Financial malware

Typical pattern of attack

A typical cyber-attack takes place in 3 steps:

  • The user’s PC is infected via an e-mail containing an attachment with harmful software (malware)
  • The fraudster takes over control of the PC from a remote location
  • He then creates fraudulent transactions and tricks the user into signing them

This means that cyber-attacks are targeted at the user’s PC itself. PCs can pick up these infections through ordinary actions such as visiting an infected website or by opening attachments to e-mails.

Once the malware is in place, the fraudster can take full control of the PC without the user even being aware of it. It’s as though the imposter himself (or herself) is sitting at your keyboard. He then waits until you are away from your desk to start making transactions, or he does it in the background.

However, the swindler cannot sign the transactions himself. So he tries to mislead you and encourages you to sign these fraudulent transactions yourself.

Risk for Isabel 6 users

When it comes to Isabel 6, cyber-attacks follow the same sort of pattern. The only difference is that when the fraudster wants to have transactions signed, the card-reader will beep. If the user (you) recognises the request made by the card-reader as being suspicious and does not enter his PIN number, there is no problem.

Unfortunately, there is always the risk that you simply enter your PIN as a matter of reflex and thus unconsciously sign the fraudulent transactions. So, it is actually the user who signs these transactions, after which they are carried out by the bank. Please note that when signing transactions, the Isabel card reader will always beep three times..

Frequently asked questions
 

How does malware affect my PC?

How can I remove malware from my PC?

What can my company do
to avoid attacks?

How do I know whether my PC is infected?

What can you do during your day-to-day
use of Isabel to avoid attacks?

What should I do if I am the
victim of attempted fraud?