eBook
Payments Fraud Detection in an Escalating Threat Environment
Modern fraud threats are innovative and constantly evolving. To confront these threats, organizations that want to survive need to deploy the most up-to-date payments fraud detection and prevention solutions.
In this eBook, we will explore the most common fraud threats to businesses today and detail the leading, AI-based tools that CFOs and CIOs can use to stop attacks before they happen. We’ll explore the ways that Kyriba solutions protect our customers, and impart that knowledge to you.
We’ll also look into tools like artificial intelligence and machine learning (AI/ML) and application programming interfaces (APIs) are game changers in the fight against fraud. We understand and use these technologies, and it’s time that you did as well.
Table of Contents
- The Changing Face of Fraud
- A Need for Corporate Investment and Attention
- Pervasive and Emerging Fraud Threats
- Tools to Protect Against Fraud
- Real-Time Screening, Alerts and Notifications
- Isolation Forest
- Generative Adversarial Network
- Generative Adversarial Network (GAN) Model
- Dashboards
- Payments Fraud Prevention Workflows
- Reporting and Audit Trails
- Payment Hubs
- Payment Hub for Payments Fraud Detection
- Fraud Mitigation Matrix
- APIs: The Future of Payments Fraud Detection
- Learnings and Takeaways
The Changing Face of Fraud
Fraud threats have grown exponentially throughout the COVID-19 pandemic as the remote working environment has left companies struggling to ensure that employees are following strict security protocols. According to a 2022 KPMG survey of over 600 executives, the shift to remote work has increased the risk of fraud, and most companies experienced fraud incidents last year.
FRAUD OUTLOOK
Source: 2022 KPMG Fraud Outlook
The losses that stem from fraud are significant. Respondents reported an average profit loss of 1% from fraud and compliance violations in 2021. And the larger the company, the more criminals will target it.
A Need for Corporate Investment and Attention
With the pandemic continuing for the foreseeable future and challenging organizations’ ability to operate and staff effectively to counter the ever-increasing fraud threat, it is surprising that over half of the companies surveyed say there will be no changes in their budgets to invest in anti-fraud measures.
With less than half of organizations today having a program in place to prevent, detect and respond to fraud, it is evident more focus on greater investments in their protections is called for. CFOs, treasurers and CIOs clearly require a more complete set of defenses in the form of new, leading, automated AI-based fraud detection.
Pervasive and Emerging Fraud Threats
Business email compromise (BEC) scams continue to plague treasury and finance departments. BEC scams typically begin with an urgent email sent to an employee that appears to come from a senior level official, requesting a money transfer. In actuality, a fraudster has copied a legitimate email address, usually after infiltrating a company’s email system via phishing.
A variation of this scam consists of emailed invoices that appear to come from a routine supplier that have new instructions on where to send payment. According to the FBI’s Cyber Division, there was a 5% increase in BEC adjusted losses from 2019 to 2020, with over $1.7 billion losses reported in 2019 and over $1.8 billion losses reported in 2020.
Check and wire fraud remains a significant problem for treasury and finance departments, as these are the payment methods most susceptible to fraud. AFP research found that 66% and 39% of financial professionals reported fraud activity via these two payment types in 2020. However, check fraud has been in decline in recent years as fewer organizations are using checks for B2B payments.
Deepfake voice fraud is a relatively new method of attack but one that has proven highly effective. This brand of fraud consists of criminals making calls using deepfake voice technology, software that can successfully copy a person’s voice via a small audio sample.
COMMON VULNERABILITIES FOR ORGANIZATIONS
Deepfake voice fraud caught international attention last year when it was revealed that fraudsters used it to complete a $35 million bank heist.
Ransomware attacks, though not technically fraud, are nevertheless prominent threats to companies’ systems and bank accounts and have surged in recent years. In a ransomware attack, a company’s internal system is compromised (usually through phishing) and taken over. Users are instructed to either pay a ransom or permanently lose access to their systems.
Ransomware as a service (RaaS) is the latest innovation of this threat; it consists of developers selling or leasing ransomware exploits to customers who then unleash them upon unfortunate victims.
Tools to Protect Against Fraud
To combat the threats of today, your payments fraud prevention and detection solutions should include these capabilities:
- Automated payment processes to standardize controls
- Real-time screening of all payments data to identify suspicious transactions
- User-defined payments screening rules
- Resolution workflow to investigate suspicious payments
- An option to avoid alerting payments users who violated a payments rule
- Monitoring of the status and priority of alerts in a KPI dashboard
Modern payments fraud detection software like Kyriba’s Payments Fraud Detection module offer these solutions and more.
Real-Time Screening, Alerts and Notifications
The rise of same-day and real-time payment systems has increased the need for real-time responses to fraud attempts. Modern fraud detection software uses artificial intelligence (AI) and machine learning to screen payments against historical payment data, pinpointing any anomalies. By providing more complete data, these solutions enable data-driven decision-making.
For example, Kyriba’s Payment Fraud Detection solution determines the normality of each payment—whether automated or manual—flagging any with a low normality rank. The solution provides insights into the variables that determine payment normality, allowing users to see why one or more was deemed anomalous. And perhaps most advantageous for the user is that processes aren’t slowed down in any way, even with greater visibility into payment data.
Payments could be flagged as anomalous for a variety of reasons, including:
- A high number of payments for the same third party
- Payments with unusually high amounts
- Payments to blacklisted countries according to company policy
- Suspicious changes to payments imported from an ERP
- Payments to a bank account used by several third parties
- Duplicate payments
After testing multiple machine learning models, Kyriba’s data scientists selected two solutions to identify irregularities in payments.
