Connect with us

News

Callsign Launches Dynamic Interventions to Tackle Authorized Push Payment Fraud

Published

on

Callsign has announced its Dynamic Interventions capability controlled by its Orchestration Engine. This technology allows organizations to detect social engineering scams in real-time and intervene when fraud is detected, delivering contextually relevant and personalized messages protecting the user from becoming a victim of fraud.

The phenomenon of social engineering has emerged as a way for fraudsters to psychologically manipulate consumers into transferring money to accounts held by the fraudsters. Known in the industry as authorized push payment (APP) fraud it is hard for banks to detect as the authorized customer is making the payment.

“Scams like authorized push payments are a digital fraud problem requiring a digital solution. With real-time and faster payment systems becoming the global norm, banks and financial service organizations need to look beyond conventional fraud detection and actively detect, intervene and protect. With APP, static fraud warning messages to customers have become ubiquitous and easy to ignore. Fraudsters anticipate static messages and coach users past those warnings, but Callsign’s Dynamic Interventions detects threats to consumers in real-time, intervenes and alters digital journeys appropriately, introducing new controls or steps to protect customers,” said Chris Stephens, solutions engineer, EMEA, Callsign.

In the last 18 months, APP fraud has grown exponentially. Recent research from industry analysts Forrester reveals that authorized push payments are considered a major problem by 66% of financial services and consumer banking organizations across the globe (APAC 66%, Middle East 67%, North America 56%, UK 72%). Organizations agree that using a combination of threat detection, dynamic fraud warnings, and behavioral biometrics can help solve this issue.

With faster or real-time payments in place across the globe, it’s impossible to recover money once it has been sent, ramping up the costs of fraud for financial services organizations or consumers. Zelle, a peer-to-peer banking app in the US, recently hit the headlines due to APP fraud occurring on the platform. Available to over 100 million banking customers, it is estimated that $490 billion was sent by consumers and businesses in 2021 over the Zelle network and because transactions are instant and non-reversible, the platform has attracted fraudsters.

In Asia, 40% of banks named social engineering as the number one fraud concern with regard to real-time payments and 25% of consumers reported they had encountered social engineering scams. In the UK, research from UK Finance reveals customers lost £583.2 million in 2021 after being manipulated into transferring money into accounts controlled by fraudsters. The UK’s Faster Payments system was the payment method for 97% of those losses.

Using machine learning, the Callsign platform understands recurring behavorial patterns of users when they make online payments and uses that knowledge to detect if the user is acting under coercion. Combined with threat and malware detection, Dynamic Interventions intervene the moment a customer might be in danger, delivering intelligent, contextual, and timely fraud messages to the consumer or stopping payments altogether. Crucially, for genuine users performing recognised activity, these messages won’t be presented. This ensures users will not get message fatigue.

The platform works in unison and identifies threats by asking these questions:

  • Is the session secure?
  • Is the user human? Is there any malware present on the user’s device or has their device been compromised by a bad actor?
  • Is this user authorized? Is the user allowed to make the transactions they wish to make?
  • Is the user being tricked? Are they performing any actions that are unusual, such as making a big transfer to a suspicious account? Does their behavior indicate that they are under some sort of duress or being coached?
  • How can we manage the risks and user experience? What user journeys do we need to orchestrate?

For example, a bad actor may attempt to deploy an impersonation attack against a genuine user, by claiming to be a bank representative and asking for a large payment. As the legitimate user attempts to initiate the payment, Callsign’s Orchestration Engine detects something is wrong by screening the genuine user’s device to ensure that a fraudster isn’t using remote access software to take over the account – or that malware was running, ensuring that the fraudster can’t fool the technology by turning it off at specific stages in the digital journey.

From here, the genuine user’s typing cadence and mouse movements are monitored – for example, they may be slower and more ponderous, indicating they are on the phone receiving directions. Before the payment is approved, Dynamic Interventions powered by Callsign’s Orchestration Engine asks the user about the payment they are making, prompting them with multiple contextual questions. Based on customer answers, threat detection, and customer behavior, the technology establishes if a bad actor is directing them. The answers confirm to Callsign they are under attack, the Orchestration Engine would advise them it is likely that they are under the influence of a bad actor, and do not comply with their instructions, or would intervene to prevent the payment from taking place.

When contrasted with the current setup that requires users to read and consent to generic messaging in a challenging user interface, this approach is more targeted, user-friendly, and engaging. Organizations can customize the interventions to suit their sector and their customers’ needs and can be deployed with just a few clicks of a mouse without any need for coding. Consequently, fraud teams can establish interventions to counter new attacks quickly and efficiently, ensuring that bad actors aren’t successful.

