Wednesday, October 17, 2018 | ePaper

BREAKING NEWS:

Cyber attacks growing problem in developing nations

  • Print
Silvia Baur-Yazbeck  :
Few experiences undermine a digital financial services (DFS) customer's finances and trust in DFS like becoming the victim of a cybercrime. This is especially true of low-income customers, who are least able to rebound from the losses, and of the newly banked, whose trust in financial services may be fragile.
Unfortunately, cybercrime is a growing problem in developing countries, where customers often conduct financial transactions over unsecure mobile phones and transmission lines that are not designed to protect communications. In Africa, the number of successful attacks against the financial sector doubled in 2017, with the biggest losses hitting the mobile financial services sector. DFS providers must adopt stronger cybersecurity measures to protect themselves and their customers. But which threats pose the greatest risk today?
In 2017, CGAP surveyed 11 DFS providers operating in Africa to understand how they perceive and mitigate cyber risks. We learned that all of them have been affected by cybersecurity incidents and are at various stages of implementing cybersecurity measures in their organizations.
While they are still most concerned about better-known types of fraud in DFS, such as malicious employees and agents, they are seeing themselves confronted with four types of risks emerging in cyberspace.
Social engineering
In a social engineering attack, the criminal tricks the victim into revealing sensitive information or downloading malware, which opens the doors to physical locations, systems or networks. The idea is to exploit a vulnerable person rather than a vulnerable system. DFS providers from Ghana, Kenya, Tanzania, Uganda and Zambia told us that fraudsters had duped their employees into sharing their user login details and then accessed corporate information systems. Most DFS providers consider careless or unaware employees to be a major factor in their organization's cyber risk exposure.
But DFS customers are a vulnerability, too. The newly banked are more likely to fall victim to this type of scheme because of their limited experience with digital fraud. Providers can guard against social engineering through regular awareness and education campaigns. It is also important to appropriately manage user access rights, introduce system log monitoring processes and require two individuals for completing sensitive transactions (i.e., maker-checker controls).
Data breaches
Using malware or social engineering, hackers can gain access to valuable information, such as credit card numbers, customer personal identification numbers, login credentials and government-issued identifiers. Weak patch management, legacy systems and poor system log monitoring were cited as the main reasons why DFS providers' systems are susceptible to hacking attacks. In addition to financial losses that can result from a data breach, providers' reputation and customers' trust are at risk. In 2017, thieves breached a DFS provider's systems in Kenya and stole hundreds of customers' identities.
The fraudsters accessed sensitive customer information, such as account types and last transactions, which allowed them to pass as legitimate customers and apply for loans in the victim's name. To protect against data breaches, DFS providers need to regularly update their systems and software, patch their systems, use strong encryption for data at rest and in transit and implement 24/7 system log monitoring.
Outages & denial of service attacks
DFS providers sometimes experience system outages during routine system upgrades or patches. Earlier this year, an upgrade gone awry left DFS users in Zimbabwe without access to their digital money for two days. Systems unavailability can also be the result of a cyberattack. For example, in 2017, M-Shwari customers in Kenya were left without access to their savings and loan products for five days. And, after the outage, several found inconsistencies in their account balances. The most frequent form of attacks that cause system unavailability are denial-of-service attacks.
In a denial-of-service attack, cyber criminals overwhelm a server by flooding it with simultaneous access requests, depriving legitimate users of access to the system.
In most cases, the objective is to harm the business. Yet, in some cases, cyber criminals have launched denial-of-service attacks to distract attention from an attempt to gain access to the system.
Effective countermeasures include continuous network traffic monitoring to identify and detect attacks while allowing legitimate traffic to reach its destination, a solid and tested incident response plan that allows for quick reaction in an emergency and strong change management processes and disaster recovery planning.
Third-party threats
DFS providers rely on third parties for a range of services, such as mobile network, information technology and data storage solutions. Sometimes, these providers misuse their system rights to access confidential customer information that they can sell or use for social engineering.
Also, a third party that handles sensitive information may not have appropriate safeguards against cyberattacks, putting at risk the confidentiality and integrity of the DFS provider's customer data. To address third-party threats, DFS providers should implement due diligence reviews of current and potential partners, including reviews of their security policies and practices.
Impact on low-income customers
If physical money used to be kept safe in bank vaults, what is protecting money now that it is digital? This is a financial inclusion question because the answer is especially important for low-income customers. In developed countries, it is usually the financial services provider that is legally responsible for bearing the cost of fraud. In developing countries, it is often the customer.
The experience of fraud and rumors of fraud experienced by others causes mistrust in DFS, especially among lower-income consumers. The DFS providers we spoke with in Africa recognize their need to invest more in cybersecurity for both themselves and their customers.
They acknowledge that better safeguards are needed to mitigate threats and be better prepared to respond to incidents. Failure to take the relevant steps could deter people from entering the formal financial system and significantly harm consumers and markets.
- IPS

More News For this Category

Take steps to stop fatal gas explosions and feel accountable

IN the latest incident of gas pipeline explosions, a man and his wife were roasted alive and 6 others, including three women and a minor boy, sustained burn injuries in

To govt press freedom is not the spirit of Liberation War

Prime Minister Sheikh Hasina on October 15 dismissed any possibility of talks with the Sampadak Parishad (Editors' Council) on the Digital Security Act, saying there is no scope for discussions

Strategies for disaster reduction

Dr. Forqan Uddin Ahmed :Disaster has been defined by various individuals and organizations in various ways depending on their nature of understanding and on the ways of focusing the issue.

Green banking in emerging markets

Philippe Le Houérou :This past fiscal year, 36 percent of our own accounts and mobilization supported climate-smart projects - up from 12 percent a decade ago. Since May, we have

Leadership in young girls

Marie-Louise Coleiro Preca  :On October 11, we will mark the International Day of the Girl by acknowledging the value and contribution being made by some 1.1 billion girls, who form

Readers’ Forum

Provide quality service please!  It's hard to deny the fact that the number of hospitals has increased in our country over the years, but it's also true that it isn't

Living standard of RMG workers should be enhanced

THE workers of readymade garment sector in Bangladesh earn poverty-level wages. Not only that, they continue to work excessively long hours for little money. Whereas, the government and the industry

Question paper leakage continues: Incompetence is everywhere

QUESTION paper leaks have become epidemic before all public exams, university admission tests, and job recruitment tests during the current administration allegedly by some students and unscrupulous teachers along with

A different way to measure our wealth

Kamal Ahmed :How do you measure the value and success of the economy?Traditionally, by reporting on gross domestic product - the amount an economy produces of goods like cars and

Going full circle for growth

Li Yong and Hong Joo Hahm :The business case for making our economy more sustainable is clear. Globally, transitioning to a circular economy - where materials are reused, re-manufactured or