My bank keeps on undermining anti-phishing education

moritz-mander.de

320 points by cheesepaint 2 days ago


TheFreim - 2 days ago

My bank uses a fraud detection system that calls you if suspicious activity is detected on your account. It then asks you to call back a number to verify the account activity. Every time they call, they provide a different callback number. Searching for the callback number online yields only one result, which is the fraud detection systems web page telling you to NOT trust phone calls of any kind (their advice is solid, but it tells you to not respond to their own legitimate calls)!

RandomBacon - 2 days ago

My bank has implemented suggestions I've given them in the past (USAA), but recently they used a different domain for a legitimate-seeming email (the email was about something I just did, and it was to an address I only use with that bank), and I called them up and spoke with someone in their fraud department to ask about it. I told them either they were hacked, or they were training their customers to fall for phishing, and asked them to create a ticket.

They said that domain name was not theirs, and they only use usaa.com in their emails. They locked my account without telling me. I had to call them back to get them to unlock my account, and I think that person in their fraud department understood the issue and they said they created a ticket.

We shall see...

0x5FC3 - 2 days ago

User facing tech and marketing practices at banks are the worst. Every Indian bank login form I've ever had to use is

- hostile to password managers.

- You cannot copy paste passwords.

- Client side password hashing

- Stupid requirements like the password cannot have more than 15 characters and even have a whitelist of character sets! (Looking at you HDFC)

- And of course, run of the mill spam

They are all stuck in the early 2000s.

pyuser583 - 2 days ago

When buying or selling a house, this can get really bad. You have all sorts of entities which extensions of other entities. The bank has a mortgage sector which uses a different domain.

I also had to deal with a medical device recall, which was terrible. I had to trust some skeezy domains.

This isn't hard to fix, all you need to do is list on your website your "partner domains."

My personal security protocol was to search a .gov website for contact info of financial institutions, go to the domain listed, look for a customer service number, and call that to find out what domains to trust. Customer service people thought I was weird.

At one point, a customer service person said, "you know it's legitimate because if you go to LinkedIn, you can see the person you're dealing with has <Bank Name> listed as their employer."

TimTheTinker - 2 days ago

The naive people in decision-making positions often don't realize the risks involved in their behavior until they or someone near to them gets hurt -- in this case scammed or sued.

We used to have a lot of people like this running businesses in the US before roughly 2012, but white (and black) hat hacking began spreading quickly and made generally short work of the problem.

meindnoch - 2 days ago

My bank used to call me with random marketing crap, and insisted on telling them my birthday and my mother's name before they can reveal their latest exclusive offer or some other crap. They were always dumbfounded when I retorted that it is them who need to prove that they're really calling from my bank first.

phendrenad2 - 2 days ago

> So the next idea is to register the domain as a subdomain

I think the problem is, someone in the IT department understands the high risk associated with handing out subdomains, so they refuse to do it. So other parts of the company "work around" this by registering their own domain name.

I wonder how companies like Google handle this. A subdomain of google.com is probably the most valuable hack target in the world, but google does use subdomains occasionally (...or maybe more than occasionally! https://gist.github.com/abuvanth/b9fcbaf7c77c2954f96c6e55613...)

Rygian - 2 days ago

For me, the money shot is Chapter 4: the bank needs to be held legally accountable of gross negligence for sending phishing-resembling emails to customers.

clarkdale - 2 days ago

I see Conway's Law at work here. The marketing department must have its own IT department separate from the IT that maintains the core website and business functions. It's impossible for them to get on the same web domain (much less build something in the phone apps). Instead, they built their own disparate site and experience.

nmstoker - 2 days ago

A friend told me about a company where the CISO instigated security newsletters aimed at staff to build up their experience on such topics, yet the newsletters were emailed from an external email and contained links to a hosting site that wasn't related to any of the employers regular website domains and like this case would often come across as a phishing attempt, especially when they ran competitions (apparently they appeared too good to be true, as friend's employer was famously tight!)

wccrawford - 2 days ago

I had this happen worse from my car loan bank.

I got an email with a header that was obviously badly scanned from a paper document. It demanded that I provide proof of insurance or my car loan would be canceled. It had the name of the bank and my name and my email, but nothing else of import.

