|

ABA Banking Journal: Time and communication are crucial in spotting fraudulent transactions
December 10, 2024 | Beth Tancredi
“Fraud as a service” is a growing business in which criminals commit fraud by offering tools, services and infrastructure for a fee. Often found on the dark web, in recent years this model has become prominent on social media channels as well, turning unwitting as well as witting participants into “money mules” who help traffic money to criminals through bank accounts.
Although financial losses due to fraud schemes for individuals over the age of 60 have increased from $500 million in 2018 to almost $3.5 billion in 2023, victims are not limited to the senior demographic.
Schemes on social media channels such as TikTok and Instagram trend toward younger demographics, offering too-good-to-be-true get-rich-quick opportunities in which the victim transfers money from their own account to the criminal’s account with the promise of getting more money in return.
With a rise in synthetic identity fraud, even infants and toddlers can be targets of money mule scams. For this scam, criminals create bank accounts using fake names, addresses, burner phone numbers and social security numbers stolen from people often too young to have a credit history. This allows fraudsters to establish credit and open deposit accounts, while appearing as a legitimate individual and bank customer.
“Criminals creating synthetic identities are playing the long game,” says Jim Hitchcock, VP for fraud mitigation at American Bankers Association, “They’ll just ride it out as long as they can without any loss. As long as no one discovers it, they might continue to let it buffer, or, if it’s not used for credit, they will open a deposit account that can sit dormant until they’re ready to use it.”
In an ABA webinar, Anne Entwistle, senior trial attorney for the Department of Justice Consumer Protection Branch, cited explosive growth in transnational crime organizations targeting U.S. consumers as one reason for the uptick in romance, lottery fraud and government imposter scams.
Because these transactions appear as authorized push payments, they are often accepted as legitimate and are not flagged as fraudulent.
“We often don’t know that a transaction is fraudulent until the customer reports it,” Jim Hitchcock adds., “Money from these transactions moves back out of the accounts quickly. We generally have a 72-hour window before that money leaves the account for good – and that window is shrinking.”
“If a consumer suspects they have been the victim of a scam in which money is moved out of their account and they are not in any physical distress or harm, they should notify their bank first,” Hitchcock adds. “For more extreme circumstances in which someone unwittingly became a money mule, consumers and bankers should report it to the FBI Internet Crime Complaint Center. But that 72-hour window is key.”
Red flags that signal fraud
While individual banks, alone, cannot solve the issue of financial scams and fraudulent transactions, understanding what to look for is one step toward thwarting potential criminal activity.
Stagnant accounts with sudden deposits or withdrawals could be an indication of use of synthetic identities.
Velocity of funds or an unusual amount of money leaving an account often mean fraud. A noticeable increase in the number of transactions or an unusual amount of money leaving an account, especially through peer-to-peer money transfer apps such as Zelle or Venmo, could suggest fraudulent activity on the account.
While much of the focus to date has been on monitoring activity from the sending back, “We believe we can discover a lot from the bank at the receiving end too,” Hitchcock explained.
Protecting the bank and its customers
One of the most effective ways of protecting customers from fraudulent transactions is to slow down the process.
Take the time to name match the name on both the sender and receiver end. Not only does this help ensure the legitimacy of the transaction, but it also creates a bottleneck for the money to hop to another account before fraud can be discovered.
When possible, create alerts based on frequency of transactions in a given time period or for specific dollar amounts that may indicate a fraudulent transaction.
Share information with other banks. The Patriot Act gives banks safe harbor to share information on money laundering and terrorist financing.
“If I tell a bank this is happening to them, it’s happening to the bank next to them too,” Hitchcock says. “Always put competition aside when it comes to fraud and cyberattacks.”
This is especially important in cases of business email compromises, a type of phishing attack in which criminals gain access to work email accounts with the intention of stealing data or tricking someone into transferring money. These types of attacks generally target multiple banks at once, which means that strange activity at one bank is likely happening at another. Sharing that information enables banks to proactively look for suspicious transactions and stop them in their tracks.
“The bigger the gap in a notification of a fraud, the less likely we are to stop the money from moving,” Hitchcock adds.
To make the communication process easier, ABA’s Fraud Contact Directory enables banks to connect with other institutions to resolve warranty breach claims for checks as well as claims for unauthorized and/or fraudulent transfers for wires, ACH, RTP, or FedNow.
