Bank robbers have dropped their pantyhose and shotguns and have opted for a more sophisticated weapon: the ‘mole’ — new bank employees who also work for organised criminals. According to the SAS Institute’s US based fraud strategist, Stu Bradley, who works with some Australian banks on fraud detection policies, local and international criminal groups were planting people into banks in order to gain information about security policies and than bypass them using a method called flash fraud. The bank “moles” as they are known, establish what appear to be real accounts using details acquired from legitimate customers. Once the accounts are established across multiple banks, the criminals strike and empty the accounts. Bradley said that in some cases, the criminals will walk away with millions. “Because the fraud is spread over hundreds of accounts, the banks find it difficult to investigate every theft,” he said. “When that happens on the inside it does not get publischesed but if it is similar to other countries I would imagine there are similar instances where it is happening in Australia.” While Bradley was reluctant to name specific groups, he said there have been cases where criminals that would have used violent methods in the past, such as motorcycle gangs, have become more sophisticated. “When you look at the level of reward that you can do as an organised entity, when you can infiltrate a bank and commit fraud versus robbing a bank it is much higher from a fraud perspective,” he said. To combat this, he said that banks would be forced to use modelling and predictive techniques that will allow them to do a better job of flagging where fraud risks may come from. According to Bradley, the problem has grown as banks hire in the wake of the global financial crisis. “There are people who are willing to make a quick dollar by joining the bank undercover as a mole,” he said. “However, local banks have been increasing their risk management teams and that will also include their fraud teams.” Bank customers will also be in the firing line with smartphone applications a target in the future, Bradley said. “Based on the growth rate in that particular transaction type and the fact that the applications are going to be pushed out into the market place before there is an appropriate level of fraud protection over that area, I would see that as the next area the fraudsters will hit due to the sophistication of the applications that are out there,” he said. Follow Hamish Barwick on Twitter: @HamishBarwick Follow Computerworld Australia on Twitter: @ComputerworldAU Related content brandpost Sponsored by Dell New research: How IT leaders drive business benefits by accelerating device refresh strategies Security leaders have particular concerns that older devices are more vulnerable to increasingly sophisticated cyber attacks. By Laura McEwan Dec 08, 2023 3 mins Infrastructure Management case study Toyota transforms IT service desk with gen AI To help promote insourcing and quality control, Toyota Motor North America is leveraging generative AI for HR and IT service desk requests. By Thor Olavsrud Dec 08, 2023 7 mins Employee Experience Generative AI ICT Partners feature CSM certification: Costs, requirements, and all you need to know The Certified ScrumMaster (CSM) certification sets the standard for establishing Scrum theory, developing practical applications and rules, and leading teams and stakeholders through the development process. By Moira Alexander Dec 08, 2023 8 mins Certifications IT Skills Project Management brandpost Sponsored by SAP When natural disasters strike Japan, Ōita University’s EDiSON is ready to act With the technology and assistance of SAP and Zynas Corporation, Ōita University built an emergency-response collaboration tool named EDiSON that helps the Japanese island of Kyushu detect and mitigate natural disasters. By Michael Kure, SAP Contributor Dec 07, 2023 5 mins Digital Transformation Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe