Monitoring for wire transfer fraud with the Splunk App for Fraud Analytics
If you have not already installed the Splunk App for Fraud Analytics, complete the steps in the deployment guide and then come back to this article. If you are not a Splunk Enterprise Security customer or are unable to install the Splunk App for Fraud Analytics, we recommend using the Splunk platform version of this article instead.
The information in this article applies to Splunk Enterprise Security (ES) versions 7.x. If you have upgraded to Splunk Enterprise Security version 8.x, some terminology and steps might not apply. For additional assistance on this use case with ES 8.x, Splunk Professional Services can help.
If you work in financial services, you potentially conduct thousands of wire transfers on a daily basis. These transfers are constantly at risk for many common scams, such as fake rental deposit requests, lottery winnings that supposedly require a "prepayment", and overpayments on bad checks. Monitoring for wire transfer fraud allows you to protect your customers from scammers, and as a result, protect the reputation of your business. The Splunk App for Fraud Analytics ships with out-of-the-box use cases that address various use cases within the financial services sector.
While the wire transfer fraud use case is not included out-of-the-box, the application does provide the necessary frameworks to implement and enable this use case. This process will address how to detect wire transfer fraud using the frameworks provided within Splunk Enterprise Security and the Splunk App for Fraud Analytics.
Review and prepare data for use within wire transfer fraud use case
The Splunk App for Fraud Analytics includes five data models that support numerous use cases. However, it does not include a data model for wire transfer activity. For scaling and code reuse purposes, we recommend leveraging data models, report acceleration, or summary indexing when searching across hundreds of GBs of events in a single search. Take this into consideration when deciding how to support this data source.
The required data sources for this use case include application data of wire transfer activity (could be web data, database, etc), and a custom lookup (csv or kvstore) of data on suspicious countries. The following procedure walks you through creating a data model (recommended) and preparing your data for use in the wire transfer fraud activity use case:
Create a data model
If you opt to use raw data (and not a data model) or summary indexing, skip this step.
- In the Splunk platform, navigate to Settings > Datamodels.
- Click New Datamodel.
- Create a data model following the instructions in the Splunk platform documentation.
Design your data model
If you opt to use raw data (and not a data model) or summary indexing, skip this step.
To meet the requirements of the recommended detections to support the wire transfer use case, you should include the following fields within your data model:
_time
c_time
OpenDate
action
clientIP
customer
amount
FromAccount
ToAccount
Country
City
destIP
In most cases, you should be able to build this data model with a single root object based on a single data source.
Build custom lookup of suspicious countries
- Create and upload your CSV lookup to the Splunk platform.
- The file should have the following two fields:
country
andis_suspicious
. - The
Country
field should contain the name of the country (only need to list countries the customer deems as suspicious). - The
is_suspicious
field should contain a value of "Yes"
- The file should have the following two fields:
- Create a lookup definition and update permissions as necessary, so it is accessible by Splunk Enterprise Security.
- Create a managed lookup in Splunk Enterprise Security, and point it to the lookup definition you just created. For detailed steps on how to do this, see Create and manage lookups in Splunk Enterprise Security.
Prepare and configure risk rules and risk notables applicable to wire transfer fraud
The following content is recommended for detecting wire transfer fraud activity. Implement the following detections, and modify the search language to leverage your custom data model or summary index, if you are not searching directly against the raw data.
Search Name | Rule Type | Description | Search |
---|---|---|---|
RR-Fraud-WT-Detect large wire transfer immediately after account activation | Risk Rule Notable | Customers open up accounts all the time. It would be unusual for a customer to open up a new account and shortly thereafter transfer a large amount of money. This could be an indicator of a fraudulent account. | sourcetype=<wire transfer data source> |
RR-Fraud-WT-Detect wire transfers into suspicious or banned countries | Risk Rule Notable | Large amounts of money being transferred into certain countries can indicate fraud. This will require correlating user activity with a list of banned and suspicious countries. | sourcetype=<wire transfer data source> |
RR-Fraud-WT-Detect wire transfers from multiple client IP addresses | Risk Rule Notable | In order to look for signs of compromise and help protect users, this will report on customers who transfer funds in a short amount of time using more than one client IP. This is unusual behavior and similar to the "superman" use case. | sourcetype=<wire transfer data source> |
RR-Fraud-WT-Detect when a number of wire transfers exceeds threshold | Risk Rule Notable | This detection looks for clients that have completed a number of large wire transfers over a one hour time span. This might be an indicator of fraud. | sourcetype=<wire transfer data source> |
RR-Fraud-WT-Detect multiple account login denials followed by authorization | Risk Rule Notable | This is a successful brute force detection, and might indicate compromised customer credentials. | sourcetype=<wire transfer data source> |
Notable-Fraud -- Possible Wire Transfer Fraud | Notable | This is a custom risk notable focused on detecting multiple anomalies across the wire transfer fraud use case. It is modeled on the Account Takeover and New Account fraud notables. |
|
Next steps
After you have implemented this wire transfer fraud use case, you might be interested in other ways to protect your financial services organization and its customers. Return to the fraud detection and prevention deployment guide for instructions on implementing additional use cases.
If you would like more hands-on assistance with this or any other fraud detection and protection use case, Splunk Professional Services can help. Find more information here or reach out directly to sales.