By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: OCBC scam: Make banks share risks by setting standard for login security, fraud detection
Share
Aa
TechgoonduTechgoondu
Aa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > OCBC scam: Make banks share risks by setting standard for login security, fraud detection
CybersecurityInternet

OCBC scam: Make banks share risks by setting standard for login security, fraud detection

Alfred Siew
Last updated: January 17, 2022 at 5:58 PM
Alfred Siew Published January 17, 2022
8 Min Read
SHARE
  • PHOTO: Firmbee from Pixabay

A father with a special needs child lost the S$250,000 that he had saved for more than 10 years after he got tricked by an elaborate phishing scam seemingly aimed at OCBC bank users last month.

A woman had her S$68,000 life savings stolen, leaving her penniless and starving at Christmas, after she had supplied login credentials on a fake website linked from a spoof SMS message. At least 469 people in Singapore lost S$8.5 million.

These victims’ stories are heartbreaking, and they are made more painful by the many questions that OCBC has failed to answer.

In saying its own systems were not breached, its message seems to be that customers should take full responsibility by taking more care of their login credentials.

That may sound correct, because it goes with common logic that if you’re not careful and got scammed, then it’s on you, not the bank. However, that may be right only if a bank has indeed done enough to protect you against such scams.

While the job of “doing enough” is not spelt out clearly in law – a review with the authorities is underway – there are clearly good practices that should have been in place.

First, the SMS one-time password (OTP) that many still rely on as a two-factor authentication (2FA) tool.

For the hackers to have stolen the money, they would have to not only steal the login and password from the fake website that they’ve set up to trick a user into typing their credentials in.

They also have to, within a short period of time (usually minutes), key in an SMS OTP that would have been sent to the victim’s mobile phone. This is usually required for what’s deemed a “high-risk” transaction.

The hackers would need a different OTP for each of a few tasks – first, to add their own bank account for a transfer, then to change the transaction limit and finally transfer the money over.

Remember, all this had to be done within minutes. Some victims said all their money was gone in half an hour, while they frantically called the bank but were put on hold. Some said they hadn’t revealed their SMS OTPs.

The big question is, how did the hackers make all these transactions online? Did they somehow divert the SMS OTPs, similar to a separate credit card scam just months earlier in 2021?

At least for that, the victims had their charges waived and they did not have to suffer monetary loss.

This time round, why hasn’t OCBC or the monetary authorities come out to say what’s happened with the SMS OTPs? Were they also stolen or diverted?

News outlets have quoted cybersecurity experts saying that it is possible to divert SMS OTPs. In the United States, too, loopholes in the SMS system have shown how users can be easily exposed to fraud.

So, why are SMS OTPs still in use today by banks for the most important “high-risk” transactions? In its regular technology guidance to financial institutions, is it time for the Monetary Authority of Singapore (MAS) to review the use of this second factor for authentication?

Physical tokens could probably have helped to avoid this type of heist this time round but many banks in Singapore have been progressively phasing the key fobs out (until this incident).

Some have made users switch to an app-based token, but many users, who do not like the hassle of yet another app, have taken to the easier SMS token out of convenience.

Now, if this method of authentication is no longer secure, then banks should be told to stop using it.

Let’s be clear, cybersecurity experts have long warned that SMS OTPs are far from secure. Yes, they have provided an easy way to stop hackers for a while, but clearly, the threat has evolved today.

The second question that OCBC, and indeed the other banks here, have to answer is how robust their anti-fraud efforts are.

OCBC says it has a fraud surveillance system which uses machine learning to aid a human analyst to detect fraud. The bank also can know what devices its services are accessed from.

If so, how did the series of fraudulent transactions involving so many victims happen?

Rightly, some of the victims are asking how so many high-risk transactions can go through in such a short span of time, considering they don’t fit the usual pattern of usage.

Is it usual for people to be transferring out more than S$100,000 in a short span of time, for example? Or with a different device from the usual one?

And with several users reporting such scams, did the bank manage to tweak its algorithms to spot similar transactions? If it did, then how quickly did it respond?

There are multiple anti-fraud tools in a bank’s cybersecurity defence. Some artificial intelligence (AI) tools will look out for unusual patterns, for example, large sums of money being transferred out, while others will “learn” on the job by looking at reports from users of similar phishing scams.

There have to be standards for two things – the type of anti-fraud tools that banks need to put in place and how fast they respond to a series of fraudulent activities.

With cyber threats evolving all the time, the duty of care for a bank should be extended beyond simply protecting its own cyber boundaries.

Its job of securing an account has to be more clearly spelt out by MAS, so that if it fails the standard set, it becomes liable for its customers’ losses.

Just like organisations now proactively seek out breaches because users are often tricked into clicking on phishing links, banks cannot just put up their hands and say it’s all on the user. They have to do more to snuff out threats.

Will these additional measures add cost to banks? Lest we forget, all this digital transformation we hear about so often today has helped banks save on branch and manpower costs and boost profits.

They have cut down on time spent with non-VIP customers, saving themselves from “high touch” interactions by pushing these customers to self-service digital options.

Having reaped the benefits of digitalisation, they need to be told to up their cybersecurity game and share the risks more evenly with the customers they say they serve.

You Might Also Like

Five ways the Roborock S8 robot vacuum will change the way you clean your home

After another DBS outage, is it time to make banks publicly report service uptime?

IT leaders must manage the tension point between application development and security by embracing a DevSecOps approach

As TikTok faces a possible ban in the US, should users elsewhere be worried?

Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage

TAGGED: 2FA, AI, banking scam, fraud surveillance, MAS, OCBC, phishing scam, SMS OTP, think

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Alfred Siew January 17, 2022
Share this Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Copy Link Print
Share
Avatar photo
By Alfred Siew
Follow:
Alfred is a writer, speaker and media instructor who has covered the telecom, media and technology scene for more than 20 years. Previously the technology correspondent for The Straits Times, he now edits the Techgoondu.com blog and runs his own technology and media consultancy.
Previous Article Hands on: Huawei P50 Pocket is a sleek looking flip phone
Next Article Meeting the healthcare sector’s unique challenges
Leave a comment

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

Facebook Like
Twitter Follow

Latest News

Five ways the Roborock S8 robot vacuum will change the way you clean your home
Internet March 31, 2023
After another DBS outage, is it time to make banks publicly report service uptime?
Enterprise Internet March 30, 2023
Xiaomi 13 Pro review: A photography powerhouse with 1-inch image sensor
Cellphones Mobile March 29, 2023
IT leaders must manage the tension point between application development and security by embracing a DevSecOps approach
Cybersecurity Enterprise Software March 29, 2023
//

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
Follow US

© 2023 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact

Join Us!

Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Lost your password?