Electronic banking services directly or indirectly operate with money. And where there is money, there will always be those who want to steal it. Of particular interest among cybercriminals are the systems of remote banking services for legal entities, since significant amounts of money are accumulated in the accounts of the latter.
To protect against theft of cash in such systems, it is usually necessary to solve the following main tasks: to verify the authenticity of the user, as well as the authenticity and integrity of the electronic document expressing the user's intention. In practice, such a document is a payment order, among the details of which are given the amount of funds and the account of the recipient.
These tasks are traditionally solved with the use of strong two-factor authentication and electronic signature, made in the form of USB tokens or smart cards (hereinafter referred to as tokens).
Tokens in our market can be divided into 2 types.
When using a token of the first type, a key theft can be implemented in at least two ways.
After the key is “in the hands” of a cybercriminal, the latter gets the opportunity to sign any fake documents on this key. Theft of funds in this case can be realized by imposing on the banking service the fake payment orders signed on the key of the legal client of the bank, in which the account of the recipient of funds is indicated to the account of the cybercriminal or persons connected with it. A particular danger when a container is hacked is the possibility of unregulated replication of a private key. Signing transactions with it becomes possible from any computer .
When using a token of the second type, with a non-recoverable electronic signature key, this token reliably protects the key from theft. However, cybercriminals with the help of malware, taking into account the specifics of the attacked system, learned to sign fake documents without stealing keys.
You can reduce the risks of such attacks by strictly following security policies:
Such an approach could be justified in a closed corporate environment controlled by security administrators. However, in the mass market, users are unlikely to follow all these rules. It is expensive and requires special knowledge and skills. Moreover, even the fulfillment of all these rules still cannot guarantee the protection against cybercrime attacks.
The need for additional protection against fraudsters is known to both banks and the regulator. This problem is quite relevant. In particular, according to Kommersant information dated July 14, 2016 . The Ministry of Finance and the Central Bank have prepared new amendments to protect bank customers from unauthorized operations. The amendments propose to give banks the right to suspend transactions if there is a suspicion that the transaction is performed without the consent of the client, despite the correct PIN-code and the use of a real electronic signature . Those. the scale of the disaster is such that the legislator explicitly permits fraud and prepares recommendations for countering it.
To protect against theft of cash in the RB systems, banks are introducing additional measures.
Server anti-fraud systems that use certain mathematical models, including machine learning technologies, taking into account the accumulation of data, can eventually reduce the likelihood of errors of the first (false alarm) and second (skipping real attack) births, which positively affects their effectiveness . The advantage of such antifraud systems from the point of view of users of Internet banking is that such systems, as a rule, do not change the usual way for the user. The user has worked with the system and continues to work, he is not required to perform additional actions. In the event of the detection of suspicious transactions on his cash account, they contact him and request confirmation. Nevertheless, the risk of missing attacks is preserved, as cybercriminals invent more sophisticated attack methods. Moreover, in a targeted attack, even if the antifraud system detects a suspicious transaction, the cybercriminal can know in advance the client’s phone number to which the bank will call to confirm the transaction, and redirect the call to his phone. The fact that the redirection of calls is quite possible and is not something fantastic, it was written here . If we are talking about large sums of money, then such an attack becomes fully justified in terms of costs.
In fairness, it is worth noting that there are solutions on the market that can further identify people by voice. A more common version of the name of this technology contains the word “identification”, and not “authentication”, which even Google hints at:
Identification is usually used to present its identifier, and authentication is used to prove that the subject is who he claims to be.
Voice identification does not guarantee that the client of the bank is at that end. There are technologies and even ready-made solutions for voice cloning . And it is quite possible that cybercriminals already know how or in the near future they will learn to fake the voice of a “victim” in such a way as to successfully deceive recognition systems. However, voice recognition is another echelon that reduces the risk of theft of funds.
