{"id":184,"date":"2015-01-29T13:57:22","date_gmt":"2015-01-29T08:27:22","guid":{"rendered":"http:\/\/newspie.in\/en\/?p=184"},"modified":"2016-03-05T10:33:05","modified_gmt":"2016-03-05T05:03:05","slug":"icici-twitter-banking-puts-customers-risk","status":"publish","type":"post","link":"https:\/\/newspie.in\/en\/184-icici-twitter-banking-puts-customers-risk\/","title":{"rendered":"ICICI Twitter banking puts all customers at risk"},"content":{"rendered":"<p>ICICI Bank's Twitter based service is poorly thought through because it really does not require two-factor authentication, as the bank claims. <strong>icicibankpay<\/strong> is not at all \"Safe & Secure\". It is easily prone to being highjacked on both the sender's and receiver's sides. Another issue is that there is nothing customers can do to opt-out or block this service. It therefore puts all ICICI bank customers at risk of fraud.<\/p>\n<p>The service works as follows: to sign up, an ICICI bank customer chooses to follow the bank's account (handle) on Twitter, and the bank's handle then automatically follows the customer. The customer must then send a private message (direct message or DM) to the bank's handle on Twitter with the customer's registered mobile number. The bank then sends the customer a verification code via SMS on that mobile number. Finally, the customer must send the code back to the bank via Twitter direct message. <\/p>\n<figure id=\"attachment_197\" style=\"width: 300px\"  class=\"wp-caption alignleft\"><a href=\"http:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-300x160.png\" alt=\"Any party with access to a customer&#039;s phone can register and transfer money.\" width=\"300\" height=\"160\" class=\"size-medium wp-image-197\" srcset=\"https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-300x160.png 300w, https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-860x458.png 860w, https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-768x409.png 768w, https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-1024x546.png 1024w, https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-60x32.png 60w, https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-788x420.png 788w, https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-640x341.png 640w, https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process-681x363.png 681w, https:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/ICICI-Registration-Process.png 1032w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption class=\"wp-caption-text\">ICICI Bank's Twitter based service is convenient, but lacks adequate security precautions.<\/figcaption><\/figure>\n<p>To send money, the customer must send a direct message to ICICI bank containing the recipient's Twitter handle and the amount. The bank then sends a 4-digit passcode via SMS to the sender and a Tweet to the recipient with a link to ICICI bank's Web site. The sender must tell the recipient the passcode, and by following the tweeted link, the recipient can authenticate her Twitter account, enter her bank details and the passcode. ICICI transfers the funds to her account. <\/p>\n<p>Since ICICI sends an SMS code to the registered mobile number, it claims that it is following 2-factor authentication safeguards. However, ANY Twitter user can follow the bank and send the registration message. Therefore, the code sent by SMS is in fact the only form of authentication. If a bank customer loses his mobile phone and it falls into a wrongdoer's hands, the customer's ICICI account is primed for theft<\/p>\n<p>Cyber security expert Vikas Bhatia of Kalki Consulting agrees with this risk assessment. \"My biggest concern is the sign up process through Twitter,\" he wrote via email from New York. When ICICI's service was brought to the attention of Pranesh Prakash, who deals with privacy and information security issues at the Centre for Internet and Society in Bangalore, he responded in a tweet: <\/p>\n<p><a href=\"http:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/pranashtweet.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/newspie.in\/en\/wp-content\/uploads\/sites\/3\/2015\/01\/pranashtweet-300x85.jpg\" alt=\"Security expert reacts to ICICI Twitter service\" width=\"300\" height=\"85\" class=\"alignnone size-medium wp-image-228\" \/><\/a><\/p>\n<p>The entire process of registering and sending money can take far less than five minutes, so it is possible that money can be stolen well before the customer can report the loss of the phone and get the number deactivated. <\/p>\n<p>While the fraud scenario described above would be isolated to a single customer at a time (but should still never be allowed to exist), there are other ways that the system is vulnerable to a larger scale attack that might defraud thousands of users at a time.  <\/p>\n<p>It could happen like this: When one Twitter handle follows another, that event is available for anyone on Twitter to see in real time. Since mostly bank customers would follow ICICI's account, this narrows the pool of potential targets for any criminals, and they can concentrate on targeting these users. By using other publicly availably information to exploit the user, the customers' computers or phones could be infested with malware. Once the criminals have amassed enough potential victims, they can strike. <\/p>\n<p>Bhatia wrote, \"The risk I see is that the user hasn\u2019t actively signed up for the service and their account is taken over.  The prevalent use of open source based smartphones, primarily Android, means that homemade malicious apps could intercept the SMS messages intended to authenticate the account holder.\"<\/p>\n<p>There are very clear vulnerabilities that can be exploited on the recipient end as well. Say someone who was the recipient of a transfer via this service left their computer unattended for a few minutes. If the person was already logged in to Twitter, then they will not be asked to re-authenticate when they follow the link in the tweet from the bank. Furthermore if they left their phone at the computer or they use an app that syncs up messages on the phone with the computer, then once again there is only one authentication, and a third party could enter any other bank account details.<\/p>\n<p>Bhatia summed up with, \"This service could be used as a mechanism to launder money used to fund terrorism and organized crime. It appears that even though both the sender and recipient need phones, twitter accounts and bank accounts these requirements could be understood and exploited by criminals.\"<\/p>\n<p>ICICI's saving grace may be that not that many people have signed up for the service and the rate of inscription is fairly slow. With a Rs10,000 daily limit on transfers, if a fraud attack took place any time soon, the payoff would be small. However, if the bank manages to sign up a few hundred thousand users and enough of their accounts\/devices were compromised, an attack would net a few million dollars at least.<\/p>\n<p>ICICI was alerted to security issues through Twitter and LinkedIn messaging, but as of now nobody from the bank has responded. The RBI was also contacted through its Web site but has not responded.<\/p>\n<p>Get updates from NewsPie and support us by liking our <a href=\"https:\/\/facebook.com\/newspie\">page<\/a> on Facebook. What did you think of this article? We welcome your comments below.<\/p>\n<p><em>Sushil Kambampati is a digital media expert and the founder of NewsPie. <a href=\"https:\/\/twitter.com\/sushiwithanl\">Follow<\/a> him on Twitter<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ICICI Bank&#8217;s new Twitter based service, &#8220;icicibankpay&#8221; is a poorly thought through service that puts all ICICI bank customers at risk of fraud.<\/p>\n","protected":false},"author":1,"featured_media":198,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71],"tags":[160,66,75,74,64,161,68,67,76,65,70,77,69],"coauthors":[72],"class_list":["post-184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","tag-analysis","tag-banking","tag-fraud","tag-icici","tag-internet","tag-investigation","tag-mobile-banking","tag-mobile-internet","tag-money-laundering","tag-security","tag-security-risk","tag-terrorism","tag-twitter"],"_links":{"self":[{"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/posts\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":14,"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"predecessor-version":[{"id":186,"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/posts\/184\/revisions\/186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/media\/198"}],"wp:attachment":[{"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/tags?post=184"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/newspie.in\/en\/wp-json\/wp\/v2\/coauthors?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}