Advertisment

Growing Menace

author-image
DQI Bureau
New Update

The dynamics of the fraud scenario is changing worldwide. IT in general and
Internet in particular, is emerging as the key battleground perpetrating fraud.
Therefore, technology today, is becoming the key enabler of frauds, making it
simpler to conduct and more difficult to counter.

Advertisment

The variety of criminal activities, which can be committed with or against
information systems, has become surprisingly diverse in the last couple of
years.

While the worldwide scenario on cyber frauds looks bad, the situation in
India isn't better either. Though no concrete data is available, it is roughly
estimated that the cyber crime witnessed an increase of about 40-50% in 2005.

Driving Factors

According to Deepankar Sanwalka, executive director and head of Forensic at
KPMG India, IT's role in frauds has grown significantly, considering the fact
that more and more information for the corporates is residing in the IT systems
such as ERP and databases.  

Advertisment

The online criminal activity has also grown significantly with the increase
in software security flaws. According to California-based research company,
Cupertino, last six months (early 2006) have witnessed a record 1,862 new
software vulnerabilities. Rakesh Mittal, president and COO of Corbus feels that
security holes in Web-based programs are serious threats for businesses.
Attackers can use them to bypass security measures such as Internet firewalls.
Cyber fraudsters are now looking at exploitation of code vulnerabilities in
popular programs such as Microsoft Windows. These include 'zero-day'
attacks, which take advantage of security vulnerability on the same day that the
flaw becomes generally known.

Who's at Risk?

According to Kartik Shahani, director, Sales, India and SAARC, McAfee,
enterprises dealing with both their internal as well as customer sensitive data
would be at risk, as the information could be used for getting financial gains.
Arpinder Singh, director, Forensic at KPMG India believes that the prevalence of
cyber threats is the highest among the IT/ITeS and the financial sector. He
adds, the average age of the employees, specifically in IT and BPO, is
relatively younger and they use Internet widely. A greater technical know-how
further helps. “However, this doesn't rule out the growing cyber fraud
menace in other industry segments, especially biotech, pharma, and FMCG where
information on pricing, costing, and R&D are extremely critical and at high
risk to be prone to theft,” adds Singh.

Changing Dynamics of Cyber Frauds

According to Mittal, for the new generation of financially motivated
hackers, 2006 has brought numerous opportunities to develop more sophisticated
methods. Cyber fraud is emerging in the form of electronic vandalism, terrorism,
extortion, stealing telecommunications services, telecommunications piracy,
pornography, telemarketing fraud, electronic fund transfer crime, and electronic
money laundering. Surendra Singh, head, South East Asia and India, Websense says
businesses are now facing a new type of information security threat whose
characteristics are less widespread in number, more insidious, better-targeted,
financially-motivated, and driven by organized crime.

Advertisment
Guidelines
for the CIO
  • Risk profiling
    should be done and countermeasures be taken.

  • Regulatory and
    Compliance Mandates be put in place.

  • Process for audit
    and is reviewed at regular intervals. Audits carried as frequently as
    possible.

  • Process though
    stringent must not be so complex and cumbersome that the users cannot
    get the desired productivity.

    -Kartik Shahani, director,Sales, India and SAARC, McAfee

Expected
Future Trends in Cyber Fraud
  • Increase in use of
    Really Simple Syndication (RSS) to circumvent frequent updates and
    patches.

  • Increase in cases
    of theft of corporate data: As personal information used for identity
    theft becomes more difficult to steal, we anticipate increased
    interest in cyber theft of corporate roadmaps, plans, and engineering
    schematics, diagrams.

  • Web-borne worms and
    blogs will continue to be avenues for exploitation

  • Criminals will take
    advantage of Web scripting languages and unpatched machines to launch
    worms.

  • Voice over Internet
    protocol (VoIP) phishing or vishing.

  • Online gaming
    consoles that connect to the Internet for updates may be open to
    creative exploits designed to co-opt computer resources for attacks.

