SOCIAL ENGINEERING FRAUD SO IS IT COVERED? Yo u r s o u r c e - - PowerPoint PPT Presentation

social engineering fraud
SMART_READER_LITE
LIVE PREVIEW

SOCIAL ENGINEERING FRAUD SO IS IT COVERED? Yo u r s o u r c e - - PowerPoint PPT Presentation

SOCIAL ENGINEERING FRAUD SO IS IT COVERED? Yo u r s o u r c e f o r p r o f e s s i o nal l i a b i l i t y e d u cat i on a n d n e t w or k i ng. Presenters Joshua Laycock National Fidelity Product Manager Guarantee


slide-1
SLIDE 1

Yo u r s o u r c e f o r p r o f e s s i o nal l i a b i l i t y e d u cat i on a n d n e t w or k i ng.

SO … IS IT COVERED?

SOCIAL ENGINEERING FRAUD

slide-2
SLIDE 2

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

Presenters

Joshua Laycock National Fidelity Product Manager Guarantee Company of North America Chris McKibbin Partner, Fidelity Practice Group Blaney McMurtry LLP Greg Markell President & CEO Ridge Canada Cyber Solutions Inc.

slide-3
SLIDE 3

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

What is Social Engineering Fraud?

What Social Engineering Fraud is and is not:

  • Social Engineering Fraud is the fraudulent

manipulation of an individual to induce them to say or do something they wouldn’t

  • therwise say or do
  • It is the method by which a fraud is initiated

and executed, not the fraud itself

slide-4
SLIDE 4

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

Common Tactics

Impersonation Fraud (Executive / Client / Vendor)

is the main approach. Examples include:

  • Email Spoofing a.k.a. Business Email Compromise

(look-alike email addresses designed to mislead) employee@ProfessionalLiability.com vs. employee@ProfessionalLiabiliity.com – Intent is to provide recipient with instructions that are not genuine

slide-5
SLIDE 5

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

Common Tactics

  • Phony Client Scam vs. Lawyer

– Intent is to trick lawyer into “recovering” fraudulent settlement and then wiring trust funds to fraudster

  • Phishing / Spear Phishing / Whale Phishing

– Intent is to get the recipient to click on links or

  • pen malicious attachments
  • Unauthorized Access
slide-6
SLIDE 6

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

What Do Fraudsters Want?

Money! But different ways of getting it:

  • Insured’s Money Directly – business email

compromise trying to induce fraudulent transfers or to induce Insured to change vendor bank info

  • Information – for the purposes of targeting

Insured’s money (e.g. Insured’s banking credentials)

  • Information – for the purposes of extracting value

from it (e.g. selling it to third party)

slide-7
SLIDE 7

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

Why Does SEF Work So Well?

Fraudulent requests have similar, predictable traits:

  • Create a sense of urgency
  • Promise a consequence (good or bad)
  • Expect confidentiality (executive

impersonation)

slide-8
SLIDE 8

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

Why Does SEF Work So Well?

  • Knowledge of internal controls / deal info /

personnel / vendor relationships

  • Introduction of (sometimes very well-crafted)

third party participants like fake “banker” or “lawyer”

  • Involve unusual transactions (e.g. mergers,
  • ffshore acquisitions) that don’t have SOPs
slide-9
SLIDE 9

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

Why Does SEF Work So Well? Trust Comfort Fear

Comfort

in the company’s controls

Trust that the

person you are emailing is legitimate

Fear of

annoying or upsetting the person you’re calling to verify

slide-10
SLIDE 10

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

A Very “Efficient” Fraud

  • Speed – funds are typically cleared out of initial

destination account within minutes

  • Anonymity – attacks are carried out via email or

phone, often from overseas

  • High ROI for fraudsters – one successful

attack can be worth millions of dollars

slide-11
SLIDE 11

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

So where is the Coverage?

Coverage may be found in a few places: Commercial Crime Policy

  • Fraudulent Instruction Coverage (a.k.a. SEF

coverage a.k.a. Fraudulently Induced Transfer coverage)

  • Not Computer Crime (Apache Corp. v. Great

American Ins. Co.)

  • Not Forgery or Alteration (Taylor & Lieberman v.

Federal Ins. Co.)

  • Typically not Funds Transfer Fraud
slide-12
SLIDE 12

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

So where is the Coverage?

Cyber Policy

  • Sub-limits for SEF, along with an extension for

Computer Fraud

  • Cyber policy can respond in the event of a

liability trigger… but what are the triggers under your Cyber policy???

  • Difference between “dollars” and “data”
slide-13
SLIDE 13

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

So where is the Coverage?

Professional Liability (E&O)

  • Client Impersonation vs. professional

Directors’ and Officers’ Liability

  • Allegations by shareholders/stakeholders of failure

to adequately protect money or data

  • Compare derivative actions involving data security

breaches:

  • Target (2014)
  • Wyndham Hotels (2014)
  • Home Depot (2015)
slide-14
SLIDE 14

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

How Can Insureds Prevent SEF?

  • Technological solutions:

– Advanced email screening, advanced attachment scanning, DMARC

  • Technology can leave a false sense of security
  • Awareness
  • Set the correct tone from the top
  • Educate and empower employees
  • Stay current
slide-15
SLIDE 15

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

How Can Insureds Prevent SEF?

  • Active dialogue with

customers/vendors/underwriters about fraud risks

  • Implement mandatory “out of channel”

verification protocols

  • Create a blend of rules-based and principles-

based protections

  • Don’t be nostalgic about the way business “used

to be” conducted

slide-16
SLIDE 16

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

Key Takeaways

  • The threat is real – not a “flavour of the month”
  • A robust risk-transfer portfolio is necessary
  • The threat is preventable
  • Communication is key
slide-17
SLIDE 17

P r o f e s s i o n al L i a b i l i t y U n d e r w r i t i n g S o c i e t y

  • Joshua’s article:

http://www.canadianunderwriter.ca/inspress/understanding- difference-computer-fraud-funds-transfer-fraud-fraudulently-induced- transfer-coverage-within-crime-policy/

  • Apache: https://blaneysfidelityblog.com/2016/10/24/apache-

corporation-fifth-circuit-holds-that-commercial-crime-policys- computer-fraud-coverage-does-not-extend-to-social- engineering-fraud-loss/

  • Taylor & Lieberman:

https://blaneysfidelityblog.com/2017/04/03/taylor-lieberman- ninth-circuit-finds-no-coverage-under-crime-policy-for-client- funds-lost-in-social-engineering-fraud/

Links to Case Studies