SlideShare a Scribd company logo
by: Easysolver 
Easy Solutions Demonstration – Proactive approach to Fraud Detection
>Agenda 
>Introduction 
>Proactive approach to Fraud Detection 
>3 Stages of Fraud 
>Proactive vs Reactive 
>Demonstration 
>Fraud Stage 1 
>Fraud Stage 2 
>Fraud Stage 3
>Introduction –Easy Solutions 
Easy Solutions 
>Venture-backed, Medina Capital (May, 2013) 
>US: Miami, Atlanta 
>International: London, Bogota 
>200+ clients (financial services, travel, telecom) 
>50M+ users protected 
Total Fraud Protection 
>End-to-end Electronic Fraud Prevention 
>Integration of Intelligence and Action 
>Complete Solution / Reference Architecture 
>Combined strengths 
Visionary - Gartner Web Fraud MQ
>Gartner Web Fraud MQ 
›“Easy Solutions has a full range of fraud prevention and detection products.” 
›“…one-stop shop for most related fraud prevention services”. 
›“Easy Solutions’ …solutions can be and have been used across multiple channels, enabling organizations to stop cross-channel fraud”.
>What is Fraud? 
>Account Takeover–Malware, Phishing, Social Engineering 
>New Account –Malware, Phishing, Social Engineering, account opening process gaps (KYC/CIP) 
>True-person / Mule -Malware, Phishing, Social Engineering, account opening process gaps (KYC/CIP) 
All channel fraud happens in one of these fraud types 
*Internal fraud is also a concern, but non-customer facing
>Total Fraud Protection
>Agenda 
>Introduction 
>Proactive approach to Fraud Detection 
>3 Stages of Fraud 
>Proactive vs Reactive 
>Demonstration 
>Fraud Stage 1 
>Fraud Stage 2 
>Fraud Stage 3
>3 Stages of Fraud 
Planning and Targeting 
Setup and Launch 
Cashing
>Stage 1 -Planning and Targeting 
Setup and Launch 
Cashing 
Intelligence Gathering and Targeting; 
Web presence; Brand details; Social; Mobile Apps; 
Threat Intelligence
>Stage 2 –Setup and Launch 
Planning and Targeting 
Cashing 
Setup and Launch 
Account Takeover; 
Phishing/Pharming attacks; Malware 
Client Protection Analytics 
Takedown
>Stage 3 –Cashing 
Planning and Targeting 
Setup and Launch 
Cashing 
Realisation; 
ATM; Debit; ACH/Wire 
Anomaly Detection 
Multi Factor Authentication
>Total Fraud Protection 
Planning and Targeting 
Setup and Launch 
Cashing 
Anomaly Detection 
Multi Factor Authentication 
Threat Intelligence 
Client Protection Analytics 
Takedown
>Proactive vs. Reactive Detection 
Detect Monitoring Service
>Script Integration
>Scraping Attack Sequence 
DMS Script on banks website 
DMS Script copied when the website was scrapped 
Phishing site being created from files scrapped 
Formatting site for web deployment / testing forms and fields 
Deployed phishing site at host
>Proactive Detection Preventing Attacks
>Agenda 
>Introduction 
>Proactive approach to Fraud Detection 
>3 Stages of Fraud 
>Proactive vs Reactive 
>Demonstration 
>Fraud Stage 1 
>Fraud Stage 2 
>Fraud Stage 3
>Stage 1 -Planning and Targeting 
Planning and Targeting 
Setup and Launch 
Cashing 
Intelligence Gathering and Targeting; 
Web presence; Brand details; Social; Mobile Apps
>Fraudster’s Main Activities 
Stage 1: The fraudster is: 
>Accessing genuine websites/apps 
>Taking local copies of genuine websites/apps 
>Creating modified versions of genuine websites/apps 
>Determining customers and end users to target
>Response 
Stage 1: To cover the Planning and Targeting stage of the fraud cycle: 
>Monitor for suspicious and malicious activity 
>Process activity 
>Manage the event 
>Pro-Actively Shut Down Threats 
DEMO
>Stage 2 –Setup and Launch 
Planning and Targeting 
Cashing 
Setup and Launch 
Account Takeover; 
Phishing/Pharming attacks; Malware
>Fraudster’s Main Activities 
Stage 2: The fraudster is now launching the attacks: 
>Launching Malware attack 
>Deploying modified versions of genuine websites/apps 
>Pharming -Host File/DNS Attack 
>Selling acquired Credit/Debit Card details
>Response 
Stage 2: To cover the attack stage of the fraud cycle: 
>Provide a safe browsing environment 
>Scan customer devices for threats 
>Block the threat 
>Protected Sites 
>Provide feedback to Threat Intelligence Element 
>Threat takedown for device indentifiedattacks 
>Collaborative protection 
DEMO
>Stage 3 –Cashing 
Planning and Targeting 
Setup and Launch 
Cashing 
Realisationof attack; 
ATM; Debit; ACH/Wire
>Fraudster’s Main Activities 
Stage 3: The fraudster has acquired information to take cash from an account via: 
>ATM 
>Debit 
>Purchase 
>Top Up 
>Transfer 
>Account transfer (Wire/ACH) 
>P2P Payment
>Response 
Stage 3: To cover the cashing stage of the fraud cycle: 
>Authentication 
>Implement appropriate 2ndfactor authentication 
>Provide Step Up, Risk Based, Authentication 
>Anomaly Detection 
>Detect Unusual Account Behaviour 
>Scores the Risk in Real Time 
>Rules 
>Heuristic Engine 
>Case Management 
DEMO
Thank You

