security and fraud in financial services for emerging ... · design model design tools and best...

39
Security and Fraud in Financial Services for Emerging Digital Economies Sam Castle University of Washington Seattle, USA Advisors: Richard Anderson, Franzi Roesner

Upload: others

Post on 19-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

Security and Fraud in Financial Services for Emerging Digital Economies

Sam CastleUniversity of Washington

Seattle, USAAdvisors: Richard Anderson, Franzi Roesner

Page 2: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

More than 2 billion people have no access to financial services.

2

Source: McKinsey Quarterly, 2010; WDR 2016

In developing countries, 8 out of 10 people now have access to a mobile phone.

Page 3: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Digital technologies are spreading rapidly in developing countries

3

Individuals with mobile phone access

Source: 2016 World Development Report

Technology use

Page 4: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Page 5: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

● Savings● Peer-to-peer transactions● Payments● Loans● Remittances● G2P Salary payments● Utilities payments

What are digital financial services?

● Efficiency of payments● Safe savings● Small business funding● Planning for fees and financial shocks

Why are they useful?

Page 6: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Kenya’s M-Pesa payment system reached 80 % of households within 4 years

6

0

5

10

15

20

25

Cost of sending US$100 domestically in Kenya in 2008

Cost

(U

S$

)

Source: WDR 2015

Page 7: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

USSD SMS Internet

What are digital financial services?

Bank/Financial Institute Bank of America, Standard Chartered Bank

Telecommunication Company Verizon, Safaricom

3 rd Party Software Company Paypal, Google Wallet

Page 8: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Source: WorldRemit, Uganda

Page 9: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Security & Privacy in DFS

Prior work from Reaves et al.: “The majority of these apps fail to provide the protections needed by financial services...threatening to erode trust in branchless banking and hinder efforts for global financial inclusion.”

Trust

Consistency

Growth

Page 10: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Security Landscaping in DFS

11

Measure current fraud

Measure current fraud

Threat Model Design

Threat Model Design

Tools and best

practices

Tools and best

practices

In-depth:SMS

Phishing

In-depth:SMS

Phishing

Developer InterviewsDeveloper Interviews

Analysis of

Services

Analysis of

ServicesVulnerabilitiesVulnerabilities

ExploitsExploits

Page 11: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

PART 1: MOBILE APP SECURITY

Measure current fraud

Measure current fraud

Threat Model Design

Threat Model Design

Tools and best

practices

Tools and best

practices

In-depth:SMS

Phishing

In-depth:SMS

Phishing

Developer InterviewsDeveloper Interviews

Analysis of

Services

Analysis of

ServicesVulnerabilitiesVulnerabilities

ExploitsExploits

Page 12: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Goal: Understand vulnerabilities in mobile money deployments

1. Design of Threat Model Particular to Mobile Money2. General Security Analysis– 197 decompiled Android apps– Automated detection of permission requests, version requirements, external libraries, and HTTPS URL

usage

3. In-depth Analysis– 71 apps, including Android and USSD-based–Manual assessment of relevant properties, including KYC requirements, password reset procedures, SMS

usage

4. Developer Interviews– No of Developers: 7– Average Interview duration: 45 min– Questions: Experience, Org Structure, Training and Security Processes

Threat Model Design

Threat Model Design

Tools and best practices

Tools and best practices

Developer InterviewsDeveloper Interviews

Analysis of Services

Analysis of ServicesVulnerabilitiesVulnerabilities

App Security Overview

Page 13: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Threat Modeling

14

Threat Model Design

Threat Model Design

Tools and best

practices

Tools and best

practicesDeveloper InterviewsDeveloper Interviews

Analysis of Services

Analysis of ServicesVulnerabilitiesVulnerabilities

Confidentialityprotection of customer information

Confidentialityprotection of customer information

Availabilityreliable access to services

Availabilityreliable access to services

Integrityincorruptibility of data

Integrityincorruptibility of data

External AppsExternal Libraries

MITMSMS SpoofingAgent-driven Fraud

Data LossDoSDevice Theft

Page 14: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 15

Android apps contain numerous HTTP URLs.

Page 15: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 16

...and known tracking libraries

Chen et al., Oakland 2016.

Page 16: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 17

Percent of Apps

Over-privilege

Page 17: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 18

Manual Analysis of 71 Services

Page 18: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 19

• Goal: Understand the source of vulnerabilities• Contacted 249 email addresses• Location: Nigeria, Kenya (2), Uganda, Zimbabwe, Colombia (2)• Organizations: Bank (2), Telco (3), Software Company (2)• Mostly large organizations

Developer Interviews

Page 19: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 20

I don’t believe there is anything that’s perfect and free. If you include someone’s library and it is very good, you have to ask yourself why is he giving it out for free?

1. Stack Overflow used “almost in all projects”

2. External Libraries

Developer Interviews

Page 20: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 21

You will find a market where a gang of criminals exposed a particular human hack and made off with 2 million dollars. Then there will be this uproar and the government will just make a piece of regulation that requires customers to go to the customer service location and present 7 forms of ID and their mother’s DNA...That’s emerging markets for you.

3. Partners and Regulations

Developer Interviews

We did one crazy one in West Africa where they didn’t use any [encryption]. We made them sign documents seven ways to Sunday because we were worried about [security]. What you’ll find in these markets is that you have an IT person, and you are forced to work to their level of expertise.

Page 21: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

PART 2: DEVELOPER TOOLS

Measure current fraud

Measure current fraud

Threat Model Design

Threat Model Design

Tools and best

practices

Tools and best

practices

In-depth:SMS

Phishing

In-depth:SMS

Phishing

Developer InterviewsDeveloper Interviews

Analysis of

Services

Analysis of

ServicesVulnerabilitiesVulnerabilities

ExploitsExploits

Page 22: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

• Resources for Best Practices– Document domain-specific security practices

• Developer Self-Assessment Tools– Build tools to provide relevant feedback on potential

vulnerabilities in Android and USSD apps– Leverage prior research on automated Android analysis– Combine manual developer analysis for nuanced issues,

such as PIN recovery

24

Goals for Developer Tools

Page 23: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu25

35 static analysis tools since 20118 dynamic analysis tools since 2012 Source: Reaves et al.

Page 24: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Framing

26

Data

Device Loss/Theft Man-in-the-Middle Customers Stealing Data

1. How are users authenticated?2. Account tied to SIM?3. Account recovery?

1. How is data encrypted?2. Are offline transactions permitted?

1. SSL/TLS?2. Are zero-rated URLs properly protected?

Page 25: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

4-digit PIN

Account Linked to SIM

Incorrect SSL/TLS ...

UsabilityNo memory

Infrequent errors

SecurityResilient to throttled guessing

Resilient to phishing

ScalabilityNo cost per user

Compatible

Mapping Responses to Analysis

27

Page 26: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Sample output for Developer tools

● Key Issues:– SSL/TLS vulnerability– Data storage on Device

● Particular threats:

28

Data

Page 27: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

PART 3: FRAUD INMOBILE MONEY

Measure current fraud

Measure current fraud

Threat Model Design

Threat Model Design

Tools and best

practices

Tools and best

practices

In-depth:SMS

Phishing

In-depth:SMS

Phishing

Developer InterviewsDeveloper Interviews

Analysis of

Services

Analysis of

ServicesVulnerabilitiesVulnerabilities

ExploitsExploits

Page 28: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 30

fraud /frawd/ n.

1. wrongful or criminal deception intended to result in financial or personal gain

‘He was convicted of fraud.’

spam /spam/ n.

1. unwanted or intrusive advertising on the Internet

‘Well could I have her spam instead of the baked beans then?’

SMS-driven Fraud

Source: OED

Page 29: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 31

SMS-driven Fraud

Page 30: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Spam Blocking

32

Page 31: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

• We collected 106 SMS Examples

• Major categories: promotions, receipts, and loan offers

33

Preliminary Findings

Page 32: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 35

Page 33: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu 36

Page 34: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Shinda Ma-Mili na Stori Ibambe!Dial *460# to get more information on the Shinda Ma-Mili Promotion. Hit your STORO target and stand a chance to win.