    -Surendra Singh, head, South East Asia and India, Websense

The trend of bot-led denial-of-service attacks has also increased at an
alarming rate. There has also been a shift towards profiting from current
events, in particular, donation scams for natural disasters. Prime examples were
sites purporting to collect donations for Tsunami or Hurricane Katrina victims.
'Virtual Social Networks' or 'Network of Friends' such as Ringo, MySpace,
Hi5, Plaxo, and Bebo etc can be used for frauds.

Identity Theft: A Growing Scourge

From the early days of 'dumpster diving' to sophisticated online fraud,
identity thieves are always on the prowl for new ways to steal information. The
growing ubiquity of digital data has resulted in an exponential increase in
identity theft over the last 2-3 years. And even, while it continues to remain
mostly under wraps with few cases being reported. Identity theft is becoming
more sophisticated.

Advertisment

Considering the growing complexity and economic impact of the threat, it is
time for the enterprises to graduate to primary defense mechanism such as
role-based management system (role-based access control). According to Navin
Agrawal, practice head, Security Governance, Wipro Infotech, the enterprises
need to concentrate on developing authentication tools around the application
processes, and on the back end, instituting better data-sharing practices, and
streamlining consumer reporting requirements.

Growth Statistics

If you thought that it could not happen to you, think again. Identity theft
is becoming more rampant. As reported by some surveys, the incidence of
victimization caused by identity theft increased from11% to 20% in 2001-2002 and
80% in 2002—2003. The manifold growth continues, say experts.

Experts feel that the increase in identity theft cases is being seen
in India as well. However, as Singh points out, such cases are still
highly under-reported for fear of harassment and negative publicity According to
Capt Felix Mohan, director of SecureSynergy, identity theft has become an
epidemic of frightening proportions as it becomes the number one consumer crime
in the US with someone losing ones identity every two-and-a-half seconds. “In
India concrete statistics on the extent of identity theft is not available, it
would be fair to assume a rapid escalation in identity theft and fraud with
increase in the number of net banking and e-commerce transactions,” he adds.

Advertisment

However, he further cautions that while the common perception is that the
largest risk of identity theft is while buying online, surveys have found that
most of the identity fraud is committed by someone who knows the victim.

Growing Threat Areas

Phishing, pharming, pretexting, skimming, card-not-present fraud, keystroke
catchers, database theft, mail theft, and stealing from residence have grown
considerably in the last 2-3 years.

Cyber
fraudsters are now looking at exploitation of code vulnerabilities in
popular programs such as Microsoft Windows
Advertisment

Phishing is the Internet's biggest identity theft scam and is widely
prevalent in India and has emerged as the primary method used by eCriminals to
extract identities. As per Websense's Web@work survey conducted in India in
2005, almost one in four employees (23% out of the 400 surveyed) stated that
they have given out financial, personal, or confidential data, such as corporate
network passwords or social security numbers, as a result of a phishing

attack.

Effective Remedy

Lack of adequate security can lead to breach, which in turn can lead to huge
damages, both tangible and intangible, for both individuals and enterprises.

This has resulted in a growing traction towards technology tools such as
identity management to safeguard against identity theft. However, technology
tools need to be effectively complemented with the adoption of the right policy
framework for an effective prevention, say experts.

Advertisment

Identity management solutions include access control, directory services,
directory services, and profile update, management of identities. Elaborating on
the trends in the identity management space, Agrawal points out that access
control and profile update are among the promising new technologies in this
domain. He adds that some of the mature and widely deployed technologies
are directory services, especially those using light-weight directory
access protocol (LDAP), password management, Web access management, and Web
single sign-on. “These technologies have significant install bases in
production, and demonstrate real and measurable RoI,” he explains.

To counter identity theft and fraud at a broader and national level, Capt.
Mohan suggests the government to focus on three areas, i.e. legislating specific
provisions to counter identity theft, enabling flow of information from credit
bureaus to consumers, and implementing an identity fraud alert registry.

The IT Act 2000 in its present form does not have any specific provision to
deal with identity thefts. However, the Expert Committee on Amendments to the IT
Act 2000 (whose report is presently under consideration by the government) has
recommended insertion of new sections relating to identity theft in the Indian
Penal Code (IPC). The committee has also sought provisions
for fine and punishments.

Shipra Arora

shipraa@cybermedia.co.in

Advertisment