More Related Content

PPTX
Could the Attacks on the SWIFT Network Have Been Prevented?
ODP
A Guide to Modern BPM Integration
PDF
Omg bpmn tutorial
PDF
Winning the war on cybercrime keys to holistic fraud prevention
PDF
Business Email Compromise: A Symptom Not A Cause.pdf
PDF
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
PPTX
Lateral Movement by Default
PDF
Could the Attacks on the SWIFT Network Have Been Prevented?
A Guide to Modern BPM Integration
Omg bpmn tutorial
Winning the war on cybercrime keys to holistic fraud prevention
Business Email Compromise: A Symptom Not A Cause.pdf
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
Lateral Movement by Default

Similar to 02 Easy Solutions (20)

PPTX
Sgsits cyber securityworkshop_4mar2017
PDF
Security Measures in Digital Payment Apps: Keeping Your Money Safe
PPTX
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
PDF
Paper id 35201568
PDF
Man in-the-browser tectia-whitepaper
PDF
ThreatMetrix for 3d-secure
PPTX
Common Types of Cyber Attacks & How to Prevent Them.pptx
PPTX
Stop Account Takeover Attacks, Right in their Tracks
PDF
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
PDF
When thieves strike: Executive briefing on SWIFT attacks
PDF
Easy Solutions Product Brochure
PPTX
ISACA ISSA Presentation
PDF
How eCommerce Fraud Prevention is Evolving_ Key Innovations and Market Trends...
PPT
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
PPTX
What is Account Takeover - An Introduction to Web Fraud
PPTX
Risk Analysis Of Banking Malware Attacks
PPTX
Major Prc.pptx
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
What Are Social Engineering Attacks .pdf
PPTX
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Sgsits cyber securityworkshop_4mar2017
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Paper id 35201568
Man in-the-browser tectia-whitepaper
ThreatMetrix for 3d-secure
Common Types of Cyber Attacks & How to Prevent Them.pptx
Stop Account Takeover Attacks, Right in their Tracks
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
When thieves strike: Executive briefing on SWIFT attacks
Easy Solutions Product Brochure
ISACA ISSA Presentation
How eCommerce Fraud Prevention is Evolving_ Key Innovations and Market Trends...
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
What is Account Takeover - An Introduction to Web Fraud
Risk Analysis Of Banking Malware Attacks
Major Prc.pptx
Accounting Information Systems 11th Edition Bodnar Solutions Manual
What Are Social Engineering Attacks .pdf
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Ad

More from #TheFraudTube (20)

