Detecting External Imposters
on an e-Banking Application

A group of attackers succeeded via social engineering to target several customers and obtain individual credentials. The attackers then logged into the application as legitimate customers and succeeded to perform money transfer transactions.