ABCs of UEBA: F is for Fraud

prevent and detect fraud blog

Enterprise fraud detection and prevention management platforms have been around for years, but many legacy platforms lack the capabilities to make critical data associations and identify anomalous behaviors of user accounts. However, recent advancements in a range of technologies from Big Data to machine learning have coalesced to help detect and prevent fraud. This is built with a new kind of advanced fraud analytics platform born from UEBA technologies.

Cybersecurity Breaches Lead to Fraud

Banks have suffered losses tied to abuses of the SWIFT system due to their own cybersecurity breaches that allowed account takeovers. Attackers obtained and used the credentials of bank employees who had legitimate authority to initiate and approve payment transfer transactions. To SWIFT, the instructions appeared to be normal because, for all intents and purposes, they came from authorized user accounts.

The common theme among these attacks is the lack or failure of measures that could detect the account takeovers that eventually enabled the payment transfers. In all these cases of the SWIFT system abuse, if an advanced fraud analytics platform with user and entity behavior analytics (UEBA) capabilities had been in place, the fraud could have been prevented.

UEBA Can Help Detect and Prevent Fraud

Machine learning can be used to analyze millions of datapoints. They come from a variety of siloed, cross-channel sources, such as a core banking system (CBS) and the SWIFT system. By linking data from these disparate systems in a Big Data system, anomalous behavior can be identified quickly. For example, if payments are made from the CBS but there are no corresponding activities reported as required by SWIFT, this is not normal procedure. This mismatch of activities would raise a high priority alert to prompt immediate investigation to detect and prevent fraud.

Now consider instances where malicious actors gain access to legitimate credentials. It might not seem possible to detect that payment instructions aren’t being directed by the authorized employee, but this is where UEBA comes into play. Behavioral analytics look at everything about a specific user identity. This is including what his network and application permissions are. When and where he typically performs his work activities. And what device he commonly uses, and so on.

Can steal an identity but can’t steal behavior

While it’s possible for a hacker to gain access to a worker’s login credentials – and thus assume his permissions and privileges – it’s not possible to mimic everything else about the worker’s behavior. A hacker wouldn’t use the worker’s computer and his IP address, or have the same work schedule and the same geolocation. Those variations in behavior would raise an alert, and the bank could activate an immediate mitigation such as dropping the person’s access to the payment transfer system.

The fraud detection measures are completely unobtrusive to workers performing their legitimate duties. Yet the speed and accuracy of identifying, prioritizing and alerting on high-risk activity can drive corrective or response actions in other systems based on the value of the risk score. Such actions can be automatic to take place in real time or near real time; for example, to put a hold on the SWIFT funds transfer until the alert details can be investigated.

Fraud Use Cases

While there are many different fraud use cases, the theme that is common among them is that organizations want the ability to do cross-channel fraud detection. They want to be able to aggregate and link more data coming from many different systems. It is this cross-channel capability that shines a brighter light on not just transactions but also subtle behavioral activities. Including peer group analysis that would otherwise go undetected.

Here are just a few examples.

Insider Fraud Detection and Prevention

An organization’s insiders, especially those with privileged access to sensitive systems and data, pose a serious risk to financial organizations. UEBA analyzes and creates user baselines based on various data elements. For example, an identity profile data, system entitlements and activities performed by users.

It looks at activities from disparate data sources including:

  • HR events
  • Physical badge access
  • Security alerts from Endpoint Protection Platforms and Data Loss Prevention solutions
  • Document repositories
  • Sensitive data access
  • Internet activities
  • Core banking systems transactions

In case of any deviation from the normal baseline behavior such as suspicious loan applications submission or approvals, transaction overwrites, emails to competitor domains or self-personal emails, unusual physical access to sensitive areas, etc., an alert is generated with appropriate risk score. Based on the risk score, data criticality, resource and transaction risk levels, the system provides automated response workflow to ensure rapid action and risk mitigation.

Transaction Fraud

One challenge of managing transaction fraud is having the visibility into all stages and elements of a given transaction across disparate and disconnected systems. UEBA can flag any process related control failures. This is due to inconsistent or abnormal transactions across disconnected processes or systems such as core banking and SWIFT. This enables banks to potentially prevent and block significant financial frauds.

Gurucul MinerTM, a natural language-based search engine, provides a simple but powerful tool to analysts and auditors to gain 360° identity-centric visibility across all systems. It also pivots on any of the data elements such as account number, type of transactions, amounts and so on for any further investigation or periodic risk assessment.

Customer Service Representative (CSR) Fraud

A form of insider fraud, Customer Service Representative fraud consists of insiders in customer service. They have privileged access to a wide range of customer accounts. As a result, performing fraudulent activities which impact an organization’s brand reputation or cause financial loss.

A mature UEBA solution allows ingestion of data from a wide range of sources. This includes ticketing systems, VoIP phone data, badge access data, workstation events and network events which link to the user identity. This allows detection of CSR fraud scenarios including abnormal data transfer and unusual pattern of activities. In addition, customer profile changes without corresponding ticketing or service request, malicious in-bound or out-bound phone activity, session time, etc.

Detect and Prevent with Gurucul Fraud Analytics

Gurucul has spun off a new product tailored to predict, detect and prevent fraud and other financial crimes. Gurucul Fraud Analytics provides a holistic risk-based approach for fraud detection of both internal and external users, using award-winning machine learning algorithms and an open big data architecture. Its data science architecture creates a unique risk score for each internal user, customer or provider entity. It uses context-driven sensors from public and private data and transactions. It ingests both structured and unstructured data and aggregates risk context for intelligent predictive fraud detection.

Our Fraud Analytics platform can link data from a multitude of sources to provide a contextual view. In addition, it highlights anomalous transactions based on historic user and community profiles. It analyzes online and offline activity. This includes public records, contact center interactions, point of sale transactions, ATM transactions, and so on. Gurucul Fraud Analytics mines and normalizes data and then creates a risk score for fraud and abuse. It’s best for real-time decision making or batch scoring of an event. It also can provide scores and risk factors for other systems to use in a decision.

Share this page:

Related Posts