to advance the use of electronic payments, it has also become the
hunting ground of cyber criminals on an increasing scale. The
payments industry is fighting back in what has become a war between
technology experts on opposing sides.
Committee of the UK’s House of Lords pronounced the internet to be
“the playground for criminals”. The committee went on to slam all
involved in internet security for taking a “laissez-faire
attitude”.
point of view – it reflects that of the general public,” David Dix,
an electronic payments expert at UK security solutions specialist
Cryptomathic, told EPI.
done by banks and others in the payments market to enhance
security.”
measure being influenced by data regularly released by payments
industry body APACS revealing startling and sharply-rising online
fraud losses. In 2007, according to APACS, card-not-present (CNP)
fraud in the UK totalled £290.5 million ($500 million), up 37
percent compared with 2006. Of the total, online fraud accounted
for £223.8 million (77 percent), an increase of 44.9 percent. The
balance of CNP losses was accounted for by telephone and mail-order
fraud.
UK not alone
The UK is far from alone. Indicative of a similar problem in the
US, for instance, research undertaken by the Center for American
Progress and the Center for Democracy and Technology estimated that
internet fraud resulted in total losses of $7.1 billion in 2007, up
39 percent compared with 2006.
first half of 2008 with APACS reporting CNP fraud losses of £161.9
million, up 18 percent compared with the first half of 2007. And it
is a rising trend Dix believes is set to continue.
problem,” said Dix. “They want to access their money from anywhere
and a lot of those channels are via the internet.”
context of the rise in online shopping.
terms of online retail spending,” he stressed. “Retail spending is
rising at a faster pace than fraud losses – it indicates that fraud
prevention steps are having a positive effect.”
2000 and 2007, for example, online shopping payment card
transactions increased from £3.5 billion to £34 billion, a CAGR of
38.4 percent. This compared with a CAGR of 21.8 percent for total
CNP fraud losses over the period. APACS’s estimate of online
shopping in the UK could be conservative. Notably, an estimate made
by global electronic retail industry body the Interactive Media in
Retail Group (IMRG) put total online spending in the UK in 2007 at
£46.6 billion.
retail spending, UK shoppers have continued to flock to online
retailers’ websites. According to IMRG online sales in the UK in
the first half of 2008 increased by 38 percent compared with the
first half of 2007 to £26.5 billion. This growth increased online
spending to 17 percent of total retail purchases, up from 15
percent during the pre-Christmas 2007 shopping season.
robust growth with APACS reporting the number of adults using
online banking increased between 2000 and the end of 2007 from 3.5
million to 21 million, or two out of three adults with an internet
connection.
No room for complacency
Despite the growing numbers of online shoppers and bankers there is
no room for complacency. In its report on online security the House
of Lords’ Science and Technology Committee warned: “The internet
relies on the confidence of millions of users, and that confidence
is in danger of being undermined unless we can reverse the trends
our witnesses told us about.”

US Tariffs are shifting - will you react or anticipate?
Don’t let policy changes catch you off guard. Stay proactive with real-time data and expert analysis.
By GlobalDataconfidence, a study undertaken by market research firm YouGov
revealed that in 2006, 3.5 million people in the UK had fallen
victim to online fraud, a figure that represents about one in ten
internet users. Of those affected 1.2 million were victims of
online banking or credit card fraud.
using a credit card online was provided by a survey undertaken in
January 2008 by Finnish internet security specialist
F-Secure.
in the US, Canada, the UK and France felt their credit cards were
secure when shopping online while in Germany a mere 15 percent felt
the same.
towards online banking with 65 percent of respondents in the US,
Canada, the UK and France reporting confidence in the security of
their online banking. However, again German’s were far from
convinced with only 28 percent of respondents in Germany reporting
they were confident in the security of their online banking.
online banking is no doubt a reflection of a concerted and well
publicised effort by banks to enhance online security, particularly
in the area of customer authentication. Initial online banking
security using passwords proved vulnerable and in 2005 prompted US
federal regulators to issue a guidance that set banks searching for
enhanced security systems.
consider single-factor authentication, as the only control
mechanism, to be inadequate.”
the day. In the UK, for example, in March 2006, Alliance &
Leicester became the first UK bank to announce a two-factor
solution, PassMark, comprising a small image displayed during
log-in to the bank’s website which would assure customers the site
was genuine and thus safe to enter passwords.
