators,
depending on the size and nature of the organisation
• Reputational risk is clearly a very significant factor
here
COMBATING CYBERCRIME
Strategies for improving internal organisational security
• Emphasis should be on delegation and empowerment
of employees
– “an autocratic stance inhibits effective information
security and highlights ways that this is expressed by
experienced Chief Information Security Officers through
their use of discourse. They need to develop an identity
within the organisation where they are seen to help
employees discuss, and make decisions about,
information security. The emphasis should be on
delegation and empowerment of employees with an
acceptance that, as a result, mistakes and errors may
occur. (Ashenden & Sasse, 2013)
• Photo from http://www.freeimages.com/photo/ducks-
in-a-row-1316756
• Select a champion – not necessarily a technical
expert – but who can motivate and persuade
– “The results of this study give credence to the role of
a ‘champion’ within the organization, specifically
alluding to the influence this person may have in
motivating employees to engage in actions involving
IT” (Johnston & Warkentin, 2010a)
• Photo from
http://www.gratisography.com/#whimsical
• “...findings suggest that religiosity and values can
play important roles in compliance in the
domain of information security... Recognizing
and appealing to these beliefs and values can
help security managers encourage individuals to
be more compliant with the policies set forth by
their organization.” (Kelecha & Belanger, 2013)
• Photo from https://pixabay.com/en/book-skin-
knowledge-key-840647/
• appealing to fear does impact intention to
comply with infosec, but the impact is not
uniform
– “....suggest that fear appeals do impact end user
behavioral intentions to comply with recommended
individual acts of security, but the impact is not
uniform across all end users. It is determined in part
by perceptions of self-efficacy, response efficacy,
threat severity, and social influence.” (Johnston &
Warkentin, 2010b)
• Photo from https://pixabay.com/en/police-
security-safety-protection-869216/
COnclusion
• You are the weakest link
• Your organisation is already compromised
– the only question is to what degree
• Mandatory reporting is on its way
• Ongoing threats require ongoing security
• Link information security with human
resources
Thank you!
www: ciaranmcmahon.ie
e: info@ciaranmcmahon.ie
twitter: @cjamcmahon
linkedin: @cjamcmahon
Further reading
• Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why phishing still works: User strategies for combating phishing attacks.
International Journal of Human-Computer Studies, 82, 69–82. http://doi.org/10.1016/j.ijhcs.2015.05.005
• Ashenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy? Computers and Security, 39(PART
B), 396–405. doi:10.1016/j.cose.2013.09.004
• Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams.
Australian & New Zealand Journal of Criminology, 47(3), 391–408. http://doi.org/10.1177/0004865814521224
• Cross, Cassandra (2013) “Nobody’s holding a gun to your head. . . ” examining current discourses surrounding victims of online
fraud. In Richards, Kelly & Tauri, Juan (Eds.) Crime, Justice and Social Democracy : Proceedings of the 2nd International
Conference, Crime and Justice Research Centre, Queensland University of Technology, Queensland University of Technology,
Brisbane, QLD, pp. 25-32.
• Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204.
http://doi.org/10.1177/0269758015571471
• Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94–100.
http://doi.org/10.1145/1290958.1290968
• Johnston, A. C., & Warkentin, M. (2010a). The Influence of Perceived Source Credibility on End User Attitudes and Intentions to
Comply with Recommended IT Actions. Journal of Organizational and End User Computing, 22(3), 1–21.
doi:10.4018/joeuc.2010070101
• Johnston, A. C., & Warkentin, M. (2010b). Fear Appeals and Information Security Behaviors: an Empirical Study. MIS Quarterly,
34(3), 549–A4.
• Kelecha, B., & Belanger, F. (2013). Religiosity and Information Security Policy Compliance. AMCIS 2013 Proceedings. Retrieved
from http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/13
• Parrish, J. L., & San Nicolas-Rocca, T. (2012). Toward Better Decisions With Respect To Is Security: Integrating Mindfulness Into IS
Security Training. In pre-ICIS workshop on Information Security and Privacy (SIGSEC) (pp. 12–15). Retrieved from
http://aisel.aisnet.org/wisp2012/17
• Rocha Flores, W., Holm, H., Nohlberg, M., & Ekstedt, M. (2015). Investigating personal determinants of phishing and the effect of
national culture. Information and Computer Security, 23(2), 178–199. http://doi.org/10.1108/ICS-05-2014-0029
• van Wilsem, J. (2011). “Bought it, but Never Got it” Assessing Risk Factors for Online Consumer Fraud Victimization. European
Sociological Review, 29(2), 168–178. http://doi.org/10.1093/esr/jcr053