Banks also can access ABA resources and training to assist in educating employees and customers about scams. The more individuals know, the easier it will be to spot the warning signs and prevent fraud.
For consumer education ABA’s Safe Banking for Seniors offers bankers free resources designed to educate older people and their loved ones about how to protect their financial assets and identities. ABA’s Banks Never Ask That and Practice Safe Checks campaigns have been updated with new content.
The bottom line is that bank fraud is a global problem with a regional solution. The more educated that bankers and customers are at the local level, the better bankers and customers will be able to spot a scam before becoming a victim.
Beth Tancredi is a frequent contributor to ABA Banking Journal.
Full Article
FinCEN Warns of Fraud Schemes That Abuse Its Name, Insignia, and Authorities for Financial Gain
December 18, 2024
WASHINGTON—The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) issued an alert today to raise awareness of fraud schemes abusing FinCEN’s name, insignia, and authorities for financial gain. These FinCEN-specific fraud schemes include scams that exploit beneficial ownership information reporting; misuse FinCEN’s Money Services Business Registration tool; or involve the impersonation of, or misrepresent affiliation with, FinCEN and its employees.
“We are very concerned about reports of scammers using FinCEN’s name to perpetrate fraud schemes against the public for financial gain,” said FinCEN Director Andrea Gacki. “We urge the public to be vigilant in identifying and avoiding these schemes and to be extremely cautious when dealing with unsolicited correspondence. FinCEN and its employees will never threaten a member of the public by email, call, or text, or demand immediate payment for any reason.”
The alert provides guidance to the public on how to identify and avoid these scams and provides typologies and red flag indicators to help financial institutions detect, prevent, and report potential suspicious activity to FinCEN. Combating fraud is one of FinCEN’s Anti-Money Laundering and Countering the Financing of Terrorism National Priorities.
The public is reminded that any solicitations from individuals or entities abusing FinCEN’s name, insignia, or authorities, or impersonating a FinCEN employee should be reported to Treasury’s Office of Inspector General and the Federal Trade Commission. Victims of cyber-enabled government imposter scams should file a complaint with the Federal Bureau of Investigation’s (FBI) Internet Crime Complaint Center and file a report with their nearest FBI field office. Anyone with knowledge of fraud schemes involving victims who are age 60 or older can call the U.S. Department of Justice’s National Elder Fraud Hotline at 833-FRAUD-11 or 833-372-8311.
Questions regarding the contents of this alert should be sent to the FinCEN Regulatory Support Section by submitting an inquiry at www.fincen.gov/contact.
The full alert is available online at FIN-2024-Alert005.
Full Article
ABA Banking Journal: OCC: Cyber threats to financial institutions remain elevated
December 16, 2024

December 3, 2024

Less than a month before a Jan. 1 deadline for businesses to report their beneficial owners to the Financial Crimes Enforcement Network, a federal judge in Texas has issued a preliminary injunction blocking enforcement of the requirement. The order states that covered companies nationwide do not need to comply with the Jan. 1 reporting deadline, unless the judge or a higher court reverses the order in the meantime.
The lawsuit, brought by the National Federation of Independent Business and several of its members, challenged the constitutionality of the Corporate Transparency Act, the 2021 bill that established a beneficial ownership information, or BOI, registry and the requirement for businesses to report. The plaintiffs argued that the CTA exceeded Congress’s authority to regulate interstate commerce, that it violates the First Amendment by compelling speech and infringing freedom of association and that it violates the Fourth Amendment by forcing the disclosure of private information.
By mid-November, as the initial Jan. 1 reporting deadline approached, only about a quarter of the estimated 32.5 million covered businesses had registered. According to newly released poll data from Wolters Kluwer, 37% of firms were waiting until closer to the deadline and 12% said they had insufficient resources to do the filing. Meanwhile, 9% of businesses believed they were not covered by the rule, and 32% were unsure whether the rule applied to them.
Full Article
CISA News: Salt Typhoon poses a serious supply chain risk to most organizations
December 11, 2024 | Cynthia Brumfield
The Salt Typhoon intrusion gives China a chance to exfiltrate massive amounts of data from most organizations, especially voice calls that can be stored for later use in deepfake campaigns.
