SDBA eNews winter

December 18, 2024

ABA Banking Journal: Time and communication are crucial in spotting fraudulent transactions

December 10, 2024 | Beth Tancredi

Capturing These Three Data Types Can Transform Your Fraud Monitoring

“Fraud as a service” is a growing business in which criminals commit fraud by offering tools, services and infrastructure for a fee. Often found on the dark web, in recent years this model has become prominent on social media channels as well, turning unwitting as well as witting participants into “money mules” who help traffic money to criminals through bank accounts.

Although financial losses due to fraud schemes for individuals over the age of 60 have increased from $500 million in 2018 to almost $3.5 billion in 2023, victims are not limited to the senior demographic.

Schemes on social media channels such as TikTok and Instagram trend toward younger demographics, offering too-good-to-be-true get-rich-quick opportunities in which the victim transfers money from their own account to the criminal’s account with the promise of getting more money in return.

With a rise in synthetic identity fraud, even infants and toddlers can be targets of money mule scams. For this scam, criminals create bank accounts using fake names, addresses, burner phone numbers and social security numbers stolen from people often too young to have a credit history. This allows fraudsters to establish credit and open deposit accounts, while appearing as a legitimate individual and bank customer.

“Criminals creating synthetic identities are playing the long game,” says Jim Hitchcock, VP for fraud mitigation at American Bankers Association, “They’ll just ride it out as long as they can without any loss. As long as no one discovers it, they might continue to let it buffer, or, if it’s not used for credit, they will open a deposit account that can sit dormant until they’re ready to use it.”

In an ABA webinar, Anne Entwistle, senior trial attorney for the Department of Justice Consumer Protection Branch, cited explosive growth in transnational crime organizations targeting U.S. consumers as one reason for the uptick in romance, lottery fraud and government imposter scams.

Because these transactions appear as authorized push payments, they are often accepted as legitimate and are not flagged as fraudulent.

“We often don’t know that a transaction is fraudulent until the customer reports it,” Jim Hitchcock adds., “Money from these transactions moves back out of the accounts quickly. We generally have a 72-hour window before that money leaves the account for good – and that window is shrinking.”

“If a consumer suspects they have been the victim of a scam in which money is moved out of their account and they are not in any physical distress or harm, they should notify their bank first,” Hitchcock adds. “For more extreme circumstances in which someone unwittingly became a money mule, consumers and bankers should report it to the FBI Internet Crime Complaint Center. But that 72-hour window is key.”

Red flags that signal fraud

While individual banks, alone, cannot solve the issue of financial scams and fraudulent transactions, understanding what to look for is one step toward thwarting potential criminal activity.

Stagnant accounts with sudden deposits or withdrawals could be an indication of use of synthetic identities.

Velocity of funds or an unusual amount of money leaving an account often mean fraud. A noticeable increase in the number of transactions or an unusual amount of money leaving an account, especially through peer-to-peer money transfer apps such as Zelle or Venmo, could suggest fraudulent activity on the account.

While much of the focus to date has been on monitoring activity from the sending back, “We believe we can discover a lot from the bank at the receiving end too,” Hitchcock explained.

Protecting the bank and its customers

One of the most effective ways of protecting customers from fraudulent transactions is to slow down the process.

Take the time to name match the name on both the sender and receiver end. Not only does this help ensure the legitimacy of the transaction, but it also creates a bottleneck for the money to hop to another account before fraud can be discovered.

When possible, create alerts based on frequency of transactions in a given time period or for specific dollar amounts that may indicate a fraudulent transaction.

Share information with other banks. The Patriot Act gives banks safe harbor to share information on money laundering and terrorist financing.

“If I tell a bank this is happening to them, it’s happening to the bank next to them too,” Hitchcock says. “Always put competition aside when it comes to fraud and cyberattacks.”

This is especially important in cases of business email compromises, a type of phishing attack in which criminals gain access to work email accounts with the intention of stealing data or tricking someone into transferring money. These types of attacks generally target multiple banks at once, which means that strange activity at one bank is likely happening at another. Sharing that information enables banks to proactively look for suspicious transactions and stop them in their tracks.

“The bigger the gap in a notification of a fraud, the less likely we are to stop the money from moving,” Hitchcock adds.