PDF
09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
PDF
FCF 5th Feb 2015 06 - Safer Jobs
PDF
FCF 5th Feb 2015 04 - FDB Tech
PDF
FCF 5th Feb 2015 03 - Local Authority Fraud
PDF
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
PDF
FCF 5th Feb 2015 01 - Welcome & Introductions
PDF
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
PDF
00 FCF Agenda 15th July 2014
PDF
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
PDF
09 pdf show-240
PDF
08 pdf show-239
PDF
07 FCF Resources 15th July 2014
PDF
06 Minutes - FCF May 2014
PDF
05 Identity Theft (C6)
PDF
04 A-Z of Fraud & Cybercrime (Workshop)
PDF
03 Member Spotlight (Virgin Media)
PDF
01 Welcome & Introductions - FCF 15th July 2014
PDF
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
PDF
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
PDF
FCF June 2014 - 00 fcf agenda 19th may 2014
09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 01 - Welcome & Introductions
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
00 FCF Agenda 15th July 2014
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
09 pdf show-240
08 pdf show-239
07 FCF Resources 15th July 2014
06 Minutes - FCF May 2014
05 Identity Theft (C6)
04 A-Z of Fraud & Cybercrime (Workshop)
03 Member Spotlight (Virgin Media)
01 Welcome & Introductions - FCF 15th July 2014
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
FCF June 2014 - 00 fcf agenda 19th may 2014
Ad

Recently uploaded (20)

PPTX
Organisational behaviour_ managerial applications of perception
PDF
Eugene Orlovsky CEO & Founder of Perfsys
PDF
JOB APPLICATION AND RESUME WRITING IN MANAGEMENT
PDF
The Sustainable Site: Boosting Productivity in Construction – Pipe Dream or P...
PPTX
Time Management 2 power point presentation
PDF
How to Present a Project Proposal to Stakeholders for Approval?
PDF
250816-Risk Evaluation & Mitigation Strategy-CQS.pdf
PPTX
INTELLECTUAL PROPERTY LAW IN UGANDA.pptx
PPTX
Presentation on Housekeeping Issue @RP.pptx
PDF
ANIn Mumbai 2025 | Measuring Business Value during Agile Transformation by Pr...
PPTX
Basics of Project Management for development of leadership skills in practice
PPTX
The Sustainable Site: Boosting Productivity in Construction – Pipe Dream or P...
PPTX
Self-Awareness and Values Development presentation
PPTX
Organizing and Staffing, Staffing process.pptx
PDF
ORGANIZATIONAL communication -concepts and importance._20250806_112132_0000.pdf
PPTX
WORLD TRADE ORAGANIZATION- INSTITUTION TO MANAGE TRADE BETWEEN NATIONS
PDF
TED Talk on how to make TED Talk slides.pdf
PPTX
Ryan Daly Gallardo Prod Management PPT .pptx
PPTX
Spotlight on road Injury in the Philippines
PDF
Organizational Effectiveness in companies
Organisational behaviour_ managerial applications of perception
Eugene Orlovsky CEO & Founder of Perfsys
JOB APPLICATION AND RESUME WRITING IN MANAGEMENT
The Sustainable Site: Boosting Productivity in Construction – Pipe Dream or P...
Time Management 2 power point presentation
How to Present a Project Proposal to Stakeholders for Approval?
250816-Risk Evaluation & Mitigation Strategy-CQS.pdf
INTELLECTUAL PROPERTY LAW IN UGANDA.pptx
Presentation on Housekeeping Issue @RP.pptx
ANIn Mumbai 2025 | Measuring Business Value during Agile Transformation by Pr...
Basics of Project Management for development of leadership skills in practice
The Sustainable Site: Boosting Productivity in Construction – Pipe Dream or P...
Self-Awareness and Values Development presentation
Organizing and Staffing, Staffing process.pptx
ORGANIZATIONAL communication -concepts and importance._20250806_112132_0000.pdf
WORLD TRADE ORAGANIZATION- INSTITUTION TO MANAGE TRADE BETWEEN NATIONS
TED Talk on how to make TED Talk slides.pdf
Ryan Daly Gallardo Prod Management PPT .pptx
Spotlight on road Injury in the Philippines
Organizational Effectiveness in companies