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber RiskCapitolTechU
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
 
Gender and the digital divide
Gender and the digital divideGender and the digital divide
Gender and the digital dividelinakap3
 
How Young is Too Young?
How Young is Too Young? How Young is Too Young?
How Young is Too Young? sshrimali
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5lisamulka
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyAditya
 
Major assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on SocietyMajor assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on SocietyHarris Naseem
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperMeghan.V
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebookhernan_j1
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2groot83
 
how does technology affect society?
how does technology affect society?how does technology affect society?
how does technology affect society?kahooks324
 
Decline of interpersonal communication
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communicationNaeemMushtaq4
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-webMarketingfacts
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 

Was ist angesagt? (18)

Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Gender and the digital divide
Gender and the digital divideGender and the digital divide
Gender and the digital divide
 
How Young is Too Young?
How Young is Too Young? How Young is Too Young?
How Young is Too Young?
 
Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5Bowhuis Group Ppt Draft5
Bowhuis Group Ppt Draft5
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Major assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on SocietyMajor assignment - Impact of Social Technologies on Society
Major assignment - Impact of Social Technologies on Society
 
Module 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review PaperModule 7 Assignment 2 Pp On Review Paper
Module 7 Assignment 2 Pp On Review Paper
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebook
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Digital Citizenship2
Digital Citizenship2Digital Citizenship2
Digital Citizenship2
 
how does technology affect society?
how does technology affect society?how does technology affect society?
how does technology affect society?
 
Decline of interpersonal communication
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communication
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-web
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 

Ähnlich wie Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing

Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarĂĄn Mc Mahon
 
Digital Life in 2025
Digital Life in 2025Digital Life in 2025
Digital Life in 2025Evgeny Tsarkov
 
Rethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital FluencyRethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital FluencyJudy O'Connell
 
When communication innovations lead to social exclusion
When communication innovations lead to social exclusionWhen communication innovations lead to social exclusion
When communication innovations lead to social exclusionPetr Lupac
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Open for business_dalberg
Open for business_dalbergOpen for business_dalberg
Open for business_dalbergVictor Gridnev
 
Digital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkDigital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkXanat V. Meza
 
MAC309 Trust in media
MAC309 Trust in mediaMAC309 Trust in media
MAC309 Trust in mediaRob Jewitt
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialMichael Netzley, Ph.D.
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity Johannes Meier
 
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdfINST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdfbozo18
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptxBeniamTekeste
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)Alexander Decker
 
Ict technologyor phonomena
Ict technologyor phonomenaIct technologyor phonomena
Ict technologyor phonomenaMuhammadBilal345673
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudanHala Nur
 
Social Machines Paradigm
Social Machines ParadigmSocial Machines Paradigm
Social Machines ParadigmDavid De Roure
 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theoriesTajanik Oliver
 

Ähnlich wie Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing (20)

Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 
DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025
 
Digital Life in 2025
Digital Life in 2025Digital Life in 2025
Digital Life in 2025
 
Rethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital FluencyRethinking Learning in the Age of Digital Fluency
Rethinking Learning in the Age of Digital Fluency
 
When communication innovations lead to social exclusion
When communication innovations lead to social exclusionWhen communication innovations lead to social exclusion
When communication innovations lead to social exclusion
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Open for business_dalberg
Open for business_dalbergOpen for business_dalberg
Open for business_dalberg
 