To make the communication process easier, ABA’s Fraud Contact Directory enables banks to connect with other institutions to resolve warranty breach claims for checks as well as claims for unauthorized and/or fraudulent transfers for wires, ACH, RTP, or FedNow.

Banks also can access ABA resources and training to assist in educating employees and customers about scams. The more individuals know, the easier it will be to spot the warning signs and prevent fraud.

For consumer education ABA’s Safe Banking for Seniors offers bankers free resources designed to educate older people and their loved ones about how to protect their financial assets and identities. ABA’s Banks Never Ask That and Practice Safe Checks campaigns have been updated with new content.

The bottom line is that bank fraud is a global problem with a regional solution. The more educated that bankers and customers are at the local level, the better bankers and customers will be able to spot a scam before becoming a victim.

Beth Tancredi is a frequent contributor to ABA Banking Journal.

Full Article


FinCEN Warns of Fraud Schemes That Abuse Its Name, Insignia, and Authorities for Financial Gain

December 18, 2024

FinCENWASHINGTON—The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) issued an alert today to raise awareness of fraud schemes abusing FinCEN’s name, insignia, and authorities for financial gain. These FinCEN-specific fraud schemes include scams that exploit beneficial ownership information reporting; misuse FinCEN’s Money Services Business Registration tool; or involve the impersonation of, or misrepresent affiliation with, FinCEN and its employees.

“We are very concerned about reports of scammers using FinCEN’s name to perpetrate fraud schemes against the public for financial gain,” said FinCEN Director Andrea Gacki. “We urge the public to be vigilant in identifying and avoiding these schemes and to be extremely cautious when dealing with unsolicited correspondence. FinCEN and its employees will never threaten a member of the public by email, call, or text, or demand immediate payment for any reason.”

The alert provides guidance to the public on how to identify and avoid these scams and provides typologies and red flag indicators to help financial institutions detect, prevent, and report potential suspicious activity to FinCEN. Combating fraud is one of FinCEN’s Anti-Money Laundering and Countering the Financing of Terrorism National Priorities.

The public is reminded that any solicitations from individuals or entities abusing FinCEN’s name, insignia, or authorities, or impersonating a FinCEN employee should be reported to Treasury’s Office of Inspector General and the Federal Trade Commission. Victims of cyber-enabled government imposter scams should file a complaint with the Federal Bureau of Investigation’s (FBI) Internet Crime Complaint Center and file a report with their nearest FBI field office. Anyone with knowledge of fraud schemes involving victims who are age 60 or older can call the U.S. Department of Justice’s National Elder Fraud Hotline at 833-FRAUD-11 or 833-372-8311.

Questions regarding the contents of this alert should be sent to the FinCEN Regulatory Support Section by submitting an inquiry at www.fincen.gov/contact.

The full alert is available online at FIN-2024-Alert005.

Full Article


ABA Banking Journal: OCC: Cyber threats to financial institutions remain elevated

December 16, 2024

Banking sector, regulators announce joint effort to address AI risks

The federal banking sector remains sound, although banks’ operational risk remains elevated as evolving cyber threats target the financial services industry and their key service providers, the Office of the Comptroller of the Currency said today in its semiannual risk perspective.

The OCC report examined risks in several areas. Commercial credit risk remains moderate and shows signs of stabilizing, although the commercial real estate office sector remains stressed, according to the agency. Overall retail credit risk is stable, with delinquency and loss rates on residential real estate secured loans held by banks remaining historically low but increasing.

However, operational risk is elevated as cyber threat actors continue to evolve and refine their tactics by using more advanced technology, such as artificial intelligence, the OCC said. Banks also continue to engage with third parties, including financial technology firms, “expanding the cyberattack surface.”

“It is important that banks maintain effective change management and third-party risk management, including ensuring that third parties throughout the bank’s information technology supply chain are adhering to secure software development standards to reduce the risk of disruptions or compromises,” the OCC said in the report.

“Additionally, it is critical that banks and their service providers have effective threat and vulnerability monitoring processes and security measures, including the use of multi-factor authentication, hardening of systems configurations, testing software updates before implementation, phased rollouts of software updates, timely vulnerability patch management and immutable backups,” it added.

Full Article


ABA Banking Journal: Federal court blocks enforcement of beneficial ownership reporting rule

December 3, 2024

Helping business clients as beneficial ownership reporting deadline looms

Less than a month before a Jan. 1 deadline for businesses to report their beneficial owners to the Financial Crimes Enforcement Network, a federal judge in Texas has issued a preliminary injunction blocking enforcement of the requirement. The order states that covered companies nationwide do not need to comply with the Jan. 1 reporting deadline, unless the judge or a higher court reverses the order in the meantime.

The lawsuit, brought by the National Federation of Independent Business and several of its members, challenged the constitutionality of the Corporate Transparency Act, the 2021 bill that established a beneficial ownership information, or BOI, registry and the requirement for businesses to report. The plaintiffs argued that the CTA exceeded Congress’s authority to regulate interstate commerce, that it violates the First Amendment by compelling speech and infringing freedom of association and that it violates the Fourth Amendment by forcing the disclosure of private information.

By mid-November, as the initial Jan. 1 reporting deadline approached, only about a quarter of the estimated 32.5 million covered businesses had registered. According to newly released poll data from Wolters Kluwer, 37% of firms were waiting until closer to the deadline and 12% said they had insufficient resources to do the filing. Meanwhile, 9% of businesses believed they were not covered by the rule, and 32% were unsure whether the rule applied to them.

Full Article


CISA News: Salt Typhoon poses a serious supply chain risk to most organizations

malware skull

The Salt Typhoon intrusion gives China a chance to exfiltrate massive amounts of data from most organizations, especially voice calls that can be stored for later use in deepfake campaigns.

In the late spring of 2024, the US Federal Bureau of Investigation (FBI) began investigating reports of malicious activities targeting multiple US telecommunications companies. The agency determined that Chinese-affiliated actors had stolen many communications records related to several unidentified individuals during what they later realized was a persistent infiltration dating back at least two years.

By late September and early October, US authorities began publicly warning about a threat actor that Microsoft calls Salt Typhoon (also known as Earth Estries, Ghost Emperor, Famous Sparrow, or UNC 2286) that is likely affiliated with China’s Ministry of State Security, also known as APT 40. Federal authorities have continued ramping up public warnings regarding the group.

Cybersecurity experts say the Salt Typhoon intrusions pose a serious supply chain risk for the telcos’ customers, who encompass a broad swath, if not all, of global public and private sector organizations. “It’s a supply chain attack where they’re not targeting the telcos as much as they’re targeting the telcos’ customers,” Jon Clay, vice president of threat intelligence at Trend Micro, tells CSO. “It’s a technique we call ‘island hopping,’ where they gain access to a target through a partner or a vendor or something.”

Not all of the details of Salt Typhoon’s attacks have been released

Although the US government has offered broad, generic risk management guidance to communications and critical infrastructure providers, details defenders need are under wraps. Given that the threat actor still resides in the infected networks, authorities are loathe to provide more concrete advice lest Salt Typhoon switch things up and burrow deeper into the infrastructure. Nevertheless, experts say CISOs should try talking with their telecommunications providers about whether they’ve fixed the flaws that allowed Salt Typhoon in. They should also try to cut off the group’s command and control infrastructure if they spot it. Most importantly, experts say CISOs should embrace encryption throughout their networks to protect their data and voice communications from fueling future threats, including deepfake videos.

The good news is that with a lot of high-powered glare bearing down on it, publicity-shy China has got to be feeling the heat. “There’s definitely a hell of a lot more threat hunting going on now than there was before,” Adam Isles, principal and head of the cybersecurity practice at the Chertoff Group, tells CSO. 

“And so, if you’re on their side of it, you’ve got to be thinking to yourself, ‘whatever access I have now is not what it was beforehand. And I have to appreciate the risk of that being time-limited.'”

Timeline of recent Salt Typhoon developments

The following is a timeline of the recent developments related to Salt Typhoon.

Nov 21: Worst telecom tack in history. Senator Mark Warner, the Senate Intelligence Committee chairman, called the Salt Typhoon campaign “the worst telecom hack in our nation’s history — by far.” Warner said the hackers have been able to listen to audio calls in real-time and steal call data, and they have, in some cases, moved from one telecom network to another.

