The invention relates in general to the field of validation of an electronic transaction or another operation within a computerized environment, such as the e-commerce environment.
Enterprises such as financial institutions, healthcare institutions, and retailers often require their users to confirm specific security-related operations such as transactions, changes to billing addresses, requests for password resets, and abnormal access attempts. Typically, the institutions validate such operations (hereinafter, both “operations” and “transactions” will be referred to herein by the term “transactions”) via an alternative channel which is separate from the channel through which said transaction was allegedly performed by the client. For example, if a transaction was performed via a bank mobile application in a mobile device, or via the bank website, the validation process is typically performed by sending an SMS to the user's mobile phone, asking him to confirm by a return message that he himself performed the transaction. In relatively rare cases, a bank clerk may directly call the client to confirm the validity of the transaction.
During this confirmation process the user is usually presented with the details of the transaction and is requested to confirm and authenticate the transaction. The different channel and procedure over which the confirmation and authentication process typically takes place may use a card and reader device, a mobile application, or a callback to the user's landline phone. The purpose of this process is to block attacks in which an attacker compromises the user's endpoint device or the user's login credentials and performs a certain transaction on behalf of the user. The confirmation and authentication process could stop the attack if the real user who gets the request for confirmation doesn't confirm or authenticate an event that he or she did not initiate.
Over the years attackers have found ways around this procedure using social engineering techniques. Google defines “social engineering” as “. . . a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter”. A good example for that is when a bank asks a customer to confirm and authenticate a transaction using a card and reader device or a mobile application. The following is an example for such an attack: First, the hacker compromises the customer's online bank account by stealing login credentials using a phishing attack or placing malware on the customer's computer. Next, the hacker who now has access to the customer's online account initiates a transaction on behalf of the customer. However, to complete this fraudulent transaction, the hacker now needs the customer to authenticate and confirm the transaction using card and reader or a mobile device to which the hacker has no access. To achieve this target, the hacker may use one of various social engineering techniques that are available to him over the phone. For example, the hacker may call the customer and pretend to be a bank or a law enforcement representative. The hacker starts the conversation by revealing private information relating to the customer's account such as the latest activity in the account, or the account balance. As the hacker has previously gained access to the customer's online account, the hacker in fact gained access to this information as well. This process usually convinces the customer that the hacker is a bank or law enforcement representative, as only the bank knows that much about the customer's account. Once trust is established between the hacker and the customer, the hacker convinces the customer to approve a fraudulent transaction. There are various ways of doing that, and they all depend on the hacker's social engineering creativity. For example, the hacker may tell the customer that this is an educational guidance about some changes to the banking system, and during this lesson the customer is requested to run an allegedly non-real transaction, only in reality this transaction is very real. In another example, a message or clerk tells the customer that there is a security breach in his account, and for the customer's own safety the money in the account needs to be transferred to a new account where it will be kept safe. The new account is in fact the fraudulent account which the hacker has prepared in advance.
It is therefore an object of the present invention to provide a system for preventing social engineering based attacks;
It is another object of the present invention to provide a system which authenticates and validates customers transactions in the e-commerce environment;
Other objects and advantages of the invention will become apparent as the description proceeds.
The invention relates to system for validating a transaction in an institution and ensuring that said transaction has not been exploited by use of social-engineering, which comprises: (A). in an institution server: (a) a validation engine which is configured to: (a.1) receiving a request message for the performance of a transaction validation against a possibility of social-engineering type manipulation, said request comprises parameters of said transaction; (a.2) based on a set of predefined rules and on a storage of predefined template messages, selecting a message template from said storage, filling fields of the message with specific data, and sending an inquiry message to an application of said institution within a customer device; and (a.3) receiving a response message from said application, and either repeating formulation and sending of an additional message to said application, or concluding the request; (B.) in a customer device: (b) an application and a user interface for: (b.1) receiving said inquiry message, and displaying the same to the customer; (b.2) receiving a customer response to said inquiry message, formulating a response message, and forwarding to said institution server; wherein said rules and said template messages are particularly designed to allow formulation of messages by said validation engine that inquire the customer with respect to social-engineering types of issues.
In an embodiment of the invention, the system further comprises encryption and decryption units in both said server and application, for communicating messages in encrypted form between the server and the application.
In an embodiment of the invention, the evaluation of the response message and the decision whether to issue an additional inquiry message, or otherwise to conclude the validation session are performed at the server.
In an embodiment of the invention, the response message is forwarded from the server to the issuing division of the request message, and the evaluation of the response message and the decision whether to issue an additional message or to conclude the session are performed at said request issuing division.
In an embodiment of the invention, said inquiry message further comprises authentication fields, and wherein data within said authentication fields cause activation of an authenticator within sais customer device, said authenticator in turn extracts authentication related data from hardware units within the device, or it receives authentication related inputs from the customer.
In an embodiment of the invention, said authentication related data or inputs, respectively, as extracted or received from the customer are evaluated either by said application, or forwarded within the response message to the server, for evaluation at said server.
In the drawings:
The present invention discloses a system for eliminating social engineering types of threats in an e-commerce environment. As noted above, the prior art procedure for validating transactions that have allegedly been performed by a customer involves sending a message to the customer over an alternative channel which is separate from the channel in which the transaction was performed, requesting the customer to either confirm the transaction or to reject it. As also noted, such a prior art procedure does not eliminate various social-engineering techniques that are applied by attackers (several of those techniques have been elaborated above).
As will be described in more details, the application which is distributed by the institution (such as a bank) and is installed at the customer's smart phone for performing various tasks is also used by the invention to eliminate various kinds of social-engineering-related threats.
It should be noted that the evaluation of each the user's response messages may be performed either within the server 20, or within the request message issuing division. Therefore, the decision whether to issue an additional request message or to conclude the session may also take place in either one of said units, respectively.
As noted, while the prior art systems confirm and validate a transaction per se by sending a request for confirmation message over an alternative channel to the customer, to which the customer is required to provide merely a yes/no confirmation answer of the transaction itself, the system of the invention issues messages that are specifically targeted to eliminate social-engineering attacks, and their content include a broader scope than just confirming the transaction itself Moreover, the system of the invention utilizes for this purpose the application 15, which may be the same channel on which a part of the social-engineering manipulation was illegally performed. Therefore, an inquiry message may include a question such as:
The inquiry message to the user also includes authentication elements that are used for various authentication purposes at the user device 11, i.e., to provide additional feedback to the server with respect to the authenticity of the user and his device. For example, such validation elements may activate one or more of the following extraction or customer inputting units within an authenticator module 19 at device 11 and for conveying respective data to the server 20:
It should be noted that expected data with respect to one or more of the above authentication elements may be sent within one or more inquiry messages from the server 20 to the device 11, and upon real time extraction by the authenticator of one or more of the above elements, the verification can be performed internally within the device 11 by respective verification modules that are provided at application 15. Alternatively, the data as accumulated by the authenticator may be sent to the server 20, and the authentication may be performed either at server 20, or at the request issuing division.
In an embodiment of the invention, the device 11 may be a stationary computer, and the application may be adapted to operate on a stationary computer, respectively.
The following is a non-limiting example:
This application claims the benefit of U.S. Provisional Application No. 62/069,869, filed Oct. 29, 2014, which is incorporated by reference in its entirety.
| Number | Date | Country | |
|---|---|---|---|
| 62069869 | Oct 2014 | US |