Digital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkDigital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van Dijk
 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
 
MAC309 Trust in media
MAC309 Trust in mediaMAC309 Trust in media
MAC309 Trust in media
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocial
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity
 
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdfINST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
INST201_SP23_WEEK3_INFRASTRUCTURE_SOCIAL.pdf
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptx
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)
 
Ict technologyor phonomena
Ict technologyor phonomenaIct technologyor phonomena
Ict technologyor phonomena
 
Why not use ict in sudan
Why not use ict in sudanWhy not use ict in sudan
Why not use ict in sudan
 
Social Machines Paradigm
Social Machines ParadigmSocial Machines Paradigm
Social Machines Paradigm
 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theories
 

KĂźrzlich hochgeladen

AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...Amil baba
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 

KĂźrzlich hochgeladen (20)

🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 

Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing

  • 1. the cyberpsychology of online fraud Dr CiarĂĄn Mc Mahon Central Bank, AMLD Away Day November 6th, 2015
  • 2. Introduction • Emerging trends in cybercrime • Architecture of compromise • Victims of online fraud • Psychology of cyberspace • Cybercrime targeting financial institutions
  • 3. Emerging trends In cybercrime • Advanced persistent threats – You are already hacked • Cybercrime as a service – everyone can be a hacker now • Low-hanging fruit – easier to steal a lamb than a sheep • Blackmail – information is the new money
  • 4.
  • 5. Europol iOCTA Report 2015 • Cybercrime – remains a growth industry – becoming more aggressive and confrontational – an extremely diverse range of criminality – blurring of the lines between Advanced Persistent Threat (APT) groups and profit-driven cybercriminals
  • 6. Europol iOCTA Report 2015 • CaaS – Cybercrime as a Service – grants easy access to criminal products and services, enables a broad base of unskilled, entrylevel cybercriminals to launch attacks of a scale and scope disproportionate to their technical capability and asymmetric in terms of risks, costs and profits.
  • 7. • Mc Afee – ‘The Hidden Data Economy’ http://www.mcafee.com/us/resources/reports/rp-hidden-data- economy.pdf • “Software-generated” is a valid combination of a primary account number (PAN), an expiration date, and a CVV2 number that has been generated by software. Sellers refer to a valid number combination as a “Random.” Valid credit card number generators can be purchased or found for free online. • “Fullzinfo” means the seller supplies all of the details about the card and its owner, such as full name, billing address, payment card number, expiration date, PIN number, social security number, mother’s maiden name, date of birth, and CVV2. The Hidden Data Economy
  • 8. • Data is a key commodity in the digital underground and almost any type of data is of value to someone; whether it can be used for the furtherance of fraud or for immediate financial gain. (Europol iOCTA) recent EU breaches
  • 9. Europol iOCTA Report 2015 “While it is possible for organisations to invest in technological means to protect themselves, the human element will always remain as an unpredictable variable and a potential vulnerability. As such social engineering is a common and effective tool used for anything from complex multi-stage attacks to fraud. “
  • 10. PWC The Global State of Information Security Survey 2015 http://www.pwchk.com/webmedia/doc/635527689739110925_rcs_info_security_2015.pdf Information Age - http://www.information-age.com/technology/security/123458744/2015-year-cyber-security-shows-its-human-side Grant Forks Herald http://www.grandforksherald.com/news/business/3847833-cyber-security-professionals-say-employees-are- biggest-threat-network-security Databarracks Data Health Check - http://datahealthcheck.databarracks.com/ Clearswift - https://www.clearswift.com/sites/default/files/documents/Infographics/Clearswift_What_is_your_employees_price_infographic.pdf CIO - http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will-dominate-2015.html