In the late spring of 2024, the US Federal Bureau of Investigation (FBI) began investigating reports of malicious activities targeting multiple US telecommunications companies. The agency determined that Chinese-affiliated actors had stolen many communications records related to several unidentified individuals during what they later realized was a persistent infiltration dating back at least two years.
By late September and early October, US authorities began publicly warning about a threat actor that Microsoft calls Salt Typhoon (also known as Earth Estries, Ghost Emperor, Famous Sparrow, or UNC 2286) that is likely affiliated with China’s Ministry of State Security, also known as APT 40. Federal authorities have continued ramping up public warnings regarding the group.
Cybersecurity experts say the Salt Typhoon intrusions pose a serious supply chain risk for the telcos’ customers, who encompass a broad swath, if not all, of global public and private sector organizations. “It’s a supply chain attack where they’re not targeting the telcos as much as they’re targeting the telcos’ customers,” Jon Clay, vice president of threat intelligence at Trend Micro, tells CSO. “It’s a technique we call ‘island hopping,’ where they gain access to a target through a partner or a vendor or something.”
Not all of the details of Salt Typhoon’s attacks have been released
Although the US government has offered broad, generic risk management guidance to communications and critical infrastructure providers, details defenders need are under wraps. Given that the threat actor still resides in the infected networks, authorities are loathe to provide more concrete advice lest Salt Typhoon switch things up and burrow deeper into the infrastructure. Nevertheless, experts say CISOs should try talking with their telecommunications providers about whether they’ve fixed the flaws that allowed Salt Typhoon in. They should also try to cut off the group’s command and control infrastructure if they spot it. Most importantly, experts say CISOs should embrace encryption throughout their networks to protect their data and voice communications from fueling future threats, including deepfake videos.
The good news is that with a lot of high-powered glare bearing down on it, publicity-shy China has got to be feeling the heat. “There’s definitely a hell of a lot more threat hunting going on now than there was before,” Adam Isles, principal and head of the cybersecurity practice at the Chertoff Group, tells CSO.
“And so, if you’re on their side of it, you’ve got to be thinking to yourself, ‘whatever access I have now is not what it was beforehand. And I have to appreciate the risk of that being time-limited.'”
Timeline of recent Salt Typhoon developments
The following is a timeline of the recent developments related to Salt Typhoon.
Nov 21: Worst telecom tack in history. Senator Mark Warner, the Senate Intelligence Committee chairman, called the Salt Typhoon campaign “the worst telecom hack in our nation’s history — by far.” Warner said the hackers have been able to listen to audio calls in real-time and steal call data, and they have, in some cases, moved from one telecom network to another.
Dec 3: US government’s encryption about-face. Although the initial concerns about Salt Typhoon centered on China hacking into federal government systems for court-authorized telecom network wiretapping requests, an FBI analysis revealed that the aims of Salt Typhoon were much broader than law enforcement and national security intercepts.
According to an FBI official speaking at a CISA press briefing, the threat actors were already embedded in other parts of the telcos’ systems before they pivoted to the law enforcement systems. During that call, Jeff Greene, Executive Assistant Director at CISA, said that one way to protect against voice call intercepts and data theft is to use encrypted apps, a seeming reversal for US law enforcement, which has long complained that end-to-end encrypted apps hide criminal activity.
Dec 3: Guidance for engineers and sysadmins. NSA, CISA, the FBI, the Australian Signals Directorate, and the National Cyber Security Centres of Canada and New Zealand released communications infrastructure guidance that provides engineers and system administrators with defensive measures to protect against intrusions.
Dec 4: Eight US telcos infiltrated. During a press briefing, Anne Neuberger, the White House deputy national security adviser for cyber and emerging technology, said that Salt Typhoon has infiltrated at least eight telecom companies in the US, which reportedly include Verizon, AT&T, and Lumen Technologies.
Press reports suggest that the targeted individuals include President-elect Donald Trump, his vice-presidential pickJD Vance, US Senate Majority Leader Chuck Schumer, Vice President Kamala Harris, and State Department officials, among other leaders.
Dec 4: Pentagon pressured on unencrypted phones. US Senators Ron Wyden and Eric Schmitt sent a letter to the Pentagon’s Inspector General urging the Department of Defense to abandon the use of unencrypted phones and platforms given the risk of serious harm from Salt Typhoon.
