Bank customers in Singapore hit by fraud

Banking and telecommunication systems not compromised.

The Infocomm Media Development Authority (IMDA), Monetary Authority of Singapore (MAS), and Singapore Police Force (SPF) said that malicious actors overseas had diverted and used SMS one-time passwords (OTPs) to perform fraudulent credit card transactions affecting 75 bank customers in Singapore.

These transactions, amounting to approximately S$500,000 in total, occurred between September and December 2020. Customers had reported that they had not initiated the transactions nor received the SMS OTPs required to perform these transactions.
Investigations by the banks found that their systems were secure, uncompromised, and not the cause of these incidents.
Subsequent joint investigations by SPF and IMDA, with the support of the banks, revealed that malicious actors abroad had gained unauthorised access to the systems of overseas telecommunication operators and used them to modify the location data of the mobile phones used by the victims in Singapore.

The malicious actors were thus able to divert to overseas mobile network systems the SMS OTPs sent by the banks to their customers.  Having separately obtained their victims’ card details, the malicious actors then made fraudulent online card payment transactions and authenticated these transactions using the diverted SMS OTPs.

The compromised overseas telecommunication networks have already been identified and notified, while investigations are ongoing to identify the perpetrators and bring them to justice.
SMS diversion is a mode of attack that requires highly sophisticated expertise to compromise the systems of overseas telecommunication networks.

While local telecommunication networks are secure and had not been compromised, IMDA, in consultation with the Cyber Security Agency of Singapore (CSA), has required operators to put in place additional safeguards, including specialised firewalls and system safeguards to monitor and block suspicious diversions of SMS.

 

 

 

Tags:

Leave a Comment

Related posts