announcing it would supply online business customers with key
ring-sized token devices developed by Swiss security specialist
Vasco that generate a single use security code. In July 2007,
Barclay’s followed this up with the launch of PINsentry, a
hand-held PIN and chip card two factor authentication device
developed by Dutch digital security specialist Gemalto. By July
2008, more than 1.5 million PINsentry devices had been deployed, an
uptake representing half of the bank’s online customers and 30
percent higher than original expectations.
success has been achieved by XIRING. In July 2008 the French
security solutions vendor reported that in 18 months it had
supplied 4 million of its Xi-Sign hand-held PIN and chip card
readers to UK banks, a total representing four out of every five
two-factor devices in use in the UK.
the UK appears to be reflected in fraud related online banking
losses in 2007 which, according to APACS, totalled £22.6 million, a
decrease of 33 percent compared with losses of £33.5 million in
2006.
dramatic reversal of this promising picture in the first half of
2008 with APACS reporting total online banking fraud losses of
£21.4 million, up 185 percent compared with the first half of
2007.
and many other two-factor authentication mechanisms did have a
positive impact on the UK CNP fraud figures in 2007, said Dix.
However, he continued, introduction of new authentication
mechanisms has been relatively slow and limited in its coverage.
For example, chip and PIN readers have only been issued by a
selection of banks so far.
two-factor authentication has mainly been implemented for online
banking log-on and some funds transfer transactions. Thus although
the initial roll out helped the banks in these areas there are
still some CNP transactions (mail order, telephone order and some
internet transactions) which are not yet secured by the new
technology.
weakest link,” stressed Dix. “The initial roll out focused on the
then biggest areas of fraud loss. Now secured, the fraudsters are
looking for the next weakest link to exploit.”
significant degree of success from its two-factor initiative and an
intensive campaign to educate and assist online customers including
offering them free comprehensive internet security software.
initiatives resulted in a 91 percent drop in the money lost to
fraudsters from 2006 to 2007. In addition Barclays is the only UK
bank to have seen a reduction in the number of phishing attacks.
However, two-factor hand-held devices have one major
drawback.
around with them,” noted Dix.
many banks are keen on a product developed by US vendor Innovative
Card Technologies (InCard) said Dix. In essence, InCard’s solution
is a conventional payment card that incorporates a button that when
pushed generates a one-time password that is displayed on small
screen on the front of the card.
is too expensive, said Dix.
cost of the solution to counter fraud must be less than the cost of
the fraud itself,” he said.
Mobile solutions
In their quest for a cost-effective and convenient solution for
customers many banks are looking to mobile phones as a potential
two-factor solution, said Dix.
solutions are making their appearance. One of these is Celo, a
two-factor authentication solution developed by UK online security
services company Commerce Media.
Defence’s (MoD) Disposal Services Authority which sells surplus
equipment, Commerce Media’s MD Michael Robertson told EPI. Celo, he
added, was designed to replace a token device, that had previously
been used by the MoD.
with Celo,” continued Robertson. “It is simple, secure and scalable
and needs no special hard- or software – just a mobile
phone.”
to a bank’s website a one-time user password (OTP) is automatically
sent to his or her mobile phone, email account, or via instant
message. When prompted by the web application, the OTP is entered
by the user. The user decides the length and complexity of the
password and its validation period, which could be a few minutes,
hours or days.
advantages, including significant savings achieved by obviating the
need for hand-held devices and lower ongoing system running
costs.
issues. For example, said Robertson, research has shown that it is
not unusual for bank customers to keep their hand-held security
device in the same bag as their laptop computer. By contrast,
people invariably have their mobile phone on them, he added.
to the efficacy of Celo.
and it came through with flying colours,” said Robertson.
already a big user base in the private and public sectors
undertaking trials with Celo.
Under siege
Solutions such as Celo come at a time when criminals are mounting
an unprecedented assault on online commerce and banking. This is
evident in data from APACS that reveals phishing attacks at luring
customers of UK banks into disclosing sensitive information
increased almost three-fold to 20,682 between the first half of
2007 and the first half of 2008.
warned in October that “major attacks” are on the rise.
growing threat, banding together to pool their expertise and carry
out coordinated cyber attacks,” said Shawn Henry, assistant
director of the FBI’s Cyber Division, in a statement.
gang wants to rob a bank, it needs criminals with various skills –
safe cracker, get-away driver, look-out and so forth – essentially
what is found in the cyber world today, only virtual gang members
have never met in the physical world.
successful,” said Henry.
the Dark Market Website (DMW), is out of action and 56 of its
members in custody thanks to action taken by the FBI and the UK’s
Serious Organised Crime Agency. At the time of the arrests some $70
million in compromised victim accounts was at risk.
transnational network of criminals involved in buying and selling
of stolen financial information including credit card data, login
credentials and equipment used in financial crimes. At its peak the
DMW had over 2,500 registered members.
becoming more sophisticated in areas such as social engineering
which is, in essence, the ability to deceive people into divulging
confidential information. Phishing attacks are the most common form
of social engineering but not the only one.
social engineering attacks occurred in 2007 and was described by
internet security developer McAfee in a recent report.
received an email that appeared to have originated from the bank.
The email offered anti-spam software to the customers, 250 of whom
downloaded and installed what was in fact a Trojan virus that
enabled the criminals to collected customer information, log into
the bank’s web site and steal money. The world’s biggest online
theft on record the scam resulted in Nordea losing $1.1
million.
Jeff Green, a senior vice-president at McAfee’s Avert Labs, said:
“Cybercriminals are crafting attacks that are virtually impossible
for computer users to identify.
and other attacks are so personalised that even someone with the
most watchful eye could fall for a carefully socially-engineered
trap.”
“socially engineered spam [emails] will explode”. For example, it
is predicted that criminals will use information collected from
data breaches to fake customer loyalty programmes or offer
discounts to recent shoppers.
fraud, the French government has announced it is investigating the
theft of money from French president Nicolas Sarkozy’s online bank
account. His bank faces the prospect of some form of punishment for
not preventing the security breach.
when banks find themselves under pressure to increase security. In
July 2008, for example, the House of Lords called on the government
to enact legislation that would underpin UK banks’ liability for
customer losses resulting from online crime.
environment is the extent to which spending on technology in
general and security in particular will fare.
it is often security and testing that suffers first,” said
Dix.
SECURITY
Mifare Classic smartcard’s security flaws put out on public
display
In an academia version of ‘publish and be dammed’, researchers from
the Digital Security group of the Radboud University Nijmegen (RUN)
in the Netherlands have made public their research paper detailing
serious security flaws of the world’s most widely used radio
frequency identification (RFID) smartcard, the Mifare
Classic.
made their paper, Dismantling MIFARE Classic, public at the
European Symposium on Research in Computer Security 2008 conference
in Malaga, Spain on 6 October.
legal attempts by Netherlands-based NXP Semiconductors (NXP), the
developer of Mifare Classic, to prevent Jacobs and his team going
ahead.
found weaknesses in the authentication mechanism of the Mifare
Classic in March this year. Their announcement followed a similar
claim made by in December 2007 by German researcher Henryk Plötz
who in August 2008 submitted his findings to the Humboldt
University in Berlin in the form of a 100 page thesis. His thesis,
in German, is freely available on the internet.
Of particular significance in the RUN
team’s findings was that they were able to reconstruct the Mifare
Classic card’s CRYPTO1 encryption algorithm “in detail” and
discovered “a relatively easy method to retrieve cryptographic
keys, which does not rely on expensive equipment,” noted the
researchers.
mounting an actual attack, in which a Mifare Classic access control
card was successfully cloned,” the researchers added.
its findings NXP said it had “an open dialogue” with the RUN and
other researchers on the MIFARE Classic’s security and had “taken
the lead in communicating the effects of attacks and possible
countermeasures to industry partners who need to know”.
matter.
MIFARE Classic or migrating to a different card format, are complex
system modifications which may involve a combination of hardware
and software in the cards as well as in the infrastructure and
back-end equipment,” conceded NXP.
particular system security requirements – take up to a number of
years, it is not conceivable that all MIFARE Classic
infrastructures have their security upgraded to the necessary level
yet.”
contactless smartcard commands a 70 percent global market share
according to NXP.
has been highly successful in public transport where it accounts
for 80 percent of all electronic tickets.
that have deployed the card include those in London (Oyster),
Netherlands (OV-chipkaart), Boston (Charlie Card) and Beijing (One
Card).