Dec 3: US government’s encryption about-face. Although the initial concerns about Salt Typhoon centered on China hacking into federal government systems for court-authorized telecom network wiretapping requests, an FBI analysis revealed that the aims of Salt Typhoon were much broader than law enforcement and national security intercepts.

According to an FBI official speaking at a CISA press briefing, the threat actors were already embedded in other parts of the telcos’ systems before they pivoted to the law enforcement systems. During that call, Jeff Greene, Executive Assistant Director at CISA, said that one way to protect against voice call intercepts and data theft is to use encrypted apps, a seeming reversal for US law enforcement, which has long complained that end-to-end encrypted apps hide criminal activity.

Dec 3: Guidance for engineers and sysadmins. NSA, CISA, the FBI, the Australian Signals Directorate, and the National Cyber Security Centres of Canada and New Zealand released communications infrastructure guidance that provides engineers and system administrators with defensive measures to protect against intrusions.

Dec 4: Eight US telcos infiltrated. During a press briefing, Anne Neuberger, the White House deputy national security adviser for cyber and emerging technology, said that Salt Typhoon has infiltrated at least eight telecom companies in the US, which reportedly include Verizon, AT&T, and Lumen Technologies.

Press reports suggest that the targeted individuals include President-elect Donald Trump, his vice-presidential pickJD Vance, US Senate Majority Leader Chuck Schumer, Vice President Kamala Harris, and State Department officials, among other leaders.

Dec 4: Pentagon pressured on unencrypted phones. US Senators Ron Wyden and Eric Schmitt sent a letter to the Pentagon’s Inspector General urging the Department of Defense to abandon the use of unencrypted phones and platforms given the risk of serious harm from Salt Typhoon.


ABA Banking Journal: Prepare your bank for the FDIC’s new signage rule

November 25, 2024

A New Way to Display ‘FDIC’

The use of the FDIC logo at teller windows, on bank doors and in other places — not to mention the disclosure of “Member FDIC” in advertising — is a staple of how banks present the deposit insurance guarantee to their customers and the public. On May 1, these practices will receive a major update, and banks need to figure out how to comply.

The rule changes how banks display the FDIC logo online, on apps and at branches and ATMs. It also bars the logo’s use in advertising and marketing that misrepresent deposit insurance coverage. The ambiguity in the rule’s language is a headache for banks as they work on implementation, according to Ashtyn Landen, senior director of prudential regulation at ABA.

“One of the confusing terms was ‘continuously,’” Landen says. “What does it mean to have the FDIC sign continuously on your website? Does that mean when you scroll, the sign follows you down the screen? Does it mean it pops up in different places?”

Take advantage of FDIC resources

Despite the time crunch and lack of clarity, industry experts say banks must do everything they can to proactively prepare for implementation.

Landen suggests rereading the rule, looking at the FDIC’s questions and answers, and attending the agency’s webinar series about rule requirements. At these webinars, the FDIC will “discuss additional questions regarding the rule” and could “clear up any confusion around what exactly is required for the website and mobile apps,” she says.

The session on May 30 reviewed subparts A and B, including the major requirements and objectives, and answered common questions. The second, on July 31, discussed requirements and offered details on FDIC signage on websites — including when signage is not required — and examples of violations. (Visit the FDIC’s site to view the earlier presentation slide decks and for updates.)

Not one size fits all

Questions about integrating the new rule will differ depending on the bank, according to Leslie Callaway, senior director for compliance, outreach and development at ABA and the team lead for ABA’s members-only Compliance Hotline.

“The bigger banks are looking at this and have been since day one. Smaller banks that don’t have the resources are struggling a little bit more. It really depends on the size of the bank [and] the resources they have,” she says. “There’s a lot of rules around ATMs, so how many ATMs do you have? How many new ATMs are you going to have? There’s a lot of moving parts.”

Since implementation challenges will vary, it’s important for banks to communicate with their examiner for help with the changes and to ensure readiness for May 1, says Therese Kieffer, specialized consulting manager at Wolters Kluwer.

“Where you’ve got the non-deposit product that you’re also offering in your branch and you want to put it up on digital display, it might be worthwhile having a conversation with your examiner as to what they would recommend [in terms of appropriate disclosure] in that kind of situation,” Kieffer says. “You might want to run some of your drafts of your mobile app page or some of your designs past your examiner.”

