Account Takeover Fraud
,
Anti-Phishing, DMARC
,
Finance & Banking
Report Reveals Rising Pattern of Fraudsters Intercepting SMS-Primarily based Verification
Monetary establishments have traditionally relied on one-time passcodes as a major authentication management for his or her accountholders. However OTP verification is much less dependable as fraudsters more and more exploit SMS-based verification weaknesses to hold out account takeover and cost fraud schemes.
See Additionally: Consultants Supply Insights from Theoretical to the Realities of AI-enabled Cybercrime
A brand new report from risk intelligence agency Recorded Future reveals that attackers are intercepting OTPs to bypass authentication mechanisms, usually as a part of broader fraud campaigns.
The digitization of the banking trade has ushered in an increase in social engineering scams, with attackers impersonating banks and repair suppliers to trick clients into sharing authentication codes in actual time. This shift displays an evolution in fraud techniques by which attackers not must defeat safety controls instantly however as a substitute exploit them throughout dwell interactions with victims.
Fraud is turning into more and more structured and repeatable, pointing to the rising industrialization of fraud operations, the report stated.
Whereas Recorded Future researchers stopped in need of declaring OTP out of date, they warned that more and more refined and coordinated assaults are outpacing conventional fraud controls.
In lots of nations, OTP-based authentication remains to be extensively used throughout digital banking and funds. For the reason that verification depends on real-time communication, profitable exploits depend on socially engineering consumer habits. Attackers can simply alter the sender info of an SMS message to make it seem official and trick the sufferer into clicking on a malicious hyperlink. Researchers identified that customers ought to all the time confirm the authenticity of a message earlier than clicking on any hyperlinks in it.
Joe Toomey, head of safety engineering at Coalition, stated it is time for organizations to rethink counting on OTP-based authentication.
“I don’t see any good clarification for companies to make use of OTP. FIDO is one of the best and strongest resolution that now we have, and it requires some {hardware} assist,” Toomey stated, referring to a passwordless phishing-resistant authentication technique.
OTP-based techniques stay simple targets for attackers, notably for smaller organizations, he stated.
“You do not have to be a Google or a Cisco to get hacked by means of OTP. It’s fairly low-hanging fruit to hold out these assaults, and even small companies could be affected,” he stated.
Whereas push fatigue assaults and SIM swapping stay frequent, one-time password session hijacking is now probably the most prevalent kind of MFA bypass assault concentrating on Coalition’s policyholders, Toomey stated.
“MDR and MFA are significant compensating controls. MFA helps with id and entry administration, whereas MDR improves your capacity to determine an adversary,” he stated.
However these approaches do not totally handle the dangers related to SMS-based authentication. The grown of real-time cost techniques, which compress to time accessible for detection, is another excuse for concern for fraud administration leaders.
Regulators in a number of markets have already begun to behave on these dangers, signaling a broader shift away from OTP-dependent authentication fashions.
The Reserve Financial institution of India in April introduced up to date digital cost authentication necessities that transfer past OTP-only verification, mandating multifactor approaches together with device-based authentication and biometrics.
Singapore’s banking sector phased out SMS-based one-time passwords for account logins in October 2024, following a mandate from the Financial Authority of Singapore and the Affiliation of Banks in Singapore. Main retail banks changed OTPs with app-based digital tokens to counter phishing assaults by which scammers impersonate monetary establishments to hijack buyer accounts. Final month, the United Arab Emirate phased out OTP verification in all banks.
Equally, regulators within the Philippines are pushing monetary establishments to scale back reliance on SMS-based authentication, whereas European rules underneath PSD2 permit OTP use solely underneath stricter circumstances reminiscent of dynamic transaction linking and multi-factor necessities.
U.S. regulators, together with the Federal Monetary Establishments Examination Council and Client Monetary Safety Bureau, view OTPs as a key a part of multi-factor authentication underneath the Gramm-Leach-Bliley Act of 1999. However rising fraud reminiscent of SIM-swapping and social engineering might push regulators away from SMS-based OTPs towards safer authentication strategies.
The worldwide regulatory response displays a broader trade shift towards authentication fashions that mix a number of alerts, together with gadget id, behavioral patterns and biometric verification.
Whereas multifactor authentication is essential for securing on-line accounts, SMS OTP will not be probably the most safe type of MFA, stated Rubaiyyaat Aakbar, head of IT and cybersecurity with an InsureTech startup in Singapore.
“Utilizing WhatsApp OTP as an answer to deal with SMS OTP safety points could possibly be a easy however efficient resolution because it provides end-to-end encryption and is cheaper than SMS,” he stated. He added that single sign-on through social login is an efficient choice for non-financial functions.
For monetary establishments, the problem lies in balancing safety with consumer expertise, notably in markets by which OTP stays deeply embedded in buyer journeys.
The report means that relying solely on conventional controls is not enough, as fraudsters proceed to adapt and scale their operations.
As fraud turns into extra industrialized and real-time in nature, authentication itself is rising as a key battleground the place extensively used mechanisms reminiscent of OTP are more and more being examined.
“Our authentication is so much primarily based on shared secrets and techniques like OTP. Hackers got here up with pixel-perfect reproduction websites that you just may be utilizing as a shopper and so they can trick you handy over that OTP and the 30 seconds window is lengthy sufficient for an account takeover,” stated Jeremy Grant, managing director, managing director at Venable LLP.