The only URL was to a domain unrelated to the bank.

I ignored the first couple, and finally looked into it the third time.

It was legit.

When I told them all the ways this looked like phishing, they couldn't understand my concerns.

I gave them the info they wanted in person at a local branch. I soon after paid off that loan and got away from them.

sam-apostel - a day ago

Something similar happened in Belgium in 2021. The Flemish government launched a compensation scheme for solar panel owners via a site called tellercompensatie.be. I registered the obvious typo variant: teller-compensatie.be right after the tv and radio announcements, added a visitor counter and a link to the real site. It got ~20k hits in a few days, my second most popular project thus far.

I just went to check the “official” domain and it looks like the domain is now owned by an ad network. Classic.

A news article link ( https://www.vrt.be/vrtnws/nl/2021/01/22/compensatieregeling-...) still ises that domain name in it’s article, but now redirects to a proper gov site: vlaanderen.be/veka

rainforest - 21 hours ago

I had similar with my energy provider in the UK (Octopus). For one reason or another a regular payment bounced which automatically puts you on a "call daily until the debt is repaid" list.

These calls come in on an unrecognised number, from staff who say "I don't know" when you ask them to prove they are from Octopus, and generate no call notes so you can't find out why they rang if you use the main customer service number.

To top it off they ask you to key in your card info on the phone after asking for your personal information.

I complained and they offered to fob me off with £30 credit instead of talking to their CISO, but they did at least say they can add phone passwords to individual accounts.

massung - 2 days ago

I use USAA for banking.

Something they do when they initiate a call to me on the phone is they start by making sure they are talking to me (they don’t ask me to prove it) and making sure I have the app on the my phone or access to a web page.

Then they initiate a MFA check within the app. I have to get it and read back a number. Then they ask me for my phone PIN or password. Once that’s done, then we can start talking.

quitit - 2 days ago

My bank has a secure messaging system inside their website and app.

However every time I use it, instead of answering through the secure channel, they try to call me on the phone.

Now they've put out security warnings about scammers impersonating bank staff making calls to customers.

j_seigh - 2 days ago

Here's an interesting scheme. Some credit/debit card merchant accounts can arrange to get updated card info if your card expires and/or gets replaced. So if the merchant is a bad actor and doesn't charge your card directly but just tracks your updated card info so it can be used fraudulently elsewhere, you, your bank, and the card company will never know they were the source. And the card is linked to your bank account, you can replace it ad infinitum and the bad actors will get the updated info for the new card every time. The only way to break out of this is to close your bank account and open a new one.

_petronius - 2 days ago

Consumer-facing financial services in Germany are really bad at this, and it is not just Sparkassen: a few years ago an email supposedly from our corporate credit card provider to all of the foreign nationals at our company asking for scans of their passport photo pages triggered a deluge of phishing reports to IT, who had to subsequently inform everyone that yes, the email did indeed look exactly like a phishing attempt, but no, it was real.

I don't really know why the situation is so terrible -- there are many good and competent security professionals working in corporates in Germany -- but perhaps as the post alludes to it is due to a lack of legal or regulatory pressure to date.

jonathantf2 - 2 days ago

> "The SSL certification is from Let’s Encrypt and not from one of the major root CAs"

This is NOT a reason to distrust a website.

everdrive - 2 days ago

Phising and phishing education are inherently misguided. If my normal workflow includes much the following, then phishing will always eventually succeed:

- HTML emails where links and remote images obfuscate the 'real' content of the email.

- URLs which are not clearly and easily human-readable.

- A workflow where my normal and expected daily behavior is to receive valid emails that I don't recognizes with URLs from vendors, and then I'm meant to click on those URLs, go to web pages, and enter my credentials.

The fact that _any_ normal products or business processes expect this means phishing will always eventually succeed. No, I don't have all the UIs and URLs for every vendor memorized. I'd have no way to know if they changed validly, and my job trains me on a daily basis to click on emails and enter my credentials. It's just that _every so often_ this same scenario is set up by a bad actor.

fsckboy - a day ago

I was on the phone with my bank recently (I called them) and they wanted to send a code to my phone to confirm my identity. I agreed. In came a text with a code and the phrase "nobody from the bank will ever ask you for this code..."

jszymborski - 2 days ago

Royal Bank of Canada hasn't done anything this egregious but it always gave me a lot of confusion.

They use so many different domains. I'm not talking about redirects either. Like their landing page is at rbcroyalbank.com and then the login is at secure.royalbank.com. for ages rbc.com was another website for ages, but now also appears to be the Royal Bank (or is it?). I forget under which domain the dashboard is hosted.

Like, I get buying all the variations of your bank name, but please just redirect to one cannonical one! Marketing should also be for one domain. Way to easy to be scammed by royalbankofcanada. com or rbcbank.ca, because who the heck knows what their actual site is!

seb1204 - 2 days ago

I know this from sport events but often the lottery or prize draw are organised by external marketing companies. So likely this is one reason for not making it a subdomain.

The other is that Germans seem very bad at this kind of stuff. Why the heck would the application for the German passport or Ausweis be published by some random GmbH and not Bundesregierung.gov?

tbrownaw - 2 days ago

Speaking of normalizing bad habits, does anyone else remember when you were supposed to only ever enter your password into a site if you'd entered the address yourself (or used a bookmark), because if some other site had redirected you there it might be a fake?

And then now we've got OIDC.

seaucre - 2 days ago

To verify your account during online customer service calls, Comcast will text you a six digit 2FA looking auth code which you must provide to the Comcast customer support. Guys.

1shooner - 2 days ago

I left Chase because their anti-fraud detection was so suspicious that Chase's own customer service told me it was fraud and had me close my checking account in the middle of a vacation. Only later I put together it was legitimate fraud detectiontriggering on an unexpected transaction location.

Neywiny - 14 hours ago

I know somebody who tried doing a standard vehicle emissions test (gov't facility) in the area they live in. Bank thought it was suspicious and locked their card. Then they tried sending money from the bank to buy a car (they were just borrowing it before buying from a family member), and the bank thought it was fraud so removed online banking too. No tickets or phone calls helped. Ridiculous. Never once did they call to ask "hey is this fraud?"

rwmj - 2 days ago

My bank replaced their phone authentication with something that asks you to speak a phrase (the same one every time) and tries to recognise your voice. Luckily that's completely bulletproof, there's no way it can be forged :-/

mitthrowaway2 - 2 days ago

This is pretty bad, but not as bad as Plaid asking for my bank account log-in credentials.

pflenker - 2 days ago

Ah, Sparkasse. I fondly remember the needless restriction for my password to be at most 5 characters long, all numbers.

meroes - 2 days ago

My bank’s fraud department uses text shorthand like “Stop2end” and “call ph#” and their dates lack spaces “24Jun” in their texts to me.

Is this some kind of meta-level play to sound less fake?

myflash13 - 2 days ago

This is on us, as software “engineers” for not having standards that may be used to regulate software development. There are building codes, fire codes, but no software codes.

bsoles - a day ago

When I got locked out of my mobile banking app, I got a security code in email to reset the app or something, but it didn't work. Then, I've called my customer representative for help, who promptly asked me to tell her the security code in the email so that she can reset the app. Yet, the email, in bold letters, said to never divulge the code to anybody, including the bank personnel...

tharos47 - a day ago

Here is american Express "secure email" documentation : https://www.americanexpress.com/us/customer-service/secure-e...

I've mistakenly deleted from our mail quarantine multiple times as spam/phishing. Imho it's wilful négligence toynkeep such a system operating in 2025.

upstandingdude - 20 hours ago

Same with DHL, they basically train their customer base to trust messages from random channels like whatsapp containing links. They have all the urgency/nonsense markers of spam.

dsabanin - 2 days ago

I've been getting lots of scam calls lately, especially AI voice generated once, and there was one particularly annoying. Very persistent call about being approved for some loan, no reference to any particulars, all very vague, and I kept ignoring. In my mind I had no doubt it was a scam. Well, long and boring story short, now I have a missed payment on my credit report for my new HVAC system..

clbrmbr - a day ago

Do what I did: move to a new bank that respects your security. When you close your account, give formal feedback about why you are closing. Outflows of depositors should send a signal.