Full Article 

SDBA EVENTS
SDBA EVENTS

SDBA State Legislative Day

February 12, 2025 | Pierre

Legislative Day 2025SDBA’s Legislative Day is your opportunity to stay informed on both state and federal legislation which could impact the banking industry. This is your opportunity to actively participate in shaping the future of banking in our state. This gathering promises insightful conversations, networking, and direct engagement with key policymakers.

Information & Registration


SDBA IRA Basics

January 9, 2025 | Virtual

IRAThis course is designed as a “very basic” IRA seminar as it is designed to build a solid IRA foundation. The seminar will start with the differences between a Traditional and a Roth IRA, and then discuss how to set up a new IRA and the eligibility rules to contribute to an IRA. The biggest topic for people new to IRAs to discuss is the moving of money from one financial institution to another. This involves IRA transfers and rollovers, plus the direct rollovers from a qualified plan. Discussion will go thru the 13 exceptions to taking money out of an IRA before age 59.5 to avoid the penalty tax, and how RMD is calculated in a traditional IRA. There will be an introduction into death distributions. Finally, we will cover how to take money out of a Roth IRA.

Information and Registration


2025 Midwest Economic Forecast Forum

Midwest EconPrepare for 2025 by joining an economic discussion with Federal Reserve Bank President Austan Goolsbee. Time will be allowed for open Q&A during this virtual event. Bankers are encouraged to invite their business clients and local community leaders to tune in to these economic insights together. Individuals or group registration rates are available.

Information and Registration


Understanding Bank Performance

Building Better Bankers

Virtual: January 8, 9, 15, 16, 22, 23, 29 & 30 | 10 a.m. - 12 p.m. Central Time

UBPParticipants will learn how to assess and analyze a bank’s financial performance by working with data from real institutions. Using financial statements from one sample financial institution along with statements from their own banks, participants will become familiar with the ins and outs of balance sheets and income statements and learn how to apply key performance metrics to the data presented in these documents.

Having learned how to interpret and analyze a bank’s financial statements, participants will gain deeper insight into the factors affecting bank performance. Later sessions in this course will address ways in which performance may be hindered or improved by funding strategies and risk management. Ultimately, participants will be able to review a bank’s financial statements to identify strengths and weaknesses and be able to recommend changes that will lead to improved performance.

In the final session of this course, participants will put what they have learned into practice. Participants will analyze a new data set, rate the bank’s performance and suggest strategic adjustments that might benefit the bank.

Information and Registration


Compliance Alliance logo

Question of the Week

Q: We are going to be closing an account that receives social security benefits – are there any timeline considerations to keep in mind? 

A: When an account is being funded with federal benefits, the bank is generally required to give 30 days’ advanced notice to the customer prior to closing the account. However, in certain cases, there isn't necessarily advance notice required if fraud is involved in the account or account closing: 

Termination by the Financial Institution : Financial institutions may close an account to which benefit payments are currently being  sent thereby revoking the enrollment authorization by providing a 30-day written notice to  the recipient prior to closing the account. In cases involving fraud, accounts may be  closed immediately. The financial institution cannot revoke the enrollment authorization  by notifying the Federal agency and not the recipient. 

The 30-day written notice should remind the recipient to make other arrangements for the  handling of his/her payments. The financial institution must credit to the recipient’s  account any payments received during the 30-day notice period. The financial institution must also immediately return to the Federal government all payments received after the  30-day notice period. A financial institution that closes the account without properly terminating the enrollment must make the funds available to the recipient until proper notice  is provided.  https://fiscal.treasury.gov/files/reference-guidance/green-book/greenbook-chapter1.pdf  

As always, you should be sure to review the account agreement itself (and any applicable internal policies and procedures) for any additional considerations, as well. 

Learn how to put compliance management solutions from Compliance Alliance to work for your bank, by contacting (888) 353-3933 or [email protected] and ask for our Membership Team. For timely compliance updates, subscribe to Bankers Alliance’s email newsletters.


 

SDBA eNews Archive
View past issues of the SDBA eNews

Advertising Opportunity
Learn more about sponsoring the SDBA eNews

Questions/Comments
Contact the SDBA at 605.224.1653 or via email