CATO is a fast growing electronic crime where thieves obtain log-in credentials to corporate on-line banking accounts and fraudulently transfer funds from corporate bank accounts.
Businesses should protect themselves against CATO in several areas:
- Domestic and International Wire Transfers
- Business-to-Business ACH Payments
- Online Bill Payments
- Electronic Payroll Payments
The following is a helpful list of key terms to be aware of and practical tips that will provide guidance on what steps you can take to prevent CATO for your business:
How does CATO work?
- Fraudsters target victims by scams using phone calls, text messages or e-mails.
- Fraudsters may pose as the FDIC, IRS, Better Business Bureau, NACHA, Banks or other organizations requesting personal or account information, the installation of software or user’s access credentials.
- Victim unknowingly installs malware by clicking on a hyperlink, visiting an infected website, or opening a file or zip file.
- Installed malware collects and transmits a victim’s log-in credentials to the fraudsters.
- Fraudsters initiate a funds transfer from the victim’s account.
Social Engineering:
Social Engineering refers to manipulating, influencing or misleading people into performing actions for the purpose of divulging confidential information, data gathering, fraud, or system access.
Email:
Some experts believe e-mail is the biggest security threat of all. It’s the fastest, most effective method of spreading malicious software to the largest numbers of users... victims. Be on the lookout for electronic greeting cards, chain letters, jokes, graphics, spam and junk e-mail.
Other Red Flags to watch out for:
- Don’t recognize the sender or the sender’s e-mail address.
- The e-mail address is from a suspicious domain.
- The e-mail is unexpected, unusual or out of character.
- E-mail was addressed to a mixed group of people.
- The subject is irrelevant or doesn’t make sense.
- Hovering over a hyperlink reveals an address for a different website.
- Hyperlink or e-mail address is misspelled.
- E-mail arrived at an unusual time of the day/night.
- E-mail contains bad grammar and/or spelling errors.
- E-mail requests the opening of a file, zip file, clicking on a link, providing sign-on credentials or personal or confidential information.
- In general, the e-mail seems suspicious, out of place, or unusual.
Malware:
Short for malicious software, it is software designed to infiltrate a computer system without the owner’s knowledge or informed consent. Malware includes computer viruses, worms, Trojan horses, spyware, dishonest adware, ransomware, scareware, crimeware, most rootkits and other unwanted malicious software. Malware can be found in malicious websites (including Social Networking and Video Sharing websites), e-mail, Person-to-Person (P2P) downloads, and in ads on popular websites.
Ransomware/Scareware:
This form of malware deceives or misleads users into paying for the fake, simulated or actual removal of malware and Is a growing and serious security threat.
- Mainly relies on social engineering in order to defeat the security software.
- Most have a Trojan Horse component which users inadvertently install on their PC.
- Trojan Horse sources – browser plug-ins (toolbars), web image downloads, screensavers, zip files, video clips, shared software, free on-line malware scanning services.
Phishing:
Phishing is the criminally fraudulent process of attempting to acquire sensitive information (usernames, passwords, credit card details) by masquerading as a trustworthy entity in an electronic communication. Be wary of commonly received communications pretending to come from:
- Social websites
- Auction sites
- Banks
- Payment processors
- Websites
- IT Administrators
Tips for Detection and Protection
- Educate - provide security awareness training for employees.
- Communicate basic on-line security standards to staff.
- Stay informed through newsletters, webinars, seminars and publications.
- Make note of any changes in the performance of a user’s PC.
- Do not open attachments, files or links from suspicious e-mail addresses.
- Do not use public internet access points with company owned equipment.
- Secure PCs and network.
- Limit internal administrative rights.
- Install and maintain spam filters, virus protection & fraud detection software.
- Use routers and firewalls to prevent unauthorized access.
- Install security updates to operating systems and applications.
- Use pop-up blockers.
- Back-up data daily.
- Perform penetration testing.