(i had on issue with PNC in the US where they kept calling and asking for a 2FA code. Totally indistinguishable from phishing. Clearly they lack proper infosec, so I moved to Schwab and have not looked back.)

VBprogrammer - a day ago

My employer regularly sends out phishing honey pot emails. Which is great but they then will send out legitimate emails which are genuinely difficult to separate from actual phishing (using novel new email addresses and domain names in links). They also like to use some email filtering which has a habit of mutilating URLs.

- 2 days ago
[deleted]
meatmanek - a day ago

Major US banks sometimes do similarly dumb things: TD Bank owns onlineaccessplus.com and myonlineaccount.net. Citi's credit card site used to have you log in at accountonline.com.

lqet - a day ago

My local Volksbank does basically the same, linking to https://www.wero-gewinnspiel.de/.

The site also uses a Let's Encrypt certificate, which seems strange. This appears to be a massive, coordinated and not very well-executed effort to promote this Wero service. My guess is that the sites were all build by the same advertising agency.

edarchis - 2 days ago

gewinnen-mit-wero.de: It is pretty common to use a dedicated domain for a large campaign so that the spam complaints don't hurt the deliverability of your main domain.

- 2 days ago
[deleted]
ccorcos - a day ago

I’m always surprised that banks don’t have a better way of authenticating themselves to their customers (Chase and Vanguard, in particular).

They call, they say I can call back and wait in a queue, but that’s stupid.

Also crazy they don’t have a TOTP (e.g. Google Authenticator)based two-factor authentication. It’s just way more secure than email or phone number.

hinkley - a day ago

It's been a while since mine triggered on me, and the weird thing of it was a bought a TV that day, which is what I assumed they called about. Nope, it was for getting a car wash halfway between the store and home.

detourdog - 2 days ago

Every bank I deal with except Schwab forces me to allow cross-site scripting to use bill pay...

mcv - a day ago

I would hope your national bank regulatir would slap this down hard, but if the government does exactly the same thing, your country might be doomed.

Training about this kind of thing is mandatory for bank employees in my country, as far as I know.

kodzoman - 2 days ago

I've been preaching about this issue for years, even to my friends working in banks as IT security, but for some reason they are more obsessed about solving the wrong problems with buying expensive hardware.

sitkack - 2 days ago

I know of a bank that it asked for every piece of PPII they have on you for account validation. This allows their phone support folks to have every piece of information to steal your identity.

andrewstuart - 2 days ago

My bank:

“Hello this is your bank can I please confirm your personal details?”

exabrial - 13 hours ago

My Bank (ally) absolutely refuses to do any sort of secure authentication. No TOTP, no U2F key, no Passkey... however, they're unbelievably climbing over the garden gate to tie my account to my phone. Want to log it? yeah lets text you. Want to do anything else? Hey we sent a push notification to your phone. Seriously, fuck my phone. It's the least secure thing I own. Stop acting like its my damned identity.

Oh as a bonus... Hey want to integrate with a third party website? Oh just enter this code that we are literally telling you not to give away to anyone else. Lol.

data_maan - a day ago

Germany is a broken country, and this illustrates it on a micro-level

Pxtl - 2 days ago

Do these banks not have insurance companies looking at this liability and saying "no you goddamned idiots, we are not covering you."

delusional - 2 days ago

Heh, we did something similar at the bank where I work. Our marketing department, tasked with getting people to complete some "ongoing due diligence" (a bank term, part of KYC), sent out a bunch of SMS' with links to a page (on a non-core business domain) where we then asked customers to enter a bunch highly personal information. The SMS contained a lot of scary language about your account getting blocked and stuff.

I didn't know about it before my grandmother handed me an article from the local newspaper and told me some of her friends were worried about it. We laughed and I took the newspaper clipping to work and posted it on the wall of failures. Everybody in IT could immediately tell that this was a pretty bad idea, but we weren't asked.

I'd link the article and provide more details, but I'd have to visit my local library, and maybe later.

aivisol - 2 days ago

> “Here is your Sparkasse. A very important document is waiting for your signature. Please visit paperless.io/548fkjgd7f to continue.”

I mean this is just ... incredible. Are they living on the moon? Many real phishing messages are even more sophisticated than this.

gwbas1c - 2 days ago

I find there are a lot of people who just don't "get" written communication.

Once I got a vaccination, and in order to do it I had to fill out a form where I chose the arm. The form said to circle either "right or left."

The word "right" was on the left and "left" was on the right.

I pointed this out to the nurse and she laughed, and then realized her error, because she made the form.

zero_k - a day ago

I'm also with Sparkasse and it's the worst. Their digital systems and their technical understanding is the bottom of the barrel. On the other hand, the "most digital bank" in Germany, N26, a so called "neobank" has laughable security [1]. It's a huge mess over here. I used to also bank in Singapore, the difference is night and day. Fun story: Sparkasse has an integration with a stock brokerage, and the stock charts are PNGs generated at the backend. It's literally 1995-level HTML usage, One can only laugh.

[1] https://archive.org/details/33C3-Shut_Up_and_Take_My_Money

JadoJodo - a day ago

The one that kills me is when a financial institution or healthcare facility calls and says, "Hi, this is so-and-so from The Place. I was calling about your request/account/etc"

→ "Oh, ok"

→ "Before we get started, I need to verify your social security number/address/other personal information"

→ "Yeah, you called me and I have no way of knowing if you are who you say you are. I'm not going to give you that information. Can you give me your name, and I'll call the number on the website and ask for you?"

→ "Flabbergasted Well, our system doesn't work like that, so you'll have to submit another request"

→ Repeat ¯\_(ツ)_/¯

sneak - 13 hours ago

AmEx emails to customers often have marketing/tracking redirects replacing all of the links in the email.

The links to that redirector service are http:

You don’t even need to phish them, AmEx does it for you. All you have to do is rewrite the redirect on the wire.

fortran77 - 2 days ago

The US city I live in 9 months/year has a yearly burglar/fire alarm licence fee.

A few years ago, I got a postcard that said "renew your alarm licence on-line" and the domain wasn't the .ca.gov domain the city uses, but something like "alarm-renewal-online.info"

I had to spend 30 minutes on the phone with my city to verify that this was a legitimate way to renew the alarm. They had contracted with an outside company to do the payment servicing. In the end, I just decided to mail them a check.

renewiltord - a day ago

Lol Chase always calls me.

"We'd like to confirm this wire. We just need some details."

"Okay, I am me, that's true. But I should probably call Chase back for this right? This is textbook scam stuff. What do I tell them to get to you as fast as possible."

"All right, sir. That's fine. Let me just make a note on the account. You should be able to find the phone number on the website"

And then I usually just find my way. It's funny, but you kind of have to be disciplined.

hopelite - 2 days ago

It seems to me the better and simpler solution is to continue teaching your users that this pattern this bank engages in is in fact still the pattern of hostile actors and let the bank deal with the consequences.

The system will surely rectify itself eventually when their spammy, manipulative, promotional banker campaigns do not produce results (is that a bad thing?) and they seek out firms that do produce results based on knowing what they are doing.

The author could even use it as an opportunity to promote his or someone else’s services and use this write-up as an artifact of evidence.

I don’t want to get too generalizing, but it is a perspective that does not surprise me coming from what seems to be a German, for better or worse. Complaints about not being in compliance with universal norms instead of taking advantage of a presented opportunity to break ranks for one’s their own individual advantage, strikes me as a very German perspective; like I said, for better or worse, without judgement, since both of these perspectives have their advantages and disadvantages.

taneq - 2 days ago

Some of the worst practices I've seen are from FedEx. When you order an international package, you get a text from some random FedEx employee's personal mobile number, containing a link to a website where you're meant to enter your credit card details to pay import duties. WTF? NO. I've called up about it and the support team were just like "ugh, yes, I know, yeah that's actually probably legit."

Kate5477 - a day ago

[dead]

idkfasayer - a day ago

[dead]

wykmbh666 - a day ago

[dead]

wykmbh666 - a day ago

[dead]