• The first step is to assemble representatives from all the teams involved in cyber fraud prevention — cybersecurity, threat intelligence, financial crimes/AML, data analytics, fraud, etc.
  • Next, each team should research the techniques and indicators they have discovered, and bring their initial research to the collective table for full analysis. That way, everything that is known about the fraud can be surfaced. Fraud indicators can be discovered at any phase of an attack, so the framework is designed to be implemented wherever the indicator is found. Each phase can contain a mix of discrete adversarial techniques and indicators. The teams will likely bring perspectives unique to their field in the various phases. For example, cybersecurity teams tend to have the most knowledge about Phase 1 (Recon) and Phase 2 (Initial Access) and can bring insights on domain registration, IP intelligence, and reviews of social media, the Dark Web, and digital fingerprints, among other issues. Similarly, fraud teams can share their perspectives on account activity, data analysis, and risk rule alerts. Treasury management or anti-money laundering functions may have insight on call center alerts and indicators, among other issues. Sometimes perspectives overlap, such as cybersecurity and fraud teams’ insights on Phase 3 (Positioning). When those techniques are discovered, the specific details and indicators should be documented in terms standardized across the institution (appointing someone to manage full documentation may help). That process:
    • Limits irrelevant situational or contextual information
    • Facilitates accurate, comprehensive communication of the fraud lifecycle
    • Directs team members toward aspects of the scheme unique to their domain
  • Having identified as much as they know on a team level, the group uses the collated information to uncover how the criminal achieved that phase — they “look left” on the framework. The collective insights of the group highlight gaps in information that direct them to gather more, as yet unknown, data. (It should be noted that all members of FS-ISAC have access to threat feeds and member intelligence.)
  • By walking through the crime, the group can gather insights into the fraud, identify indicators, and place controls to prevent the criminal from moving forward . Those insights can be used to analyze other accounts and transactions for similar fraudulent activity. Importantly, if the group continues to “look left” and pools information, it will develop a clearer understanding of fraud activity in the institution. If the group uses that knowledge to “look right,” participants can better predict how that activity will proceed (or has already proceeded). That information can be used to detect or prevent other threats.