[...]
Details of Salt Typhoon’s activities are still scarce
Although federal agencies have been elevating their warnings about Salt Typhoon for months, details on how the group achieved its infiltration or the number of organizations affected are still scarce.
The lack of specifics is due to the unfortunate fact that Salt Typhoon is still lodged in the infected telecommunications networks. “We cannot say with certainty that the adversary has been evicted because we still don’t know the scope of what they’re doing,” CISA’s Greene said during the press briefing. “We’re still trying to understand that along with [industry] partners.”
Authorities are almost certainly withholding details to prevent Salt Typhoon from changing its tactics and finding new and more covert ways to implant its malware onto victims’ networks. “Once they get on one machine, they always want to pivot,” ESET malware researcher Alexandre Côté Cyr tells CSO.
“And since most IT teams have blind spots in their network, they don’t know everything,” he says. “Not everything’s monitored properly. My guess is it’s hard to get them out because they’re in many different places, and they keep spreading among those machines. If they still have a foothold somewhere and they get reports about what’s being discovered as it goes on, they can always update or add new tools through those existing paths to keep evading the new detections.”
Salt Typhoon might be saving call recordings for future deepfakes
Like most Chinese-state-sponsored threat actors, Salt Typhoon is an espionage operation seeking to collect as much information as possible from its target organizations. Neuberger and other US officials believe the group aimed to capture metadata and recorded telephone calls of “very senior” American political figures.
Although Salt Typhoon’s current campaign appears targeted, officials also say it has scooped up data on hundreds of thousands of American mobile phone users, likely stealing information on more than one million customers. Cybersecurity experts say Salt Typhoon is poised to continue collecting massive amounts of data and voice recordings from all the telcos’ customers and saving the data they exfiltrate for various purposes, particularly deepfakes.
“What will they do with this data down the road?” asked Trend Micro’s Clay. “We’ve already been discussing this internally, and it’s audio fakes. Because if I get a whole bunch of conversations now, I’ve got your voice, and I can utilize your voice and audio fakes in the future. So, there’s a lot of concern over what can be done with this data.”
“I think the idea that they are hoovering up lots of information is not at all out of the realm of possibility,” Chertoff’s Isles says. “I think we can overweight that towards call content. They’re going to get the audio of CEOs, et cetera.”
Guidance on how to strengthen visibility, harden assets The guidance issued by US, Canadian, Australian, and New Zealand authorities offers a series of detailed and rigorous steps for communications networks and other critical infrastructure providers to strengthen visibility and harden devices and architecture. It also provides hardening best practices for Cisco operating systems, which authorities say Salt Typhoon targeted.
The nine-page alert says organizations should engage in proactive monitoring, emphasizing early detection through robust visibility and anomaly tracking; defense-in-depth, adding layers of protection through encryption, segmentation, and secure device configurations; enhanced protection focus, emphasizing patching, turning off unnecessary services, and securing protocol usage; and collaboration, encouraging organizations and manufacturers to work together for a more secure infrastructure.
None of this is new guidance or necessarily specific to Salt Typhoon. It encompasses virtually all the cybersecurity risk management practices that CISA and other security organizations have long advocated organizations adopt. “All the guidance from CISA is like, ‘Okay, do everything in cybersecurity, do zero trust,'” Joe Saunders, founder and CEO of RunSafe Security, tells CSO.
Memory-based vulnerabilities are at the heart of the problem
Despite the potentially overbroad advice, Saunders recommends that CISOs take the collaboration guidance to heart and press their telecom providers on how they have addressed memory-based vulnerabilities in their products.
Memory-based vulnerabilities allow the attacker to take command and control of a device, introduce code to do something nefarious, or leverage existing code for unintended, equally nefarious purposes. They are a class of vulnerabilities targeted for elimination in CISA’s Secure by Demand initiative.
“At the core of what Salt Typhoon is doing is leveraging memory-based vulnerabilities deep in the heart of the telecom equipment itself,” Saunders says. “And that’s a very specific tactic often used by hacker groups from China. It is essential for CISOs to ask their suppliers: Have you eliminated the memory vulnerabilities completely in your equipment?”
