34
2015 Pindrop Security. Confidential. TRANSACTIONAL INSURANCE FRAUD THREATS Matt Garland, Vice President of Research Pindrop Security August 26, 2015

Transactional Insurance Fraud Threats

  • Upload
    pindrop

  • View
    496

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

TRANSACTIONAL INSURANCE FRAUD THREATS

Matt Garland, Vice President of ResearchPindrop SecurityAugust 26, 2015

Page 2: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

NOTE

These slides are from a webinar held August 26,

2015.

You may view a recording of the webinar at

www.pindropsecurity.com/webcast-archive

Page 3: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

Physical

THE PHONE IS THE WEAKEST LINK

1995 2010

Page 4: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

Physical Online

THE PHONE IS THE WEAKEST LINK

1995 2010

Page 5: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

Physical PhoneOnline

THE PHONE IS THE WEAKEST LINK

1995 2010

Page 6: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE VULNERABILITIES

Page 7: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

CUSTOMER SERVICE REPRESENTATIVES

• Human Element• Social Engineering• Focused on customer

service

Page 8: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

KNOWLEDGE BASED AUTHENTICATION

• Social Media• Online Black Markets• Data Breaches• High Failure Rates (15-

15%)

Page 9: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

CALLER ID / ANI

• Easy and cheap to spoof caller ID and ANI

Page 10: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

VOICE BIOMETRICS

• Voice Distortion• Background Noise• Call Quality• Enrollment• Privacy Issues

Page 11: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

THE GROWTH OF PHONE FRAUD

Page 12: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

RISING PHONE FRAUD

Page 13: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

PHONE FRAUD RATES

Avg. C

all C

enter

Banks

Brokera

ges

Credit C

ardReta

il

Mobile

Dev

ice In

suran

ce1 in 2200 1 in 2650 1 in 3000

1 in 900 1 in 1000

1 in 300

Page 14: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

FRAUD EXPOSURE

Banks Brokerages Credit Card Mobile Device Insurance

$0

$2,000,000

$4,000,000

$6,000,000

$8,000,000

$10,000,000

$12,000,000

$14,000,000

$16,000,000

Page 15: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

OTHER LOSSES

Reputational Risk

Page 16: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

OTHER LOSSES

Customer Privacy /Data Breaches

Reputational Risk

Page 17: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

OTHER LOSSES

Customer Privacy /Data Breaches

Customer ExperienceReputational Risk

Page 18: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD TECHNIQUES

Page 19: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD STEPS

Reconnaissance Account Takeover Fraud Triggers Monetize the Attack

Page 20: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD STEPS

Reconnaissance Account Takeover Fraud Triggers Monetize the Attack

Page 21: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD STEPS

Reconnaissance Account Takeover Fraud Triggers Monetize the Attack

Page 22: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PHONE FRAUD STEPS

Reconnaissance Account Takeover Fraud Triggers Monetize the Attack

Page 23: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

RECONNAISSANCE

• Identify policy holders• Determine policy value• Collect KBA answers

Page 24: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

ACCOUNT TAKEOVER

• Change contact information• Reset password• Setup online account

Page 25: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

REDUCE FRAUD TRIGGERS

• Verification intercept

Page 26: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

MONETIZING ATTACKS

• Loans or surrenders of policies

• Loans or liquidation of retirement accounts

• File fraudulent claims

Page 27: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

DETECTING PHONE FRAUD

Page 28: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

BEST PRACTICES

Track Phone Fraud

Page 29: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

BEST PRACTICES

Track Phone Fraud Detect Phone Fraud

Page 30: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

BEST PRACTICES

Track Phone Fraud Detect Phone Fraud Authenticate Callers

Page 31: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

LOSS• Packet loss • Robotization • Dropped frames

SPECTRUM• Quantization • Frequency filters• Codec artifacts

NOISE• Clarity• Correlation • Signal-to-noise ratio

147 audio features

UniquePhone

Geo-Location Risk Factors

PHONEPRINTING™

Phoneprint™

Call AudioRequires 15 seconds

of call audio

Risk Score

Call Type

Page 32: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

RISK BASED AUTHENTICATION

Quick verification of good calls reduces call

time and improves customer satisfaction

Bad callers are flagged and losses stopped

Page 33: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.2015 Pindrop Security™. Confidential.

CONCLUSION

• The phone channel represents the weakest link for transactional fraud attempts

• Phone channel fraud is a significant and increasing risk for insurance providers

• Best Practices• Monitor and track fraud back to phone channel• Use PhoneprintingTM to detect phone fraud• Implement risk-based authentication

Page 34: Transactional Insurance Fraud Threats

2015 Pindrop Security™. Confidential.

PINDROP SECURITYPhone Fraud Stops Here.

For more information contact [email protected]