  • 11. Cyberpsychology is an emerging discipline which involves the study of the human mind and behaviour in the context of information communication technology. It represents an incredibly valuable source of insight into information security behaviour. Photo from Project Apollo Archive https://www.flickr.com/photos/projectapolloarchive/21713955181
  • 12. • Presence • The internet is designed to make communication effortless, so we should feel totally immersed in it. • A major goal for all ICT engineers is to ensure that users of their technology are totally unaware of all of the computations and calculations that are going on behind the scenes (Lombard & Ditton, 1997). • Users act like ICT is invisible - “for mediated exchange to work as interpersonal communication, there must be tacit agreement that the participants will proceed as though they are communicating face to face” (Cathcart and Gumpert, 1986, p. 116) • Cathcart, R., & Gumpert, G. (1986). The person-computer interaction: A unique source. In B. D. Ruben (Ed.), Information and behavior (vo.l 1) (pp. 113–124). New Brunswick, NJ: Transaction Publishers. • Lombard, M., Ditton, T., & Media, M. (1997). At the heart of it all: The concept of presence. Journal of Computer-Mediated Communication, 3(2), 1–23. • Photo from https://pixabay.com/en/bokeh-background- abstract-colorful-587113/z
  • 13. •• LurkingLurking • Anywhere up to 90% of the visitors to any online forum will read everything, will be invisible and will not participate to any meaningful or noticeable degree (Nonnecke, East, & Preece, 2001). • Consequently it is very likely that when an employee is online: they may assume that the only ones who they can see talking to them are the only ones who are present. This is where insider threats slip up – they don’t think anyone can see them. • Nonnecke, B., East, K. S., & Preece, J. (2001). Why lurkers lurk. In Americas Conference on Information Systems (pp. 1–10). • Photo from https://pixabay.com/en/rabbit-hare-bunny-costume- animal-542554/
  • 14. • Self-disclosure • When online, people are more likely to reveal personal information. • People tend to reveal most personal information online when they are in certain conditions (Joinson, 2001), namely heightened private self- awareness and reduced public self-awareness. • In other words, when someone is focussing on themselves, their person and body, and feels anonymous and unseen, they are likely to reveal information about themselves that they would not in a face-to-face context. • Self-disclosure of this kind likely a critical factor in cyberbullying - it’s also a pretty useful tool in honeypot operations. • Joinson, A. N. (2001). Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity. European Journal of Psychological Assessment, 31, 177–192. • Photo from https://picjumbo.com/colorful-funfair-bokeh/
  • 15. • Online disinhibition • When online, people loosen up, feel less restrained, and express themselves more openly • Everyday users on the Internet—as well as clinicians and researchers have noted how people say and do things in cyberspace that they wouldn’t ordinarily say and do in the face-to- face world. They loosen up, feel less restrained, and express themselves more openly. So pervasive is the phenomenon that a term has surfaced for it: the online disinhibition effect. (Suler, 2004, p.321) • Suler, J. (2004). The online disinhibition effect. CyberPsychology & Behavior, 7(3), 321–326. • Photo from https://pixabay.com/en/concert-people-crowd-audience- 731227
  • 16. • Minimisation of status and authority • In the traditional philosophy of the internet there is no centralised control, everyone is equal, and its only purpose is sharing ideas • While online a person’s status in the face-to-face world may not be known to others and may not have as much impact. Authority figures express their status and power in their dress, body language, and in the trappings of their environmental settings. The absence of those cues in the text environments of cyberspace reduces the impact of their authority. (Suler, 2004, p. 324) • Suler, J. (2004). The online disinhibition effect. CyberPsychology & Behavior, 7(3), 321–326. • Photo from http://www.gratisography.com/