Other experts are skeptical that CISOs or the federal government can make headway in pressing telcos on memory-based vulnerabilities. They say Chinese threat actors continually exploit multiple zero-day vulnerabilities in VPN, firewall, and other edge products from Ivanti, Fortinet, Sophos, Cisco, and others that telcos use in their networks.
Clay says that “the FCC can come up and say ‘Hey, you got to patch these vulnerabilities within X number of days.’ But how are they going to defend against a zero-day? Because zero days can be easily done these days” particularly given that Beijing now requires any zero days discovered by security researchers to be kept secret and reported to the government only.
Other experts think that only the world’s most influential organizations will have standing with the telcos to query them about memory-based vulnerabilities. “If you’re a Fortune 10 company, maybe you can have a conversation with Verizon,” Chertoff’s Isles says.
Clay says that instead of focusing on memory-based vulnerabilities, if “I were a CISO right now, I would certainly be looking for command-and-control infrastructure. If you can cut off the command-and-control infrastructure, it’s what maintains that ability to get back into the network from outside. If I can break that, I’m keeping them out of the network.”
Encryption is key to fighting Salt Typhoon
Experts agree that encrypting communications is crucial to thwarting Salt Typhoon’s espionage efforts. “What we have told folks internally is that encryption is your friend,” CISA’s Greene said during the press call. “Whether it is on text messaging or if you have the capacity, voice communications, even if the adversary is able to intercept the data, if it’s encrypted, it will make it really hard for them to detect it.”
Although end-to-end encryption (E2EE) messaging, such as Signal, is the gold standard, experts say it’s unclear how well that would scale across large organizations. Moreover, they say that in most cases, E2EE isn’t necessary.
“In most cases, use the common encryption methods,” ESET’s Cyr says. “You wouldn’t even need to have end-to-end encryption. It’s always a plus, but you only need any kind of encryption. Everything should be secured with TLS [transport layer security] or HTTPS [hypertext transfer protocol security] because the ISP cannot decrypt that. If it’s encrypted properly, the ISP just acts as a highway or a tube. So, the data passes through, and the threat actor can’t listen.”
ABA Banking Journal: Prepare your bank for the FDIC’s new signage rule
November 25, 2024
The use of the FDIC logo at teller windows, on bank doors and in other places — not to mention the disclosure of “Member FDIC” in advertising — is a staple of how banks present the deposit insurance guarantee to their customers and the public. On May 1, these practices will receive a major update, and banks need to figure out how to comply.
The rule changes how banks display the FDIC logo online, on apps and at branches and ATMs. It also bars the logo’s use in advertising and marketing that misrepresent deposit insurance coverage. The ambiguity in the rule’s language is a headache for banks as they work on implementation, according to Ashtyn Landen, senior director of prudential regulation at ABA.
“One of the confusing terms was ‘continuously,’” Landen says. “What does it mean to have the FDIC sign continuously on your website? Does that mean when you scroll, the sign follows you down the screen? Does it mean it pops up in different places?”
Take advantage of FDIC resources
Despite the time crunch and lack of clarity, industry experts say banks must do everything they can to proactively prepare for implementation.
Landen suggests rereading the rule, looking at the FDIC’s questions and answers, and attending the agency’s webinar series about rule requirements. At these webinars, the FDIC will “discuss additional questions regarding the rule” and could “clear up any confusion around what exactly is required for the website and mobile apps,” she says.
The session on May 30 reviewed subparts A and B, including the major requirements and objectives, and answered common questions. The second, on July 31, discussed requirements and offered details on FDIC signage on websites — including when signage is not required — and examples of violations. (Visit the FDIC’s site to view the earlier presentation slide decks and for updates.)
Not one size fits all
Questions about integrating the new rule will differ depending on the bank, according to Leslie Callaway, senior director for compliance, outreach and development at ABA and the team lead for ABA’s members-only Compliance Hotline.
“The bigger banks are looking at this and have been since day one. Smaller banks that don’t have the resources are struggling a little bit more. It really depends on the size of the bank [and] the resources they have,” she says. “There’s a lot of rules around ATMs, so how many ATMs do you have? How many new ATMs are you going to have? There’s a lot of moving parts.”
Since implementation challenges will vary, it’s important for banks to communicate with their examiner for help with the changes and to ensure readiness for May 1, says Therese Kieffer, specialized consulting manager at Wolters Kluwer.
“Where you’ve got the non-deposit product that you’re also offering in your branch and you want to put it up on digital display, it might be worthwhile having a conversation with your examiner as to what they would recommend [in terms of appropriate disclosure] in that kind of situation,” Kieffer says. “You might want to run some of your drafts of your mobile app page or some of your designs past your examiner.”
Full Article

SDBA State Legislative Day
February 12, 2025 | Pierre
SDBA’s Legislative Day is your opportunity to stay informed on both state and federal legislation which could impact the banking industry. This is your opportunity to actively participate in shaping the future of banking in our state. This gathering promises insightful conversations, networking, and direct engagement with key policymakers.
Information & Registration
SDBA IRA Basics
January 9, 2025 | Virtual
This course is designed as a “very basic” IRA seminar as it is designed to build a solid IRA foundation. The seminar will start with the differences between a Traditional and a Roth IRA, and then discuss how to set up a new IRA and the eligibility rules to contribute to an IRA. The biggest topic for people new to IRAs to discuss is the moving of money from one financial institution to another. This involves IRA transfers and rollovers, plus the direct rollovers from a qualified plan. Discussion will go thru the 13 exceptions to taking money out of an IRA before age 59.5 to avoid the penalty tax, and how RMD is calculated in a traditional IRA. There will be an introduction into death distributions. Finally, we will cover how to take money out of a Roth IRA.
Information and Registration
2025 Midwest Economic Forecast Forum
Prepare for 2025 by joining an economic discussion with Federal Reserve Bank President Austan Goolsbee. Time will be allowed for open Q&A during this virtual event. Bankers are encouraged to invite their business clients and local community leaders to tune in to these economic insights together. Individuals or group registration rates are available.
Information and Registration
Understanding Bank Performance
Building Better Bankers
Virtual: January 8, 9, 15, 16, 22, 23, 29 & 30 | 10 a.m. - 12 p.m. Central Time
Participants will learn how to assess and analyze a bank’s financial performance by working with data from real institutions. Using financial statements from one sample financial institution along with statements from their own banks, participants will become familiar with the ins and outs of balance sheets and income statements and learn how to apply key performance metrics to the data presented in these documents.
Having learned how to interpret and analyze a bank’s financial statements, participants will gain deeper insight into the factors affecting bank performance. Later sessions in this course will address ways in which performance may be hindered or improved by funding strategies and risk management. Ultimately, participants will be able to review a bank’s financial statements to identify strengths and weaknesses and be able to recommend changes that will lead to improved performance.
In the final session of this course, participants will put what they have learned into practice. Participants will analyze a new data set, rate the bank’s performance and suggest strategic adjustments that might benefit the bank.
Information and Registration

Question of the Week
Q: We are going to be closing an account that receives social security benefits – are there any timeline considerations to keep in mind?
A: When an account is being funded with federal benefits, the bank is generally required to give 30 days’ advanced notice to the customer prior to closing the account. However, in certain cases, there isn't necessarily advance notice required if fraud is involved in the account or account closing:
Termination by the Financial Institution : Financial institutions may close an account to which benefit payments are currently being sent thereby revoking the enrollment authorization by providing a 30-day written notice to the recipient prior to closing the account. In cases involving fraud, accounts may be closed immediately. The financial institution cannot revoke the enrollment authorization by notifying the Federal agency and not the recipient.
The 30-day written notice should remind the recipient to make other arrangements for the handling of his/her payments. The financial institution must credit to the recipient’s account any payments received during the 30-day notice period. The financial institution must also immediately return to the Federal government all payments received after the 30-day notice period. A financial institution that closes the account without properly terminating the enrollment must make the funds available to the recipient until proper notice is provided. https://fiscal.treasury.gov/files/reference-guidance/green-book/greenbook-chapter1.pdf
As always, you should be sure to review the account agreement itself (and any applicable internal policies and procedures) for any additional considerations, as well.
Learn how to put compliance management solutions from Compliance Alliance to work for your bank, by contacting (888) 353-3933 or [email protected] and ask for our Membership Team. For timely compliance updates, subscribe to Bankers Alliance’s email newsletters.
SDBA eNews Archive View past issues of the SDBA eNews
Advertising Opportunity Learn more about sponsoring the SDBA eNews
Questions/Comments Contact the SDBA at 605.224.1653 or via email
|