Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Fraud & Identity Theft

Managers, Accountants More Likely to Commit Insider Fraud in Financial Sector: Study

Experienced, mid-level employees may be the ones to watch when it comes to insider fraud in financial organizations, according to a recent report from Carnegie Mellon University.

Experienced, mid-level employees may be the ones to watch when it comes to insider fraud in financial organizations, according to a recent report from Carnegie Mellon University.

On average, insiders are on the job for more than five years before they start committing fraud, the authors wrote in the “Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector” study, released July 30. The study, funded by the the U.S. Department of Homeland Security in conjunction with the CERT Insider Threat Center at CMU’s Software Engineering Institute and the United States Secret Service, found that it takes employers nearly three years to detect illegal activities by employees.

The authors examined technical and behavioral patterns from 80 fraud cases that occurred between 2005 and 2012. Of the analyzed cases, 67 were caused by insiders and 13 fell under external fraud. While the sample size was very small, the study highlighted some interesting patterns across the fraud cases.

The researchers compared the technical security controls commonly used to prevent internal and external attacks, Dougla Maughan, director of the cyber security division at the Homeland Security Advanced Research Projects Agency at the Department of Homeland Security, wrote in the report. The researchers developed “insights and risk indicators of malicious insider activity” within the banking and finance sector. “Their findings can be used to inform risk management decisions being made by government and industry and to support law enforcement in cybercrime investigation,” Maughan said.

Insider FraudMost insiders committing fraud generally took a “low and slow” approach in order to avoid being detected, the report found. Taking more time also helped these fraudsters generate more damage, as they were able to operate for a longer period of time. About half the cases analyzed lasted for 32 months or less and had an average monetary impact of $382,750, researchers found. In contrast, the other half, which lasted longer than 32 months, had an average actual monetary impact of $479,000.

Insiders did not employ very technically sophisticated methods for fraud. Nearly 93 percent of the fraud incidents were executed by employees who did not have privileged access to organizational systems or hold a technical role within the organization, Randy Rtzeciak, technical lead of the Insider Threat Research team at SEI and one of the authors of the paper said in a statement.

In more than half of the cases, the insider was authorized to access the systems, or had access previously. In a few cases, insiders used a non-technical method to bypass authorized processes, the report found.

Managers caused the most damage in these insider fraud cases, with an average of $200,105 in actual damages, the report found. In contrast, non-managers caused $112,188 in damages on average. Manager-initiated fraud also lasted longer, about 33 months, compared to the 18-month average by non-managers.

However, accountants also bear some watching. Accountants caused an average of $472,096 in damage and managed to avoid being detected for as long as 41 months, the report found.

Advertisement. Scroll to continue reading.

Most incidents were detected through an audit, because a customer complained, or a colleague because suspicious. Nearly 41 percent of incidents were detected through routine or impromptu auditing, and only six percent of the cases were detected by software or other types of fraud-detection systems.

“Many people think that insider crimes can be addressed solely by technical controls, but the most effective way to prevent and detect insider crimes is to make it an enterprise-wide effort to master both the technical and behavioral aspects of the problem,” Trzeciak said.

Employers should log, monitor, and audit employees’ online activity, as well as restrict access to PII, the authors recommended. Employers should also “pay special attention to those in special positions of trust authority,” such as managers and accounts, they wrote.

The full report is available here.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Fraud & Identity Theft

Famed hacker Kevin Mitnick has died after a battle with pancreatic cancer.  At the time of his death, he was Chief Hacking Officer at...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

Deepfakes, left unchecked, are set to become the cybercriminals’ next big weapon

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.