Trust Screen-device, as a rule, has a small size, equipped with a screen and (optional) buttons. It is used on the client side, its main task is to enable the user to confirm (or reject) the transaction in a trusted environment, different from the computer environment in which the payment documents are created. The classic script for using Trust Screen devices looks like this:
The advantage of using such devices is that if they are correctly implemented and correctly integrated into the application software, the risk of theft of funds is significantly reduced.
The weak link in the correct implementation remains the user. The possibility of theft of funds in this case is determined by how responsibly the user compares the details on the Trust Screen device. If, during intensive work, to force him to confirm hundreds of documents every day, the user can begin to do it automatically, without paying enough attention to what is displayed on the device screen. In this regard, the scenario of integrating such devices into banking systems should pay particular attention to the convenience of their use.
Fortunately, there is a good way to significantly reduce the number of documents that need to be confirmed on a Trust Screen device without compromising security. The solution is to use white lists of trusted counterparties. Such a list includes those contractors with whom the user works regularly and whom they trust. The greater the proportion of such counterparties, the fewer transactions are required to further confirm. If out of 100 transactions about 90 will be sent to the address of the trusted counterparties, then the user will need to confirm only 10 out of 100.
Many banks have been practicing the use of such lists for a long time and without using Trust Screen devices to increase trust in transactions. In some cases, such lists are created by banks for each client on the basis of the history of his interaction with counterparties. In other cases, banks provide users with the opportunity to create such lists themselves.
What is important when working with white lists is how this list is created and changed. If a cybercriminal can unauthorized add himself to the “white list”, the whole idea of ​​such lists becomes void. For example, if a “white list” is prepared by a user in an untrusted environment, then such a list cannot be trusted.
Some time ago we brought to the market the Trust Screen Device Antifraud Terminal . This product was developed by us in conjunction with the company VASCO, was based on the well-proven device DIGIPASS 920 , which was sold worldwide in quantities of more than a million pieces. That is why the Antifrod Terminal looks so much like it.
The peculiarity of Antifrod terminal is that the device:
The transaction log is not permanently stored in the device. The antifraud terminal begins to keep a journal every time when the so-called "start" begins. SWYX-device operation mode. SWYX means Sign What You eXecuted - I sign what is being done. At the end of the SWYX mode, the terminal signs the log of its own ES and returns it along with the signature to the application software. To control the SWYX mode, there are special commands that the application software sends to the terminal.
Before being issued to the client, Antifrod Terminal is registered in the accounting system of the bank with reference to its public key. The corresponding private key of the terminal is non-recoverable and is stored on the cryptographic chip embedded in the terminal.
After signing the document and confirming its key details on the Antifraud terminal, the client application software sends to the server not only the signed document, but also the signed transaction log. The server verifies the document signature and journal signature. Verification of the signature of the journal allows you to make sure that the user is working with a trusted, registered terminal and protects the client from counterfeit devices. After the terminal is authenticated, the server verifies the details from the signed document with the details confirmed by the user on the Antifraud terminal (from the terminal-signed journal), and if they match, it accepts the document for execution.
The transaction log is stored on the bank’s server for the ability to handle conflict situations and investigate incidents.
The presence of such a journal is also an additional motivation for customers to be more attentive to the confirmation procedure, since the journal can later be used by the bank as an evidence base.
To protect against “laziness of customers”, Antifrod Terminal has additional control that the user has read all the data that was displayed on the terminal screen. If the data does not fit on one screen, the terminal will not allow confirming the operation until the user scrolls to the end. This is also important from the point of view of the evidence base, since such an implementation allows, if necessary, to prove that the user personally scrolled all the data to the end, checking all the details, and confirmed the operation, having familiarized himself with all the details.
The transaction log of Antifraud Terminal contains a special Reference field for storing the identifier of a payment document. When you create and save a payment document, the server assigns it an identifier. When confirming the details of this document, on the Antifraud Terminal, the application software on the client side calls the command, which contains this identifier as part of the parameters. The terminal, together with the data that the client has confirmed on the device, records this identifier in the Reference field. When checking the log, the server additionally checks that the identifier of the payment document on the server matches the identifier from the Reference log field.