02 Easy Solutions

  • 1. by: Easysolver Easy Solutions Demonstration – Proactive approach to Fraud Detection
  • 2. >Agenda >Introduction >Proactive approach to Fraud Detection >3 Stages of Fraud >Proactive vs Reactive >Demonstration >Fraud Stage 1 >Fraud Stage 2 >Fraud Stage 3
  • 3. >Introduction –Easy Solutions Easy Solutions >Venture-backed, Medina Capital (May, 2013) >US: Miami, Atlanta >International: London, Bogota >200+ clients (financial services, travel, telecom) >50M+ users protected Total Fraud Protection >End-to-end Electronic Fraud Prevention >Integration of Intelligence and Action >Complete Solution / Reference Architecture >Combined strengths Visionary - Gartner Web Fraud MQ
  • 4. >Gartner Web Fraud MQ ›“Easy Solutions has a full range of fraud prevention and detection products.” ›“…one-stop shop for most related fraud prevention services”. ›“Easy Solutions’ …solutions can be and have been used across multiple channels, enabling organizations to stop cross-channel fraud”.
  • 5. >What is Fraud? >Account Takeover–Malware, Phishing, Social Engineering >New Account –Malware, Phishing, Social Engineering, account opening process gaps (KYC/CIP) >True-person / Mule -Malware, Phishing, Social Engineering, account opening process gaps (KYC/CIP) All channel fraud happens in one of these fraud types *Internal fraud is also a concern, but non-customer facing
  • 7. >Agenda >Introduction >Proactive approach to Fraud Detection >3 Stages of Fraud >Proactive vs Reactive >Demonstration >Fraud Stage 1 >Fraud Stage 2 >Fraud Stage 3
  • 8. >3 Stages of Fraud Planning and Targeting Setup and Launch Cashing
  • 9. >Stage 1 -Planning and Targeting Setup and Launch Cashing Intelligence Gathering and Targeting; Web presence; Brand details; Social; Mobile Apps; Threat Intelligence
  • 10. >Stage 2 –Setup and Launch Planning and Targeting Cashing Setup and Launch Account Takeover; Phishing/Pharming attacks; Malware Client Protection Analytics Takedown
  • 11. >Stage 3 –Cashing Planning and Targeting Setup and Launch Cashing Realisation; ATM; Debit; ACH/Wire Anomaly Detection Multi Factor Authentication
  • 12. >Total Fraud Protection Planning and Targeting Setup and Launch Cashing Anomaly Detection Multi Factor Authentication Threat Intelligence Client Protection Analytics Takedown
  • 13. >Proactive vs. Reactive Detection Detect Monitoring Service
  • 15. >Scraping Attack Sequence DMS Script on banks website DMS Script copied when the website was scrapped Phishing site being created from files scrapped Formatting site for web deployment / testing forms and fields Deployed phishing site at host
  • 17. >Agenda >Introduction >Proactive approach to Fraud Detection >3 Stages of Fraud >Proactive vs Reactive >Demonstration >Fraud Stage 1 >Fraud Stage 2 >Fraud Stage 3
  • 18. >Stage 1 -Planning and Targeting Planning and Targeting Setup and Launch Cashing Intelligence Gathering and Targeting; Web presence; Brand details; Social; Mobile Apps
  • 19. >Fraudster’s Main Activities Stage 1: The fraudster is: >Accessing genuine websites/apps >Taking local copies of genuine websites/apps >Creating modified versions of genuine websites/apps >Determining customers and end users to target
  • 20. >Response Stage 1: To cover the Planning and Targeting stage of the fraud cycle: >Monitor for suspicious and malicious activity >Process activity >Manage the event >Pro-Actively Shut Down Threats DEMO
  • 21. >Stage 2 –Setup and Launch Planning and Targeting Cashing Setup and Launch Account Takeover; Phishing/Pharming attacks; Malware
  • 22. >Fraudster’s Main Activities Stage 2: The fraudster is now launching the attacks: >Launching Malware attack >Deploying modified versions of genuine websites/apps >Pharming -Host File/DNS Attack >Selling acquired Credit/Debit Card details
  • 23. >Response Stage 2: To cover the attack stage of the fraud cycle: >Provide a safe browsing environment >Scan customer devices for threats >Block the threat >Protected Sites >Provide feedback to Threat Intelligence Element >Threat takedown for device indentifiedattacks >Collaborative protection DEMO
  • 24. >Stage 3 –Cashing Planning and Targeting Setup and Launch Cashing Realisationof attack; ATM; Debit; ACH/Wire
  • 25. >Fraudster’s Main Activities Stage 3: The fraudster has acquired information to take cash from an account via: >ATM >Debit >Purchase >Top Up >Transfer >Account transfer (Wire/ACH) >P2P Payment
  • 26. >Response Stage 3: To cover the cashing stage of the fraud cycle: >Authentication >Implement appropriate 2ndfactor authentication >Provide Step Up, Risk Based, Authentication >Anomaly Detection >Detect Unusual Account Behaviour >Scores the Risk in Real Time >Rules >Heuristic Engine >Case Management DEMO