Social Engineering Scam Detection

Detect Advanced Social Engineering Scams

BioCatch analyzes user behavior in real-time to detect when an individual is conducting a transaction under the influence of a cybercriminal, helping banks to protect customers from voice scams and authorized push payment fraud.

Request a Demo

Social Engineering Fraud In Numbers

£479M

Total losses attributed to authorized push payment fraud in 2020 in the UK

$10K

Average amount lost per victim to authorized push payment fraud

77%

Percent of fraud complaints involving contacts by telephone, of which social engineering is a subset

75%

Percent of victims who said that scammers already had their personal information, which was used to target them and get even more information

Understanding
Social Engineering
Voice Scams

Social engineering scams using the phone, also known as voice scams or APP fraud, are one of the most complicated attack types to detect and are a prevalent form of account takeover fraud.

Voice scams are very simple to execute, but difficult to detect. The user is on their own device, present in a recognized location, and able to pass all forms of multi factor authentication if needed. So how can you detect a voice scam in progress?

Anatomy of a Social Engineering Voice Scam

Anatomy-Of-Voice-Scam-vertical

 

Find Out More About
Social Engineering Voice Scams

At the heart of every cyberattack is an element of social engineering. From more common attacks, such as phishing, to more sophisticated attacks, such as authorized push payments and voice scams, cybercriminals have impersonations of our most-trusted institutions down to a science. Explore how financial institutions are leveraging behavioral insights to reduce social engineering fraud without impacting the customer experience.

GET THE E-BOOK

Social-Engineering-Scams-Ebook

Stop Scammers in Real-Time. Protect Customers.

BioCatch provides financial institutions with immediate behavioral insights that indicate a social engineering scam is in progress, helping to prevent significant losses and better protect their clients and assets.

Get the Data Sheet

Here are four ways behavioral biometrics can uncover a real-time social engineering scam:

  • icon-clock

    Length of session
    Sessions are longer and behaviors such as aimless mouse movements are common indicating a person is waiting for instructions.

  • icon-keyboard

    Segmented typing
    These patterns indicate dictation such as a cybercriminal reading off an account number to transfer funds to.

  • icon-mouse

    Hesitation
    Longer pauses before performing simple, intuitive actions such as clicking on the Submit button.

  • icon-mobile-phone

    Displacement
    Continuous movement of the phone suggests the user is picking the phone up to take instructions and placing it back down to perform the actions instructed by the cybercriminal.

hesitation-being-guided

 

Behavior as the Window into a Scam-in-Progress

To effectively detect a voice scam, it is critical to continually monitor a session to reveal subtle changes in user behavior. BioCatch’s solution analyzes more than 2,000 behavioral parameters and generates powerful insights that are used for validating a user’s identity and detecting fraud. Among these insights are indicators that suggest a person is conducting a transaction under the influence of a cybercriminal. By flagging this in real-time, banks are able to prevent significant losses and better protect their clients and assets.

Behavior suggests this user is being actively socially engineered.

Actionable Behavioral Insights Start Here

Request a Demo