This implementation allows you to protect yourself from intercepting the journal and attempting to reimpose it, along with copies of documents that have already been approved once. Such an imposition could lead to an empty account. But the identifier reliably binds the journal to a specific copy of the payment document.
The first version of Antifraod Terminal as a means of electronic signature was only able to work with smart cards that were connected directly to the device. However, in the Russian market for many years, a sufficiently large installation base of ES facilities, made in the form of software SKZI and / or USB tokens, has accumulated. And the transition to new types of ES funds takes time and additional costs for both banks and end customers.
In this regard, we have developed a new version of Antifrod-terminal, which does not impose any restrictions on the type of ES used. This may be a software SKZI, storing the key in the registry or on a conventional USB flash drive, software SKZI, storing the key EP on an alienable USB-token, and USB-token with non-recoverable key EP, and an ISO 7816 smart card.
How did we manage to achieve this? The architecture of Antifraud-terminal allowed to completely separate the function of signing a document from the confirmation function at Antifrod-terminal. The work with the ES tool is carried out independently of the Antifraud Terminal. The ES tool does not know anything about the presence of Antifraud terminal, and the Antifrod terminal does not know anything about the type of ES tool used, it does not need it.
If a USB token is used as a means of electronic signature, then it is connected to one USB port of the PC, and Antifrod terminal is connected to another. The application software works with USB-token as with the means of electronic signature, and with Antifrod-terminal - as with the means of trusted confirmation of the key details of the document.
To shorten the documents that need to be confirmed at the terminal, you should use the “white lists” of trusted counterparties.
It is important that Antifraod terminal allows you to safely create and modify such lists. It is enough to confirm all operations related to the change of the “white list”, including its creation, at the Antifraud Terminal. This protects against unauthorized changes to the “white list” by cybercriminals.
When performing a group operation, it suffices to confirm the consolidated payment order to all counterparties that are on the white list, and each order to counterparties that are not on the white list.
A consolidated payment order may contain:
Confirmation of such a consolidated payment order allows you to protect against attacks aimed at emptying the company's account in favor of trusted contractors (for example, in tax).
The client signs and confirms at the terminal each of the remaining payment orders.
Antifraud terminal allows you to display on your screen any text data up to 400 characters.
This allows you to confirm not only payment documents, but also the signing of arbitrary unstructured documents. For such documents, the key data of such documents should be displayed on the Anti-fraud terminal, which may be, for example, the essential terms of contracts and agreements. For example:
Due to the fact that the signing operation is logically separated from the confirmation operation, it is still possible to sign a real document, and not some kind of structure that includes this document or hash from this document. This allows users, after signing the document in their account, to see the real signed document and a separate signature from this real document.
When reviewing server antifraud systems, it was noted that in case of detection of suspicious transactions made using, for example, a simple electronic signature, it becomes necessary to contact the client to confirm or reject the operation. As we have already said, calling the client by phone does not guarantee that the client himself will confirm the operation, since the cybercriminal can redirect the call to his phone and even try to tilt the client’s voice.
The described problem of trusted confirmation of suspicious transactions can be successfully solved by Antifrod-terminal. It is enough to notify the client about the need to confirm the operation and request this confirmation via the Antifrod-terminal.
When the terminal is integrated into the application software, the modifications are performed on the client and on the server side.
The integration feature is that the modifications do not change the current implementation of the signing of payment documents, but complement it.
Before the usual signing of the document, the application program additionally:
After the usual signing of the document, the application program additionally:
The server receives from the client not only a payment document, but also a signed transaction log.
After the usual verification of the document signature, the application program additionally:
In the client profile, the transaction log is saved (needed when parsing conflict situations).
Thus, a legally significant evidence base (with a strengthened electronic signature) is additionally formed on the server that the client received this document, saw it and confirmed signing on its (received in the bank in its name) terminal.
To integrate Antifraud Terminal into application software, two types of development kits are prepared:
Source: https://habr.com/ru/post/311596/
All Articles