  • 17. • Traditionally, society is built on a close relationship between authoritative texts and authority figures • Knowledge linked to power, not only assumes the authority of 'the truth' but has the power to make itself true. All knowledge, once applied in the real world, has effects, and in that sense at least, 'becomes true.' Knowledge, once used to regulate the conduct of others, entails constraint, regulation and the disciplining of practice. (Foucault,1977, p.27) • Foucault, M. (1977). Discipline and punish. London: Tavistock. • Photo from https://www.flickr.com/photos/drgbb/2227885657
  • 18. • Web 2.0 has the power to radically change these knowledge and power relationships – “Wikipedia provokes divisive debates precisely because academics realise that Web 2.0 has the potential to radically transform pedagogic and research practices in higher education – and hence irrevocably change traditional academic power and authority arrangements.” Eijkman (2010, p. 182) • Eijkman, H. (2010). Academics and Wikipedia: Reframing Web 2.0 as a disruptor of traditional academic power-knowledge arrangements. Campus-Wide Information Systems. http://doi.org/10.1108/10650741011054474 • Photo from the Opte Project http://www.opte.org/the-internet/
  • 19. • How do leaderless networks work? Quote from a book on direct action, about the Occupy Wall Street Movement: – “Before long, people were organizing them everywhere. Someone came up with the theory that the result was a kind of global brain: the interconnections of communication are such that you can imagine people not just communicating but acting, and acting damn effectively, without leadership, a secretariat, without even formal information channels. It's a little like ants meeting in an ant-heap, all waving their antennae at each other, and information just gets around-even though there's no chain of command or even hierarchical information structure. Of course it would be impossible without the Internet.” (Graeber, 2009) • Graeber, D. (2009). Direct Action. An Ethnography. Oakland, CA: AK Press • Photo from http://anondesign.deviantart.com/art/Anonymous- Logo-with-Slogan-Perfect-Symmetry-408650529
  • 20. • http://www.csmonitor.com/USA/USA- Update/2015/0605/OPM-hack-What-criminal-hackers-can- do-with-your-personal-data-video • OPM offering potentially affected individuals • credit report access, • credit monitoring and • identify theft insurance and recovery services • As of yesterday, less than a quarter of the 21m affected had been notified • http://news.yahoo.com/three-quarters-u-opm-hack-victims- still-dark-184307823.html
  • 22. value of a hacked email account • Image from http://krebsonsecurity.com/2013/06/the-value-of- a-hacked-email-account/ • Phishing: 23% will open message, further 11% will open attachment Verizon, 2015 Data Breach Investigations Report, http://www. verizonenterprise.com/DBIR/2015/, 2015
  • 23. attack lifecycle • From Mandiant’s APT1 report - http://intelreport.mandiant.com/Mandiant_A PT1_Report.pdf
  • 24.
  • 25.
  • 28. Victims of Phishing • Jagatic, Johnson, Jakobsson, & Menczer (2007)
  • 29. Victims of Phishing • Rocha Flores, Holm, Nohlberg & Ekstedt (2015) – Resistance to phishing: • Intention to resist social engineering • general information security awareness • formal IS training • computer experience
  • 30. Victims of Phishing • Alsharnouby, Alaca, & Chiasson (2015) – eye tracking testing legitimacy of websites • users successfully detected only 53% of phishing websites – even when primed to identify them • generally spend very little time gazing at security indicators • general technical proficiency does not correlate with improved detection scores.
  • 31. Victims of fraud • van Wilsem (2011) – large-scale victimization survey data among the Dutch general population (N = 6,201) – those with low self-control run substantially higher victimization risk – as well as active online shoppers and people participating in online forums.
  • 32. Victims of fraud • Button, Nicholls, Kerr, & Owen (2014) • depth interviews & focus groups with online fraud victims: reasons – the diversity of frauds – small amounts of money sought – authority and legitimacy displayed by scammers – visceral appeals – embarrassing frauds – pressure and coercion – grooming – fraud at a distance and multiple techniques
  • 33. Victims of fraud • Cross (2013) – discourse surrounding online fraud is heavily premised on idea that victims are both greedy and gullible – need to examine discourse on ‘victim blaming’ in online fraud – current discourse does not take into account the level of deception and the targeting of vulnerability that is employed by the offender in perpetrating this type of crime
  • 34. Victims of fraud • Cross (2015) – interviews with 85 seniors across Queensland, Australia, who received fraudulent emails, – victim-blaming discourse as an overwhelmingly powerful and controlling discourse about online fraud victimization. – humour reinforces this discourse by isolating victims and impacting on their ability to disclose to those around them. – Identifying and challenging this victim-blaming discourse, as well as the role of humour and its social acceptance, is a first step in the facilitation of victim recovery and future well-being.
  • 35. Victims of fraud • Cross (2015) How to tackle cyber crime before people even know they’re a victim (The Conversation) – Project Sunbird
  • 36. Project Sunbird • Identification – police identify people who are sending money to five known high-risk countries • Intervention – Department of Commerce send a letter to each person, notifying them that they may be victims of fraud • Interruption – stoppage of payments and funds • Intelligence – from letter recipients from both agencies • Investigation – police on local and overseas offenders
  • 37. cybercrime targeting Banks • CEO fraud – ‘business e-mail compromise’ or “Fake President” • Bank malware • Ransomware & extortion • DDOS
  • 38. CEO fraud • FBI report January 2015 – October 2013 to August 2015 – Combined victims (US & non US): 8,179 – Combined exposed dollar loss: $798,897,959.25 – transfers reported to 72 countries; – majority of transfers to Asian banks located within China and Hong Kong
  • 39. CEO fraud - Scenario 1. Establish contact – impersonate a group executive (e.g. the president, CEO, CFO) or a trusted partner (e.g. lawyers, notaries, auditors, accountants etc.) o – contact a specific employee, manager, an accounts payable clerk 2. Urgent and exceptional request – request an urgent bank transfer of a large amount to a foreign bank account. 3. Persuasive dialog – Use of authority: It is an order to do this – Secrecy: This project is still secret and its success depends on this transaction – Valorization: I count on you for your efficiency and discretion – Pressure: The success of the project rests on your shoulders 4. Transfer order – Being unsuspicious, transfer will be done manually (using a direct phone call or fax to a bank). – does not follow the standard procedure but may be used by companies in urgent cases or for flexibility reasons as an alternative to the standard procedure.
  • 40. CEO fraud - Prevention 1. Inform staff that this fraud is ongoing 2. Test staff knowledge of extraordinary transfer procedure 3. Include 2FA in extraordinary transfer procedure 4. Ensure that staff know who CISO is
  • 41. banking malware • From Kaspersky Lab report Q3 2015 – blocked 625,669 online banking stealing attempts, which is 17.2% lower than in Q2 2015 – Windows 7 x64 Edition accounted for 42.2% of all banking Trojan attacks – 2,516 detected mobile banker Trojans, which is a fourfold increase on the previous quarter
  • 42. Ransomware and extortion • Increasingly directed at banks – DDOS • take down website (embarrassing) – Exfiltration • will release customer data if not paid
  • 43. Ransomware and extortion • Hackers Release Swiss Bank Data Over $12K Unpaid Ransom (BloombergBusiness) – small-scale demand -- $12,000 prevalence and ease of a rapidly growing extortion industry that deals in stolen or hijacked data • Hacker who demanded Bitcoin from banks jailed for blackmail and child pornography (TheJournal) – used a phishing program to obtain customer banking details before threatening to release them if he was not paid
  • 44. Blackmail • “The Ultimate Invasion of Privacy” (Slate) – “How a Chinese hacker used my private nickname, personal emails, and sensitive documents to try to blackmail me.” – US businessman working in China
  • 45. Ransomware and extortion • Bitcoin cyberextortionists are blackmailing banks, corporations (arstechnica) – intended to harass, extort and ultimately embarrass the victim publicly – between 1 and 100 bitcoins (about ÂŁ160 to ÂŁ16,000), a deadline for compliance, and warning of a “small, demonstrative attack.
  • 46. EU Directives • Network and Information Security • General Data Protection Regulation – Both in the pipeline for some time and still being negotiated • Both have certain issues around mandatory reporting of data breaches, whether to customers or regulators, depending on the size and nature of the organisation • Reputational risk is clearly a very significant factor here