Regulation needs to play a key role when it comes to enforcing consumer protection. Forrester’s research revealed that almost half of the financial services and consumer banking industry see regulatory issues as a significant challenge when trying to detect and prevent scams such as APP fraud. The impact of regulatory compliance has been cited as most significant in both the US and the UK, whereas organizations in the Middle East and the Asia Pacific said the cost of victim reimbursement has a significant impact on their organizations.

With the increase in APP fraud and consumer losses, regulators around the world are acting. The Consumer Financial Protection Bureau (CFPB) in the US recently revised guidance on unauthorized electronic fund transfers (EFTs) and, the UK Government and Payment Services Regulator (PSR) intends to improve reimbursement of APP fraud scam victims. In Asia, while the Monetary Authority Singapore is still updating the framework for equitably shared losses through scams for consultation this year, it doesn’t yet make provision for APP fraud.

It’s clear a new approach to combatting online scams is needed, and the best result for organizations in all sectors is layering solutions, for example using a combination of threat detection, dynamic fraud interventions, and behavioral biometrics, to ensure genuine users are protected.

Cyber Security

Positive Technologies Reports 80% of Middle East Cyberattacks Compromise Confidential Data

Published

on

A new study by cybersecurity firm Positive Technologies has shed light on the evolving cyber threat landscape in the Middle East, revealing that a staggering 80% of successful cyberattacks in the region lead to the breach of confidential information. The research, examining the impact of digital transformation, organized cybercrime, and the underground market, highlights the increasing exposure of Middle Eastern nations to sophisticated cyber threats.

The study found that one in three successful cyberattacks were attributed to Advanced Persistent Threat (APT) groups, which predominantly target government institutions and critical infrastructure. While the rapid adoption of new IT solutions is driving efficiency, it simultaneously expands the attack surface for malicious actors.

Cybercriminals in the region heavily utilize social engineering tactics (61% of cases) and malware (51%), often employing a combination of both. Remote Access Trojans (RATs) emerged as a primary weapon in 27% of malware-based attacks, indicating a common objective of gaining long-term access to compromised systems.

The analysis revealed that credentials and trade secrets (29% each) were the most sought-after data, followed by personal information (20%). This stolen data is frequently leveraged for blackmail or sold on the dark web. Beyond data theft, 38% of attacks resulted in the disruption of core business operations, posing significant risks to critical sectors like healthcare, transportation, and government services.

APT groups are identified as the most formidable threat actors due to their substantial resources and advanced technical capabilities. In 2024, they accounted for 32% of recorded attacks, with a clear focus on government and critical infrastructure. Their activities often extend beyond traditional cybercrime, encompassing cyberespionage and even cyberwarfare aimed at undermining trust and demonstrating digital dominance.

Dark web analysis further revealed that government organizations were the most frequently mentioned targets (34%), followed by the industrial sector (20%). Hacktivist activity was also prominent, with ideologically motivated actors often sharing stolen databases freely, exacerbating the cybercrime landscape.

The United Arab Emirates, Saudi Arabia, Israel, and Qatar, all leaders in digital transformation, were the most frequently cited countries on the dark web in connection with stolen data. Experts suggest that the prevalence of advertisements for selling data from these nations underscores the challenges of securing rapidly expanding digital environments, which cybercriminals are quick to exploit.

Positive Technologies analyst Alexey Lukash said, “In the near future, we expect cyberthreats in the Middle East to grow both in scale and sophistication. As digital transformation efforts expand, so does the attack surface, creating more opportunities for hackers of all skill levels. Governments in the region need to focus on protecting critical infrastructure, financial institutions, and government systems. The consequences of successful attacks in these areas could have far-reaching implications for national security and sovereignty.”

To help organizations build stronger defenses against cyberthreats, Positive Technologies recommends implementing modern security measures. These include vulnerability management systems to automate asset management, as well as identify, prioritize, and remediate vulnerabilities. Positive Technologies also suggests using network traffic analysis tools to monitor network activity and detect cyberattacks. Another critical layer of protection involves securing applications. Such solutions are designed to identify vulnerabilities in applications, detect suspicious activity, and take immediate action to prevent attacks.

Positive Technologies emphasizes the need for a comprehensive, result-driven approach to cybersecurity. This strategy is designed to prevent attackers from disrupting critical business processes. Scalable and flexible, it can be tailored to individual organizations, entire industries, or even large-scale digital ecosystems like nations or international alliances. The goal is to deliver clear, measurable results in cybersecurity—not just to meet compliance standards or rely on isolated technical fixes.