Isolation Forest
An isolation forest model is an unsupervised algorithm that works on the principle of isolation anomalies; anomalous instances in a dataset tend to be easier to separate from the rest of the sample.
In the following example, we can see that anomalies require fewer random partitions to be isolated, compared to normal points:
Generative Adversarial Network
One problem many machine learning models run into when trying to identify fraud is the lack of data around fraud. Most organizations haven’t experienced significant payments fraud and thus lack the depth of examples to share. Others who may have been the victims of fraud may be reluctant or unable to share the specifics. So, training AI models can be challenging because the algorithms can only learn from good payments and, at best, a handful of bad ones.
Generative adversarial networks (GANs) can solve this problem. A GAN is a deep learning model that pits two separate neural networks against each other. One network (the generator) mixes real data and synthetic data together and attempts to outwit the opposing network (the discriminator).
Kyriba creates a “fraudster” network (the generator), hiding synthetic fraudulent among legitimate transactions based on a client’s payment history. Then, a “police” network (the discriminator) sifts through the data, separating the illicit transactions from the good ones. By training the fraud detection model on these competing networks, Kyriba can better identify fraudulent transactions when viewing real data.
Generative Adversarial Network (GAN) Model
Dashboards
Dashboards can be set up to display all suspicious payments and prioritize their resolution, based on factors such as detection rules, risk exposure, incident counts and a fraud detection scorecard. Dashboards provide authorized users with complete transparency into all payment screening and can resolve outstanding actions efficiently.
Payments Fraud Prevention Workflows
Modern payments fraud detection modules also support fully automated, end-to-end workflows for the resolution of outstanding suspicious payments. Users can also determine how each detected payment should be managed, enforcing the separation of duties between the initiator, approver and reviewer of a detected payment.
Reviewers can also be determined by payment rule and specific scenario (e.g., the treasury manager reviews payments less than $1 million, while payments over $1 million go to the treasurer), and non-treasury personnel can be assigned to review certain detected payments.
Reporting and Audit Trails
Leading technology solutions can ensure that detected suspicious payments are permanently tracked in the system for daily, monthly or annual reporting. History is maintained indefinitely and all details of the suspicious transaction—including the audit trail of detected and resolved actions—are retained for internal and external audit reporting.
Payment Hubs
With a payment hub, organizations have all their fraud protection capabilities in one place. Payment hubs consolidate payment streams from ERPs, finance, treasury, legal, capital markets and decentralized teams, transforming disaggregated processes into a single source of record for all outgoing payments.
A payment hub also transforms payment data into bank-specific file formats and connects directly with global banks via multiple protocols, including host-to-host, SWIFT and regional networks.
Payments from ERPs or other systems can bring an entire enterprise-wide payments landscape under the consistent and risk-focused payments fraud detection framework. With API-driven connections and integration tied into an approval and payment fraud detection and prevention workflow, controls and fraud are enhanced and easily governed.
Payment Hub for Payments Fraud Detection
Fraud Mitigation Matrix
Treasury and finance professionals have many payment fraud detection tools at their disposal. The following list of solutions provides an overview of some the capabilities that today’s tools deliver for mitigating fraud risk.
Fraud Mitigation Matrix | ||
Solution | Key Protections | Capabilities |
Payment Fraud Detection Scenarios | Pre-Defined Detection Rules | Flags unorthodox payments for further review Easy to customize and come up with your own rules |
Real-Time Screening | AI/Machine Learning Dashboard | Screens payments against historical payment data Displays all suspicious payments and prioritizes their resolution |
Payments Fraud Prevention Workflow | Fully Automated Workflow | Enables users to resolve outstanding suspicious payments Allows users to determine how detected payments should be managed Enforces separation of duties around a detected payment Designates reviewer(s) by payment rule and specific scenario Provides the ability to assign non-treasury personnel to review payments Features an option to hide alerts from initiators/approvers of a payment Allows scenario-based stopping of payments until resolved Enable to bypass for low-value payments Sets up tiered approvals |
Reporting & Audit Trails | Complete KPI reporting | Detected payments are permanently tracked in the system History is maintained indefinitely |
APIs: The Future of Payments Fraud Detection
Real-time payments, which are gradually becoming more prevalent, bring unprecedented visibility and transparency to both the payer and the payee. However, there is also no stopping the transfer of funds once a real-time transaction is executed. Therefore, fraud needs to be prevented in the approval process before a payment request reaches the bank.
Building APIs into the payment platform allows users to fully automate bank account validation and payment policy screening, identifying exceptions in real-time. APIs can instantly match payments against third-party data; for example, they can be used for sanctions list screening or verifying the ownership of the bank account to whom your company is paying.
By using APIs for third-party system integration with your payment platform, your organization can ensure real-time access to any needed database for account or compliance validation. Exceptional payments can be immediately quarantined for further review, while unexceptional payments process normally.
Learnings and Takeaways
- CFOs and treasurers require a more complete set of payments controls to mitigate modern fraud threats, including artificial intelligence/machine learning and APIs.
- Organizations have three common areas that make them vulnerable to fraud: technical systems, processes and human error.
- Modern threats include business email compromise scams, check fraud, wire fraud, deepfake voice fraud, and ransomware.
- Technologies that can be used to combat fraud include pre-defined fraud detection rules; real-time screening, alerts and notifications; payments fraud prevention workflows; reporting and audit trails; and payment hubs.
- As the threats continue to evolve, treasury and finance teams need to heighten their awareness.
Interested in learning how to build out payments fraud detection and incident response programs to maximize protection end-to-end? Check out this on-demand webinar. Cybersecurity and fraud experts from Corelight and Kyriba outline fraud defense strategies.