Combatting Account Takeover Fraud & Remote Access Trojans
Recent months have seen significant innovation by cybercriminals in performing banking fraud. A combination of new tools and tactics have challenged traditional fraud controls.
In this live webinar we will review some of the latest threats and how they can best be mitigated:
- Use of RATs (Remote Access Trojans) - How RATs bypass security measures such as second factor authentication and device identification;
- RATs for sale - Intel from the cybercrime underground on latest RAT toolkits;
- The effects of data breaches - with millions of compromised records for sale, cybercriminals can easily use stolen data to gain access to victims accounts;
- Latest tactics in obfuscation and evasion tactics.
In the webinar we will also share best practices and case studies on successful combats with the latest generation of threats.
Recent months have been good for cybercriminals targeting financial institutions. Several high profile fraud campaigns have reportedly broken through security controls and caused tens of millions of dollars in losses.
The success of those campaigns is due in large part to a new generation of innovative fraud tools designed to evade detection.
Malware is more "security aware" than ever, and is able to evade or circumvent even the most advanced controls.
In some cases such as with the "Dyre" Trojan the fraud toolkit is used by a single malware. But in other cases, toolkits are offered for sale on underground markets for all to buy.
RATs (Remote Access Trojans) in particular have grown up from levering basic remote access capabilities in operating systems, to broad functionality and often hard to remove toolkits.
Join Ori Bach, Senior security strategist at IBM Trusteer for an insightful session on this latest trend and how to best prepare for it.
You might also be interested in …