Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Adversarial testing to simulate fraud

Adversarial scenarios to harden organizations against fraudulent activity

In the rapidly evolving digital landscape, industries such as financial services, telecommunications, gaming, and healthcare are prime targets for sophisticated cybercriminals. Threat actors pay special attention to payment systems, social engineering of privileged personnel, and systems dealing with customer data. By exploiting these areas via specific scenarios, threat actors are able to commit fraudulent activities against the target which can irreversibly damage their brand and business. This article will delve into real-world scenarios that threat actors are actively employing against organizations to exploit their people, processes, and technology, and how said organizations can work to counter them.

Social engineering – voice phishing

Voice phishing, or “vishing” (i.e. telephonic social engineering), is an attack tactic which recently drew big headlines owing to its prominence in the ranswomare incident that impacted major entities in the second half of 2023. Vishing often sees cybercriminals gain access to target systems by impersonating an employee found on LinkedIn and other online platforms, and then convincing the target company’s IT support services to reset the employee’s password and/or associated MFA tokens to perform account takeovers against the users in single sign-on (SSO) environments. After gaining internal access to the target company’s applications and/or network via vishing, attackers will often seek to leverage publicly available, legitimate remote access tunneling tools to enable nefarious remote control of impacted systems. Once full control is achieved, these actors will leverage their access and the data they’ve retrieved to commit fraudulent activities.

Threat actors go to great lengths to conceal their identities during a vishing attack; examples include:

  • Spoofing caller ID and/or using a disposable VoIP phone number within the area code of the target end user
  • Using voice-to-text synthesizers to mask the attacker’s true voice
  • Lerveraging stolen PII obtained from Darknet marketplaces to garner trust
  • Using retrieval-based voice conversion (RVC) AI models to clone and produce “deepfake” voices in near real-time

Exploitation of payment processing systems

An attacker strategically targets web or mobile applications that offer gift card purchase capabilities. For instance, they may target a messaging mobile application that enables end users to purchase gift cards valued at $10, $15, or $20. These gift cards can be easily shared with contacts using their phone numbers. To exploit this system, the attacker begins by decompiling the targeted mobile app, allowing them to identify the specific API endpoints used for user authentication and gift card purchases.

By abusing these API endpoints, the attacker can either take advantage of vulnerabilities that enable them to impersonate legitimate users or exploit weaknesses that facilitate the purchasing of gift cards without drawing attention from the impersonated user. In order to ensure their actions remain undetected, the attacker limits their transactions to only buying one or two gift cards at a time.

To further obfuscate their identity, the attacker employs burner accounts and temporary phone numbers to receive the purchased gift cards. These accounts and numbers are promptly closed, making it difficult to trace them back to the attacker. The final stage of the fraud involves exchanging the acquired gift cards for cash or store credit at alternative institutions. To execute the fraud efficiently, the attacker automates the process using small amounts of money targeted against multiple legitimate users.

Identity theft via systems that store/process healthcare data

A medical institution operates multiple web applications that customers utilize for various purposes, including scheduling appointments, refilling prescriptions, accessing lab results, and entering medical history and personal information. An attacker identifies several vulnerabilities within these web applications. Although these vulnerabilities are not critical individually, they can collectively result in the leakage of small portions of customer information.

In past breaches, an attacker identifies vulnerabilities such as the ability to enumerate valid usernames in one application, obtaining phone numbers and email addresses through a leak in another application, and capturing mailing addresses from yet another application. After extensive exploration, the attacker discovers a web application that facilitates password resets via security questions. Alarmingly, this application only requires a valid username, email address, and the corresponding security question answers.

Capitalizing on this oversight, the attacker deliberately engages in a slow brute force attack, as the application lacks any rate limiting mechanisms. Over time, the attacker successfully identifies a handful of valid usernames, email addresses, and associated security question answers, leveraging the information gathered from the vulnerable web applications. With this knowledge in hand, the attacker proceeds to reset user passwords, thus gaining unauthorized access to the health and personal data of select customers. The attacker can use this information to impersonate legitimate customers or use it against other systems. By impersonating other users, attackers are able to continue to escalate their access and gain access to highly sensitive and sought after credit card information, insurance information, and social security information. This data can often be sold on the dark web for a profit or can be leverage to commit insurance or medicare fraud.

Best practices for preventing fraud

Security Posture Management

Attackers are constantly coming up with new ways to abuse systems and applications to conduct fraudulent activities. Organizations should reduce their external exposure across their technology estate to reduce opportunities for attackers to exploit.

Mature Vulnerability Management

Security testing is made much more effective when paired with centralized vulnerability management. Timely remediation and comprehensive tracking of vulnerabilities helps enterprises understand their attack surface and inform how they approach hardening it.

Tight Controls on External Facing Assets

External facing assets should not be deployed until they have undergone a standardized and prescribed hardening review with regular evaluation to identify drift. This process should be paired with frequent security testing as part of an enterprise vulnerability management program. Additionally, controls such as Web Application Firewalls and Multi-Factor Authentication for sensitive public facing applications can greatly reduce an attackers ability to commit fraud.

Continuous Awareness and Improvement

Each best practice mentioned here should be continuously evaluated and improved upon based on changes in technology and threat actor activity across industry sectors. Attackers constantly evolve their methods, and so organizations should constantly evolve their defenses by paying attention to the trends.

In conclusion, conducting scenario based fraud testing against sensitive systems can help organizations properly harden themselves against bad actors seeking to conduct fraudulent cyber activities. By proactively identifying and addressing business logic and process flaws that can lead to fraud, these institutions can better protect themselves and their customers from the ever-present threat of cybercrime.

How KPMG can help

KPMG offers end-to-end security testing as an outcome-based managed service, helping you consistently validate controls while minimizing remediation efforts. That’s because business transformation is not a fixed destination; it’s an ongoing journey. With managed services, we help you continually evolve your business functions to keep up with ever-changing targets, while driving outcomes like cost reduction, resilience, and stakeholder trust.

Learn more about KPMG Managed Application Security Testing.

Learn more about KPMG AI Security Services.

Explore more

Meet our team

Image of Evan Rowell
Evan Rowell
Managing Director, Advisory, KPMG US

Explore other services

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline