Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity NewsBanking/Finance/Insurance

93% of fraud attacks occur online

banking freepik
June 3, 2021

Feedzai has announced its Quarterly Financial Crime Report, an analysis of over 12 billion global banking transactions from January – March 2021. The report identifies trends in spending and in fraud attempts to show that this past quarter, as consumer activities increased, fraudsters attempted to hide their fraudulent transactions in legitimate banking. In fact, combining all banking fraud  – internet, telephone, and branch – attacks grew a whopping 159% in Q1 2021 compared to Q4 2020. 

Online banking made up 96% of all banking transactions and it accounted for 93% of all fraud attempts in Q1 2021. This leaves in-branch and telephone banking to make up the remaining 4%. And while the numbers are smaller, in-branch banking did increase by 442% this quarter compared with the last as a result of eased lockdown restrictions as businesses begin to open for trade. In addition, telephone scammers upped their efforts and the report shows a 728% increase in telephone banking fraud.

John Bambenek, Threat Intelligence Advisor at Netenrich, a San Jose, Calif.-based Resolution Intelligence provider, says, "In the last year, governments have engaged in a variety of “free money” type policies (unemployment, consumer stimulus, payroll protection loans, etc.) that, while necessary, created a target-rich environment for criminals to steal money. We may never know to the true scope of unemployment fraud, for instance. Whenever there is more money in the system, criminals will try to exploit. Combined with the fast-changing nature of our early pandemic response and now return to normalcy, it’s hard for behavioral models to determine what is fraud and what is simply changing user behavior. Quite simply, fraud models work when user behavior stays constant and society has been upheaved by the pandemic and fast return to normalcy.

Bambenek adds, "Fraud and cybersecurity teams always need to be mindful of how changes in the world around them can increase risk and how changes in society may impact how we go about detecting malicious behavior."

While many shoppers choose to make purchases from the comfort of their mobile phones, the report also found that Android users are more likely to experience fraud. Of the total volume of fraudulent transactions, 34% were conducted on iOS, and nearly double (66%) were attributed to Android. Despite a disproportionately higher total transaction volume on iOS, Android devices still made up for two thirds of fraud attempts. The report notes that two possible causes for this are Android’s open approach to support third-party app stores, which is more conducive for mobile malware, along with Apple’s penchant for controlling apps on the App store.

Hank Schless, Senior Manager, Security Solutions at Lookout, a San Francisco, Calif.-based provider of mobile security solutions, explains, "Threat actors will always take advantage of uncertain or unstable societal situations to increase the success of their attacks. The pandemic provided the perfect opportunity, and even as people transition back to normal life, there is uncertainty about issues like vaccination access and continued government financial support. Lookout data shows that, globally across all industries, almost 45% of consumers were exposed to a phishing link on their mobile device. Lookout data also shows that over 20% of consumer banking customers encountered a banking trojan on their mobile device. Attackers will frequently use phishing links as a vehicle to deliver malware that can live on the device for a longer period of time and continuously exfiltrate data from the device."

Lookout data shows that, in the first quarter of 2021, 23% of financial services employees were exposed to a mobile phishing attempt, Schless says. "This is almost the same as the first quarter of 2020 when the exposure rate was 26%. This shows that threat actors are taking advantage of the tail end of the pandemic in the same way they took advantage of the uncertainty at the start of it."

Joseph Carson, chief security scientist and Advisory CISO at ThycoticCentrify, a Washington D.C. based provider of cloud identity security solutions, says, "Make sure passwords are not your only security control.  One way criminals will steal your identity is by taking over your accounts and do not make it easy for them.  Use strong access controls to protect your most important accounts using a password manager and multi factor authentication. Also, limit what personal information you make available on the public internet, the more details you make available the easier it is for criminals to reuse and duplicate your identity. Finally, audit your logs for potential unauthorized access to your accounts.

Hitesh Sheth, President and CEO at Vectra, a San Jose, Calif.-based AI cybersecurity company, agrees. Sheth adds, "It is important to change your passwords regularly and don’t use the same password for multiple financial accounts. Also, read your monthly credit card statements – it’s amazing how many people don’t – and flag purchases you don’t recognize. Most banks make it easy nowadays to dispute a sketchy charge to your card."

Fraud by Numbers – Top 5 Banking Scams

  • Account Takeover (ATO) (42%) –  Fraudsters gain access to account credentials and take over the account, which often includes changing the password and address. 
  • Account Opening Identity Theft (23%) – Fraudsters open accounts using stolen identities. Victims often become aware of this type of scam when debt collectors come calling.
  • Impersonation Scams (21%) – Fraudsters pretend to be a government official or some type of authority figure to gain access to an account or trick victims.
  • Purchase Scams (15%) – In purchase scams, buyers pay for items online that never arrive.
  • Phishing (7%) – Typically, scammers use emails that trick account holders into revealing personal information.

Michael Isbitski, Technical Evangelist at Salt Security, a Palo Alto, Calif.-based provider of API security, suggests, "Stick to banks that invest in good fraud detection and prevention services. All banks are required by law under the Fair Credit Billing Act to protect consumers in the event of fraudulent transactions. You aren’t responsible for transactions that are deemed fraudulent. However, you must be diligent about monitoring your own credit. It is very helpful if the bank you choose to do business with also has your back and invests more in proactive fraud detection and prevention.

Isbitski adds, "If a fraudster attempts or succeeds in compromising identity or a credit card information, don’t fault yourself or get overwhelmed with guilt. At some point, every citizen and customer is targeted. Fraudsters are pervasive, persistent, cunning and often well-funded. They will use a large variety of attack methods to obtain and use information for financial gain. There are many services available to you including those provided by the US government, credit bureaus and banks themselves.

Fraud by Region

U.S. consumers are beginning to spend more money in other countries and other states, indicating an increase in travel as pandemic restrictions loosened. Combining the lift in travel with the trend in online attacks may shed light on why fraud hit some states harder than others, with a mix of top travel destinations and the locations of large e-commerce headquarters on the list.  

The top five states with the highest rates of fraud were:

  1. California
  2. Florida
  3. Washington
  4. Arkansas
  5. New York

Meanwhile, in the UK, the counties that experienced the most fraud were:

  1. Berkshire
  2. Warwickshire
  3. Buckinghamshire
  4. Nottinghamshire
  5. Derbyshire

Access Feedzai’s Quarterly Financial Crime Report to learn more about the latest fraud and consumer trends.

KEYWORDS: bank security cyber security fraud prevention risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Computer

    90 Voice Fraud Attacks Occur Every Minute

    See More
  • Computer chip with AI printed on top

    93% of security leaders anticipate daily AI attacks by 2025

    See More
  • fraud-enews

    1.1 billion fraud attacks detected since the beginning of 2020

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!