Print this article

FinCEN issues cyber-crime tips to banks using recent data

Chris Hamblin

30 August 2020

The 'advisory,' as FinCEN calls it, contains the agency's ideas about the things that financial firms should be doing to tackle the problem. 'Advisories' are not legally binding and are merely indications of the attitudes of US Government agencies.

FinCEN has spotted the following indications of Coronavirus-related cyber-crimes for which it hopes financial institutions will watch.

The targeting and exploitation of remote platforms and processes

'Remote' is a word that FinCEN seems to use to mean "away from the office" or perhaps (to use the term the way the Financial Action Task Force generally uses it) "non-face-to-face." No actual definition is given.

Remote identifying processes, which include processes for 'onboarding' customers, verifying their identities and authenticating their identities when they are trying to access their accounts, face two large threats.

Financial 'red flags' that pertain to activity of this sort may take the following forms.

Phishing, malware and extortion

FinCEN and the police have observed significant increases in broad-based and targeted phishing campaigns, but not ones that are targeted at HNWs. Instead, they seem mainly to be attempting to lure companies, especially healthcare and pharmaceutical providers, with offers of information about the Coronavirus and medical supplies.

Business email compromised schemes

More and more, cyber-criminals have exploited the pandemic by means of these schemes, once again concentrating on the healthcare industry supply chain and not wealth managers. Deliveries of face masks and hand sanitisers are the lure. This is otherwise known as spoofing, the act of disguising a communication from an unknown source as though it is from a known, trusted source. Some time ago in the UK, 'CEO fraud' was in the ascendant, and this certainly did target banks along with the rest of business.