Published
- 7 min read
OB Cashing: Online Banking Fraud - True Cybercrime Analysis
After we found an extensive guide, how to defraud Online Banking customers, we started an analysis on the topic.
Small Update:
We took a look at the topic mainly from the Cybercrime
and Social Engineering perspective, in the world of Finance these methods are categorized as APP Scam
(Authorized Push Payment Fraud).
Sumsub
just launched a Podcast series about the exact topic(s):
- Fintech Fraud: How It Happens, and How To Fight It - YouTube:
https://www.youtube.com/watch?v=AtONU77H8OY - What The Fraud? - Youtube Playlist:
https://www.youtube.com/playlist?list=PL82mkQZ2ctWxutIl2uTLqIyx6wqiHBS9a
Seun Oshinsui, Head of Financial Crime Operations at Mettle, with a degree in criminology, confirms pretty much all points we noted, while adding the professional perspective to the topic, we probably can’t provide (we’re Hackers, not fulltime Fraud Analysts).
That why we highly recommend this awesome podcast episode, as well as the entire series, so you can take a deeper dive into the topic.
Online Banking Fraud using Social Engineering
A Truecrime example.
Although there are countless variations of banking fraud
, we want to talk in the following article about a particular social engineering attack, that became famous in Germany around 2020/2021.
Guides from the DarkNet
There are guides on the Dark- and Clearnet (like for many other Cybercrime
methods), that focus on:
- Bulk operations - using so-called
OB Logs
, meaning collections of Online Banking customer- and bank details, username / password combos, browser fingerprints, sometimes cookies, IP addresses, date of birth, bank manager names, phone numbers, account balance, transfer limits etc. - Bypassing MFA / TAN and fraud detection systems (by the criminals labeled as
AFS
) - using Social Engineering over the phone to get a valid MFA / TAN number and technical methods like browser fingerprint spoofing, proxies, VPNs, VOIP systems for phone number spoofing, Bitcoin and more
The Technical Part
We tried for a while, but as we’re researchers and Ethical Hackers - and neither criminals nor professional investigators - we lack certain possibilities. At the moment we do this work in our private time and don’t have an official bussines. Two factors, that locked us out from most VOIP services.
All VOIP
services we tested in 2024 required valid ID and prove of residence via a Business Tax return form, or similar - evidence of the past abuse that’s been taking place. We weren’t able to provide these docs, albeit we’re sure most Criminals
won’t have a lot of problems, providing fake IDs or other fake documents. Those are the tools of the trade for every entry level fraudster.
Additionally, as we pointed out in previous articles already: Criminals might also use hacked accounts for services like SIP Gate
.
VOIP services literally advertise the capability for SIP Trunking
with the possibility of changing details like the caller ID in realtime and do more stuff, the average user cannot.
TL;DR: You cannot trust the caller ID - it might be spoofed, albeit we weren’t able to confirm this still works, as there’ve been mitigations implemented.
Attack Step By Step
- Preparing the attack
- Calling a victim
- Asking for a TAN / MFA token through a
Social Engineering
context - Using realtime SEPA transfers, often times while the victim is still on the phone, trying to get as close to the limits of the fraud detection as possible - meaning the criminal will transfer as much money as possible to their
BD
and only stop, when the fraud detection hits, but doing so step by step, to not lose any transfers they’ve already made - Instant conversion of FIAT to
Crypto
currency - Repeating with the next customer - doing
bulk
operations with thousands of customer records from prepared logs bought through the DarkNet, usually a byproduct of Russian APT Operations.
The Social Engineering part
consists mainly of inventing a reason with a shock effect, usually something like:
“Hi, I’m Martin Smith, with the security of your bank X. We detected unusual activity on your account, there’s been a transfer out, 8000€. Your new balance is now -5390€ and 68 cents, meaning you’ve gone over your regular limit. We could still cancel the transfer, but therefor we need a valid TAN
from you. If we don’t cancel it, please balance your account immediately, otherwise regular transfers like rent will be canceled automatically. Also please note your limit will be adjusted to prevent this from happening again. Do you confirm adjusting your new limit to -2000€?”
The author of the Banking fraud manual stated, the needed Social Engineering skills are low and he several times talks about the quality of the logs. It’s not hard to imagine, possessing lots of personal information about a victim, like date of birth, correct address, exact account balance etc. would make the attack highly convincing
, not only to unsuspecting victims.
From personal experience, we know that lots of german online banking customers for a long time used very simple passwords. In the beginning of online banking, even regular ATM pins
(4-digit numbers) were sufficient and no password policy is enforced by many famous banks to this day. At least in the early days also no rate limiting was implemented.
These and similar services (for example a car sharing service we once used) also used
default passwords like Date-of-Birth of the customer and didn’t force password changes. The attack vector Social Engineering
obviously wasn’t considered and TANs were thought to be safe enough.
In conclusion we’d assume that the creators of the logs might still possess valid passwords of a good amount of german banking customers. Forcing a password policy by law could have a significant impact on illegal activity.
Technical breakdown
The method is technically unsophisticated and has various spots, where obvious lack of technical knowledge shines through (i.e. the recommendation to buy a browser called Linken Sphere
, made by Russian Cybercriminals, instead of making the fingerprinting bypass through other means).
No Honor Among Thiefs
Based on our professional experience, the analysis of the document left us with the strong impression, in this realm of cybercrime - which requires only a basic level of technical skill - there seems to be a blend of actual skill with a fair amount of guesswork and dubious facts about the inner workings of web applications and browsers in general as well as the fraud countermeasures
in place.
TL;DR: Things have been evolving
into tips & tricks that are only half way true - this lack of knowledge is then abused by other, more technical cybercriminals again, to sell snakeoil to the entry level guys.
Method Has Obviously Evolved
At the same time, it shows how much dedication and long-term evolvement has gone into it. The method has been invented long ago, since then been refined, reused and seems to be kind-off an “entry level” hacking attack. The document we analysed is over 20 pages long (text only), goes into detail about several Banks and their countermeasures, and most interestingly: it has it’s own terminology
.
Bulk Operations
Finally the method focusses on swift
, fast bulk operation and cashing out
quickly, converting FIAT into Bitcoin, before fraud detection and banking security personel could potentially interveine.
Terminology
Some term examples:
OB = Online Banking
AFS = Anti Fraud System
Vics = Victims
CC = Credit Card
BD = Bank Drop
DOB = Date of Birth
EZ = Echtzeit Überweisungen (Realtime SEPA Transfer)
Official Numbers on Online Banking Fraud
In 2022, the European Anti-Fraud Office (OLAF) reported irregularities worth €1.77 billion, marking a 7% increase
from 2021. These figures include various types of fraud, such as collusion, manipulation of procurement procedures, conflicts of interest, inflated invoices, evasion of customs duties, smuggling, and counterfeiting. These numbers give an overview of the fraud landscape in Europe, they may not specify the exact prevalence of online banking frauds using Social Engineering.
However, the increase in overall fraud cases does suggest that methods like this are indeed part of this rise. Additionally, OLAF’s report indicates a growing trend in digitally committed frauds, showing an evolving pattern in recent years.