GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

A zero-tolerance approach to downstream fraud from 2019 data breaches

globalresearchsyndicate by globalresearchsyndicate
February 28, 2020
in Data Collection
0
A zero-tolerance approach to downstream fraud from 2019 data breaches
0
SHARES
14
VIEWS
Share on FacebookShare on Twitter

Kevin Gosschalk, Arkose Labs, believes that ‘if there is one thing we can attribute to the hackers of 2019, it is the end of any pretense that personal information is secure online’

 

We have seen a steady stream of major data breaches, with Forbes estimating that 4.1 billion records were compromised in the first six months of the year alone. No industry has escaped unscathed, and your digital identity is likely to have been compromised whether you have applied for a credit card, ordered food through a delivery app, bought cosmetics online, played video games or you were born in the country of Ecuador. And the list could go on.

Arkose Labs’ customers see surges in automated bots attacks hitting digital commerce sites and apps in the wake of major data breaches, with fraudsters primarily using fake account registrations to test stolen credentials at scale. Verified credentials are then used to launch more sophisticated human-driven account takeover attacks, often targeting lucrative banking and payments transactions.

We have entered a new age, where fraudsters have the ability to mimic trusted customer behavior with unnerving accuracy – leveraging stolen credentials, spoofing digital identifiers and exploiting intel on individual transactional habits, obtained by unauthorised access to online accounts.

Detailed knowledge of the parameters used by data-driven fraud detection systems is informing fraudsters of the characteristics they need to spoof or disguise, and we are seeing a rise in single request attacks, which synthetically manipulate each request to obfuscate IP addresses and mimic legitimate consumer fingerprints.

Due to unpredictable consumer behaviour and these advanced tactics from fraudsters, there is a growing grey area in fraud detection – in between the clear cut cases that are flagged as either trusted or suspicious. Uncertainty leads to a certain tolerance of existing levels of fraud, in order to avoid interfering with too many potentially good customers using more thorough checks.

However, this means that many consumers end up with their accounts hacked, and are left with the headache of trying to reclaim their losses and ensure their digital presence is made secure once again. Additionally, tolerance of fraud actively feeds the vicious cycle of successful cybercrime, as this provides the financial incentive for fraudsters worldwide to continue and expand their operations, and gives them the opportunity to learn from past attempts and replicate attacks elsewhere.

An entire shadow ecosystem has sprung up in support of global fraud, including identity farms, which create synthetic identities and test stolen credentials, click-farms and sweatshops, which provide humans to carry out nuanced attacks, and ‘arms dealers’ selling toolkits.

These cybercrime outfits exist because there is relatively easy money to be made with little-to-no risk. The fraudsters’ business model leverages global economic disparities in income and currency strengths, which incentivise individuals to get involved in cybercrime, and provide access to cheap resources.

Fraud levels will continue to rise indefinitely unless we can disrupt fraud to the point that it ceases to be a lucrative option for cybercriminals – no matter where they are in the globe.


Step one – Disrupt cybercriminals’ tools

Taking down the tools and automated programs and bots that support fraud at scale requires businesses to move beyond an arms-race mentality, to focus on the steps which will increase the time, cost, and effort it takes for fraudsters to carry out attacks in the long term. By increasing the burden in these three areas, it will lead to more bad actors abandoning the process earlier.

Businesses need sophisticated analysis of traffic from the very beginning of the customer journey to triage between legitimate customer behaviour and suspicious activity. Whereas trusted customers are provided with a seamless, friction-free journey, those sessions that raise red flags can then be sent to targeted step-up authentication that slows down attacks and drives up the investment needed to carry out fraud at scale.


Step two – Increase the strain on fraudsters’ resources

Focusing on defenses that ensure fraudsters requires a real human being behind every single attack is a surefire way to undermine the financial incentive of fraud, by slashing potential ROI.

Adaptive step-up challenges targeted at suspicious traffic will wipe out attacks that rely on automated bots. Effective solutions are those that constantly update the type of challenge presented in order to keep moving the goalposts and prevent fraudsters scripting their way round your defenses to carry out duplicate attacks.


Step three – Shift the attack surface

Fraudsters rely on being able to control decision points when on a business’ digital property and deploying the appropriate tactics to evade established anti-fraud measures. To take the control away from fraudsters for good, we need to shift the attack surface by redirecting suspicious sessions to an intermediate platform which provides independent identity verification.

This provides a buffer between the fraudsters and the sites they are so practiced in attacking, rewriting the rulebook on how to successfully launch attacks. Reclaiming control of these decision points means fraudsters will quickly become frustrated when their tried and tested methods cease to work.

While many businesses have come to accept fraud as an operational cost of doing business in the digital age, we believe that the only long-term way to stop cybercrime is to adopt a zero-tolerance approach that focuses on disrupting the economic drivers leading individuals to cybercrime. Companies on the Arkose Labs platform benefit from this zero-tolerance attitude, with a 100% Service Level Agreement (SLA) guaranteeing that no inauthentic requests make it through.

To find out more on the latest insights from the Arkose Labs network, read the Q3 Fraud and Abuse Report.

This editorial was first published in the Fraud Prevention and Online Authentication Report 2019/2020. The Guide covers some of the security challenges encountered in the ecommerce and banking, and financial services ecosystems. Moreover, it provides payment and fraud and risk management professionals with a series of insightful perspectives on key aspects, such as fraud management, identity verification, online authentication, and regulation.



About Kevin Gosschalk

Kevin Gosschalk is the CEO and Founder of Arkose Labs, where he leads a team focused on telling computers and humans apart on the Internet. Before Arkose Labs, Kevin developed gaming hardware for the intellectually disabled at the Endeavour Foundation and built a unique device incorporating Microsoft’s Kinect Camera technology.

About Arkose Labs




Arkose Labs is an authentication system with two key components: Telemetry and Enforcement. Telemetry refers to our decision platform that recognises the context, behaviour, and past reputation of a request using machine learning, while Enforcement refers to our proprietary challenge–response mechanism that classifies the authenticity of unrecognised requests, and provides real-time feedback to Telemetry.

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Global Western Wear Market $99.42 Billion by 2023 at 4.8% CAGR, Says Allied Market Research

Migraine Drugs Market to Garner $2.19 Billion by 2025 at 3.1% CAGR

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com