  • 47. COMBATING CYBERCRIME Strategies for improving internal organisational security
  • 48.
  • 49. • Emphasis should be on delegation and empowerment of employees – “an autocratic stance inhibits effective information security and highlights ways that this is expressed by experienced Chief Information Security Officers through their use of discourse. They need to develop an identity within the organisation where they are seen to help employees discuss, and make decisions about, information security. The emphasis should be on delegation and empowerment of employees with an acceptance that, as a result, mistakes and errors may occur. (Ashenden & Sasse, 2013) • Photo from http://www.freeimages.com/photo/ducks- in-a-row-1316756
  • 50. • Select a champion – not necessarily a technical expert – but who can motivate and persuade – “The results of this study give credence to the role of a ‘champion’ within the organization, specifically alluding to the influence this person may have in motivating employees to engage in actions involving IT” (Johnston & Warkentin, 2010a) • Photo from http://www.gratisography.com/#whimsical
  • 51. • “...findings suggest that religiosity and values can play important roles in compliance in the domain of information security... Recognizing and appealing to these beliefs and values can help security managers encourage individuals to be more compliant with the policies set forth by their organization.” (Kelecha & Belanger, 2013) • Photo from https://pixabay.com/en/book-skin- knowledge-key-840647/
  • 52. • appealing to fear does impact intention to comply with infosec, but the impact is not uniform – “....suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence.” (Johnston & Warkentin, 2010b) • Photo from https://pixabay.com/en/police- security-safety-protection-869216/
  • 53. COnclusion • You are the weakest link • Your organisation is already compromised – the only question is to what degree • Mandatory reporting is on its way • Ongoing threats require ongoing security • Link information security with human resources
  • 54. Thank you! www: ciaranmcmahon.ie e: info@ciaranmcmahon.ie twitter: @cjamcmahon linkedin: @cjamcmahon
  • 55. Further reading • Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82, 69–82. http://doi.org/10.1016/j.ijhcs.2015.05.005 • Ashenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy? Computers and Security, 39(PART B), 396–405. doi:10.1016/j.cose.2013.09.004 • Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391–408. http://doi.org/10.1177/0004865814521224 • Cross, Cassandra (2013) “Nobody’s holding a gun to your head. . . ” examining current discourses surrounding victims of online fraud. In Richards, Kelly & Tauri, Juan (Eds.) Crime, Justice and Social Democracy : Proceedings of the 2nd International Conference, Crime and Justice Research Centre, Queensland University of Technology, Queensland University of Technology, Brisbane, QLD, pp. 25-32. • Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204. http://doi.org/10.1177/0269758015571471 • Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94–100. http://doi.org/10.1145/1290958.1290968 • Johnston, A. C., & Warkentin, M. (2010a). The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions. Journal of Organizational and End User Computing, 22(3), 1–21. doi:10.4018/joeuc.2010070101 • Johnston, A. C., & Warkentin, M. (2010b). Fear Appeals and Information Security Behaviors: an Empirical Study. MIS Quarterly, 34(3), 549–A4. • Kelecha, B., & Belanger, F. (2013). Religiosity and Information Security Policy Compliance. AMCIS 2013 Proceedings. Retrieved from http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/13 • Parrish, J. L., & San Nicolas-Rocca, T. (2012). Toward Better Decisions With Respect To Is Security: Integrating Mindfulness Into IS Security Training. In pre-ICIS workshop on Information Security and Privacy (SIGSEC) (pp. 12–15). Retrieved from http://aisel.aisnet.org/wisp2012/17 • Rocha Flores, W., Holm, H., Nohlberg, M., & Ekstedt, M. (2015). Investigating personal determinants of phishing and the effect of national culture. Information and Computer Security, 23(2), 178–199. http://doi.org/10.1108/ICS-05-2014-0029 • van Wilsem, J. (2011). “Bought it, but Never Got it” Assessing Risk Factors for Online Consumer Fraud Victimization. European Sociological Review, 29(2), 168–178. http://doi.org/10.1093/esr/jcr053