Continue Reading

Channel Talk

Qualys Partners with Teksalah, the First Middle Eastern MSP in its mROC Alliance

Published

on

Qualys has announced the expansion of its invite-only managed Risk Operations Center (mROC) Partner Alliance with seven new global partners, including Teksalah from the Middle East. This marks a significant step forward in Qualys’ mission to build a robust Risk Operations Center (ROC) ecosystem—making business-aligned cyber risk management more accessible, actionable, and measurable for organizations worldwide.

Built on the Qualys Enterprise TruRisk™ Management Platform, the ROC framework consolidates risk signals across an organization’s digital footprint into a single pane of glass. It enables Continuous Threat Exposure Management (CTEM), cyber risk quantification, and risk remediation, empowering CISOs to translate cyber risk into business terms, ensure audit readiness, and build long-term resilience.

The mROC Partner Alliance equips partners to drive growth by delivering enhanced Qualys-powered ROC services that transform how enterprises measure, manage, and reduce cyber risk. The expanded roster of partners brings world-class expertise to help organizations overcome common cybersecurity challenges such as fragmented tools, disjointed risk response, and limited visibility—enabling a proactive approach to managing cyber risk at scale.

“When we introduced the concept of the Risk Operations Center, we knew it had the potential to redefine how organizations manage cyber risk,” said Sumedh Thakar, president and CEO of Qualys. “Today, with the launch of our inaugural global mROC partners, we’re delivering on that vision. This is a major milestone in building a thriving ROC ecosystem—one that helps businesses around the world take control of cyber risk with clarity, speed, and measurable impact.”

mROC Partners, through a comprehensive suite of risk service offerings, play a critical role in Qualys’ mission to make cyber risk management easier to adopt, more practical to implement, and more impactful for organizations globally. This innovative group of mROC partners has been thoroughly trained and enabled to operate a ROC powered by Qualys Enterprise TruRisk Management (ETM), delivering comprehensive managed risk services. By aggregating and analyzing risk signals from both Qualys and third-party tools, they offer their clients a holistic, business-aligned view of their risk exposure.

“The Teksalah and Qualys partnership is built on a shared vision — to embed a holistic risk-based, proactive approach at the core of enterprise cybersecurity. Through our powerful platforms, intelligent tools, and proven services—covering real-time risk monitoring to effective remediation—we are enabling organizations to manage risk with precision and drive secure innovation. Together, we are transforming our client’s cybersecurity from a control function into a catalyst for business growth and resilience,” commented Murali Konasani, CEO, Teksalah.

Continue Reading

Africa Focus

CyberKnight Sets Up South Africa Entity

Published

on

CyberKnight, a prominent regional cybersecurity advisory and value-added distributor, today announced the establishment of its local entity in Johannesburg, South Africa. The company has also appointed Wade Gomes as Country Manager for the SAADC (Southern African Development Community) region. This move underscores CyberKnight’s dedication to supporting the burgeoning Southern African market, where cybersecurity is increasingly becoming a top priority for organisations across various sectors.

“Wade Gomes’ appointment marks an important milestone for CyberKnight in Southern Africa. His deep industry knowledge, decades of experience and leadership will be instrumental as we expand our presence and work closely with our partners and customers,” said Yaadhna Singh Gounden, Regional Director for Sub-Saharan Africa. “Our goal is to enable organisations to navigate the complexities of today’s cybersecurity landscape with confidence, leveraging best-in-class solutions and proven frameworks.”

South Africa’s ongoing digital transformation, coupled with the rising sophistication of cyber threats, has driven a greater emphasis on implementing strong security solutions and adhering to regulatory compliance. The region’s cybersecurity market is characterised by a significant demand for advanced technologies, particularly in areas like cloud security, AI-powered threat detection, and managed security services. As businesses embrace digitalisation, they encounter new vulnerabilities, necessitating scalable and innovative solutions to safeguard sensitive data and ensure uninterrupted operations. The collaborative efforts between government, businesses, and technology providers to bridge skills gaps and strengthen defenses highlight the significant growth potential in the region.

“I’m excited to be part of CyberKnight’s journey in Southern Africa. The region is at a critical point in its cybersecurity evolution, and there’s a real opportunity to make a lasting impact, by combining local expertise with global experience. I’m honored and excited to lead this mission locally, with a goal to transform South Africa into one of CyberKnight’s hubs and a center of excellence, by helping customers stay ahead of threats while maximising the value of their cybersecurity investments,” added Wade Gomes, Country Manager at CyberKnight.

CyberKnight’s establishment in South Africa signifies its complete coverage across the African continent. The company brings its Zero Trust Security philosophy and a portfolio of leading global cybersecurity vendors to assist enterprise and government organisations throughout Africa in managing risk and enhancing resilience as they navigate evolving regulations and threats.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.