Shinda Ma-Mili na Stori Ibambe!Dial *460# to get more information on the Shinda Ma-Mili Promotion. Hit your STORO target and stand a chance to win.

Shinda Ma-Mili na Stori Ibambe!Dial 0780000520 to get more information on the Shinda Ma-Mili Promotion. You’re the lucky win.of ksh100,000 DOT PAY ANY!

Shinda Ma-Mili na Stori Ibambe!Dial 0780000520 to get more information on the Shinda Ma-Mili Promotion. You’re the lucky win.of ksh100,000 DOT PAY ANY!

KKJ6A94PXJD Confirmed.You have received Ksh 4,530.00 from SAM CASTLE on 29/11/16 at New M-PESA balance is Ksh *(PENDING)* Pay bills via M-PESA.

KKJ6A94PXJD Confirmed.You have received Ksh 4,530.00 from SAM CASTLE on 29/11/16 at New M-PESA balance is Ksh *(PENDING)* Pay bills via M-PESA.

KGK49RRT70 Confirmed. You have received Ksh16,065.00 from SAM CASTLE on 20/7/16 at 5:20 AM. New M-PESA balance is Ksh16,115.00. Buy goods with M-PESA.

KGK49RRT70 Confirmed. You have received Ksh16,065.00 from SAM CASTLE on 20/7/16 at 5:20 AM. New M-PESA balance is Ksh16,115.00. Buy goods with M-PESA.

Receipts

Promotions

Page 35: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

Dear Customer KCB M-PESA Soft loan now is Available at 0.5%interest 15%saving. KSH. 50,000 100,000 250,000 Call/text on: 0789783835 KCB Making the Difference.

Dear Customer KCB M-PESA Soft loan now is Available at 0.5%interest 15%saving. KSH. 50,000 100,000 250,000 Call/text on: 0789783835 KCB Making the Difference.

Loans

Loans

Dear Customer, your M-Shwari loan limit is Kshs. 1,000. To access your limit, present your ID at a Safaricom shop to update your details. http://bit.ly/2aVHAgJ

Dear Customer, your M-Shwari loan limit is Kshs. 1,000. To access your limit, present your ID at a Safaricom shop to update your details. http://bit.ly/2aVHAgJ

DA10HM222 Confirmed. Your M-Shwari loan request is approved. New M-PESA balance is Ksh 1,155.00.

DA10HM222 Confirmed. Your M-Shwari loan request is approved. New M-PESA balance is Ksh 1,155.00.

Dear Customer, we have applied a rollover fee of Ksh 337.50 on your loan which is now overdu.Your loan balance is Ksh 5,171.29 and due date was 10/04/16.

Dear Customer, we have applied a rollover fee of Ksh 337.50 on your loan which is now overdu.Your loan balance is Ksh 5,171.29 and due date was 10/04/16.

Page 36: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

dfs.cs.washington.edu

• A user study to collect a larger data corpus.

• Understand people’s ability to detect phishing SMS.

• Develop and deploy SMS-fraud detection and mitigation tools.

Next Steps

Page 37: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

CONCLUSIONS

Measure current fraud

Measure current fraud

Threat Model Design

Threat Model Design

Tools and best

practices

Tools and best

practices

In-depth:SMS

Phishing

In-depth:SMS

Phishing

Developer InterviewsDeveloper Interviews

Analysis of

Services

Analysis of

ServicesVulnerabilitiesVulnerabilities

ExploitsExploits

● Incorrect SSL/TLS and rampant over-privilege.

● Need better security-related resources.

● Combination of automated and manual assessment.

● Phishing is common in practice.● Main categories are promotions, loans, and fake

receipts.● URLs and phone numbers (not misspellings)

indicate fraud.● Twitter is a valuable data source.

Page 38: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

Thanks to the ICTD Lab and Collaborators

Page 39: Security and Fraud in Financial Services for Emerging ... · Design Model Design Tools and best practices Tools and best In-depth: SMS Phishing Developer Interviews Analysis of Services

Questions

Sam CastleUniversity of Washington

Seattle, USA