Centeno 05 Assignment 1
Centeno 05 Assignment 1
05 Assignment 1
Direction: Assess the given scenario and provide applicable cybersecurity technologies by answering
the guide questions in at least three (3) sentences each. (3 items x 10 points)
Scenario:
In December 2021, Banco De Oro users took to social media to complain about illegal transactions made using their
accounts to transfer money to the UninonBank account of a certain “Mark Nagoyo.” A common pattern among the victims
is that the alleged cybercriminals were somehow able to access the victims’ BDO accounts even if they were careful
about not clicking any suspected phishing links and ensuring not to reveal any of their banking details in public.
A month later, five (5) suspects of the BDO hacking were arrested and charged by the National Bureau of Investigation
(NBI).
Ronelyn Panaligan, one of the suspects, acts as a “verifier” and pretends to conduct a survey and ask victims for their
identification cards with photographs in exchange for PHP50 in prepaid credit loan for “participating in the survey”. The
information and photographs of the victims, without their knowledge, would be used to apply for verified GCash or
Paymaya accounts. And after securing the debit cards, would offer them for sale to other fraudsters looking to cash out
funds from illegitimate sources.
Clay Revillosa, a third-year college student, was found to be selling 800,000 mailing lists or e-mail addresses containing
login credentials of online banking accounts for PHP30,000.
As for Ifesincachi Fountain Anaekwe and Chukwuemeka Pete, the DOJ said, they are the brains behind the “Mark
Nagoyo Group” and provided access devices such as bank accounts, crypto wallets, or even point of sale (POS) terminals
of legitimate merchants to fraudsters.
Jherom Anthony Taupa was found to be selling a “SCAMPAGE” for P2,000. It is a phishing website that is an imitation of
the website of GCash. The "SCAMPAGE" was used to harvest the login details, usernames, passwords, and mobile
personal identification numbers (MPINs) of victims who would access it under the mistaken belief that they were
accessing the GCash official portal.
Source: https://www.rappler.com/business/bdo-clients-lose-money-due-alleged-online-
banking-hack/
Guide Questions:
1. What should possible cybersecurity technology BDO apply to prevent such scenarios? Match
the cybercrime offense to the possible cybersecurity technology.
- BDO should implement multi-factor authentication (MFA) to prevent unauthorized access to user
accounts. Phishing protection systems, such as anti-phishing filters and domain monitoring,
should be used to block fake websites like the “SCAMPAGE” that harvest login credentials.
Behavioral analytics can also help detect unusual transaction patterns and flag suspicious
activities, preventing illicit transfers.
2. Which cybersecurity technologies should bank users apply to avoid falling from such crimes?
- Users should enable multi-factor authentication (MFA) for extra protection against unauthorized
account access. Using a password manager ensures strong, unique passwords for each account,
reducing the risk of credential theft. Anti-phishing software and mobile device security can help
detect malicious websites and secure users’ devices from potential breaches.
05 Assignment 1 *Property of STI
Page 1 of 2
3. In your opinion, what is the significance of cybersecurity technologies in situations like this?
- In my opinion, cybersecurity technologies are essential in safeguarding both banks and users
from cybercrime. They provide vital protection against unauthorized access, phishing attacks,
and fraud, which can otherwise result in significant financial losses. Without these technologies,
cybercriminals can easily exploit weaknesses, undermining trust in digital banking systems and
exposing users to greater risk.
GRADING RUBRIC:
Performance Standards Points
The student provided a justified explanation of the question. 5
The student provided a clear answer in at least three (3) sentences of 5
explanation.
Total 10
05 Assignment 1 *Property of STI
Page 2 of 2