searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

Featured news

  • Retail and hospitality sector fixing software flaws at a faster rate than others
  • Organizations struggle to maintain application security across platforms
  • Financial institutions must prepare for increased risk of financial crime
  • 3GPP standards enrich LTE and 5G with network architecture enhancements
  • Bugs in Signal, other video chat apps allowed attackers to listen in on users
Help Net Security
Help Net Security
September 11, 2019
Share

Fraudsters no longer operate in silos, they are attacking across industries and organizations

From January 2019 through June 2019, LexisNexis Risk Solutions recorded 16.4 billion transactions, of which 277 million were human-initiated attacks, a 13% increase over the second half of 2018.

networked cybercrime

The report highlights a shift toward networked, cross-organizational and cross-industry fraud, and gives insight into the evolution of bot attacks targeting new accounts in media and e-commerce.

Networked cybercrime

Cybercrime networks emerge when digital identities are associated with confirmed fraud attempts across more than one organization in the Digital Identity Network. Organizations within the same industry, particularly banking, lending and stock brokerage, are most acutely affected.

The new report details one example of how the Digital Identity Network tracked one specific a fraudster across three industries and six different organizations (several financial services organizations, a media streaming company and a credit reporting agency) as the fraudster attempted to create new accounts, initiate repeated login attempts and make fraudulent payments in an effort to monetize stolen credentials, launder money and abuse bonus incentives.

Bot attacks

Fraudsters have shifted bot attacks to target new account creation transactions, which is the only transaction use case which recorded a growth in attacks during the first half of the year. Fraudsters are using these new account creation attempts to test, validate and build online identities for financial gain.

Within media, for example, bot attacks targeting new account creations saw a 65% increase in just six months; The Digital Identity Network revealed a number of bonus abuse attempts where fraudsters attempted to sign up for a number of new accounts in order to capitalize on free trials and streaming bonuses to sell for profit.

E-commerce companies also saw bot attacks on new account creations increase 305% and were most prevalent in online marketplaces, virtual gift card companies and ridesharing sites.

networked cybercrime

Mobile app registration

While mobile continues to prove more secure than desktop, fraudsters are seeing new mobile account creations and app registrations as opportunities to intercept one-time passcodes to fraudulently register mobile apps.

This provides fraudsters with a wealth of personal information and bank account access. Globally, attacks on mobile apps rose 148% in six months and are skewed towards media organizations, particularly social media and gaming/gambling organizations, where bad actors register for new player bonuses to sell for profit.

“Fraudsters no longer operate in silos, they are attacking across industries and organizations,” said Rebekah Moody, director of fraud and identity at LexisNexis Risk Solutions.

“As seen by a detailed example in the report, one fraudster can carry out a large number of transactions against a series of global organizations using a single mobile device.”

“In the end, corporations benefit the most when fraud defense platforms include a multilayered approach that comprise digital identity intelligence, physical identity and authentication capabilities,” continued Moody.

“This approach, when executable in near real- time and touching the entire customer journey, extends beyond detecting complex fraud – it also allows for more streamlined regulatory compliance processes and reduces friction across the customer experience.”

More about
  • account protection
  • attack
  • bot
  • cyberattack
  • cybercrime
  • fraud
  • LexisNexis Risk Solutions
  • mobile apps
  • network
  • survey
Share this
healthcare

Bolstering healthcare IT against growing security threats

  • Retail and hospitality sector fixing software flaws at a faster rate than others
  • Ransomware provides the perfect cover
Bugs in Signal, other video chat apps allowed attackers to listen in on users

What's new

week in review

Week in review: Active Directory security, Dnsmasq vulnerabilities, how to select a fraud detection solution

bug

Retail and hospitality sector fixing software flaws at a faster rate than others

cloud

Organizations struggle to maintain application security across platforms

healthcare

Bolstering healthcare IT against growing security threats

Don't miss

healthcare

Bolstering healthcare IT against growing security threats

bug

Retail and hospitality sector fixing software flaws at a faster rate than others

eavesdropping

Bugs in Signal, other video chat apps allowed attackers to listen in on users

ransomware

Ransomware provides the perfect cover

money

Financial institutions can strengthen cybersecurity with SWIFT’s CSCF v2021

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • How do I select a fraud detection solution for my business?
  • Securing the connected home: A joint task for homeowners and their ISP
  • Cybersecurity sales: Do you have what it takes to succeed?
  • How do I select a data control solution for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise