Security Experts:

Connect with us

Hi, what are you looking for?


Fraud & Identity Theft

Managers, Accountants More Likely to Commit Insider Fraud in Financial Sector: Study

Experienced, mid-level employees may be the ones to watch when it comes to insider fraud in financial organizations, according to a recent report from Carnegie Mellon University.

Experienced, mid-level employees may be the ones to watch when it comes to insider fraud in financial organizations, according to a recent report from Carnegie Mellon University.

On average, insiders are on the job for more than five years before they start committing fraud, the authors wrote in the “Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector” study, released July 30. The study, funded by the the U.S. Department of Homeland Security in conjunction with the CERT Insider Threat Center at CMU’s Software Engineering Institute and the United States Secret Service, found that it takes employers nearly three years to detect illegal activities by employees.

The authors examined technical and behavioral patterns from 80 fraud cases that occurred between 2005 and 2012. Of the analyzed cases, 67 were caused by insiders and 13 fell under external fraud. While the sample size was very small, the study highlighted some interesting patterns across the fraud cases.

The researchers compared the technical security controls commonly used to prevent internal and external attacks, Dougla Maughan, director of the cyber security division at the Homeland Security Advanced Research Projects Agency at the Department of Homeland Security, wrote in the report. The researchers developed “insights and risk indicators of malicious insider activity” within the banking and finance sector. “Their findings can be used to inform risk management decisions being made by government and industry and to support law enforcement in cybercrime investigation,” Maughan said.

Insider FraudMost insiders committing fraud generally took a “low and slow” approach in order to avoid being detected, the report found. Taking more time also helped these fraudsters generate more damage, as they were able to operate for a longer period of time. About half the cases analyzed lasted for 32 months or less and had an average monetary impact of $382,750, researchers found. In contrast, the other half, which lasted longer than 32 months, had an average actual monetary impact of $479,000.

Insiders did not employ very technically sophisticated methods for fraud. Nearly 93 percent of the fraud incidents were executed by employees who did not have privileged access to organizational systems or hold a technical role within the organization, Randy Rtzeciak, technical lead of the Insider Threat Research team at SEI and one of the authors of the paper said in a statement.

In more than half of the cases, the insider was authorized to access the systems, or had access previously. In a few cases, insiders used a non-technical method to bypass authorized processes, the report found.

Managers caused the most damage in these insider fraud cases, with an average of $200,105 in actual damages, the report found. In contrast, non-managers caused $112,188 in damages on average. Manager-initiated fraud also lasted longer, about 33 months, compared to the 18-month average by non-managers.

However, accountants also bear some watching. Accountants caused an average of $472,096 in damage and managed to avoid being detected for as long as 41 months, the report found.

Most incidents were detected through an audit, because a customer complained, or a colleague because suspicious. Nearly 41 percent of incidents were detected through routine or impromptu auditing, and only six percent of the cases were detected by software or other types of fraud-detection systems.

“Many people think that insider crimes can be addressed solely by technical controls, but the most effective way to prevent and detect insider crimes is to make it an enterprise-wide effort to master both the technical and behavioral aspects of the problem,” Trzeciak said.

Employers should log, monitor, and audit employees’ online activity, as well as restrict access to PII, the authors recommended. Employers should also “pay special attention to those in special positions of trust authority,” such as managers and accounts, they wrote.

The full report is available here.

Written By

Click to comment

Expert Insights

Related Content


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.


US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...


The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.


The owner of China-based cryptocurrency exchange Bitzlato was arrested in Miami along with five associates in Europe

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...