09:45 AM
Dark Reading
Dark Reading
Products and Releases

South America Emerges as New Hotbed of Identity Fraud: ThreatMetrix Report

SAN JOSE, California – (May 3, 2018) – ThreatMetrix®, A LexisNexis® Risk Solutions Company, today announced new data revealing the morphing nature of global cybercrime, triggered by the expanding worldwide circulation of breached identity information.

In Latin America, this is fueling an outbreak of new account creation fraud. According to the ThreatMetrix Q1 2018 Cybercrime Report, one quarter of all account registrations from this region are rejected as fraudulent. Stolen and synthesized identities are leveraged to attack the growing LATAM eCommerce market, as well as major global American retail corporations. Another key tactic in the LATAM region for monetizing stolen identities is to create fake new accounts using free trials and reselling these for profit.

Global cybercrime expansion is being driven by developing economies recently emerging as major perpetrators of fraud, creating new epicenters of cybercrime off the back of attacks that extend beyond their own borders into the surrounding region. Attacks from Brazil feature in the top five global nations perpetrating cybercrime, with activity targeting neighboring countries such as Argentina and Columbia – as well as leading digital economies in United States and United Kingdom. Vietnam retained its position on the top five list with attacks targeting Japan, Singapore and Australia.

Overall, organized bot attacks continue to proliferate, with a record 1 billion bot attacks seen on the ThreatMetrix® Digital Identity Network® this quarter. This is fueled by a rise in attacks originating from new and emerging economies such as Egypt, South Korea, Ecuador, Ukraine and Vietnam.

“Billions of online users are generating huge swathes of data and unfortunately it is becoming easier and easier for cybercriminals to steal and monetize this, wherever they are in the world,” said Vanita Pandey, Vice President of Product Marketing and Strategy at ThreatMetrix. “Stolen data gives cybercrime a fraudulent mask, as they highjack identities to open new accounts, takeover legitimate user accounts or perform fraudulent transactions. To combat this, digital businesses must embrace 360-degree identity insights that stitch together both offline and online attributes to confirm that users really are who they say they are.”

Identity Abuse Makes Global eCommerce Transactions Ten Times More Risky

Even amidst the traditional post-holiday lull, the overall attack levels for eCommerce remained high in Q1 with almost 150 million rejected transactions. This represents an 88 percent increase in fraud attacks over the previous year. eCommerce sites were also hit with 820 million bot attacks, and on average attack rates are ten times as high compared to financial services transactions.

These attacks continue to be focused on identity abuse and testing. As a result, the overall attack rates for account logins and new account creations have steadily grown in the eCommerce sector, with fraudsters targeting account takeovers to access sensitive personal credentials and saved credit cards.

Specifically, fraudulent new account registrations increased more than 30 percent over the previous year, as fraudsters used the relatively modest sign up requirements of eCommerce vendors as a breeding ground to test stolen identity credentials. And these tests often serve as a gateway to further attacks in other industries.

Digital commerce presents retailers with compelling new revenue streams and customer engagement opportunities. But with the ever-increasing presence of cybercrime, retailers are in a precarious position. They want to provide customers with a frictionless environment, which makes for an easy test bed for fraudsters, who are executing high scale attacks and testing accounts with stolen credit cards.

Payment Processors in the Crosshairs

Advances in technology and shifting consumer behavior are transforming payment processing, offering faster, more convenient ways to pay for purchases and, ultimately, rendering cash obsolete.

Transaction volume among payment processors in the ThreatMetrix Digital Identity Network has grown steadily each quarter, reaching 361 million this past quarter, with 43 percent of these transactions coming from mobile devices. However, payment processor transactions are seeing above-average attack rates and mobile attacks are on the rise.

Over 50 percent of transactions among payment processors are cross-border, which is significantly higher than the 30 percent cross-industry average. Among these cross-border payments attacks rates are 30 percent higher compared with domestic.

Other key highlights from Q1 2018 Cybercrime Report include:

  • 210 million attacks detected and stopped in real time; a 62 percent year-on-year increase
  • Attack growth outpaced transactions by 83 percent in comparison to Q1 2016
  • 58 percent of all account creations are now done on a mobile device, and attacks on mobile account creations grew 150% since the start of 2017
  • A record 1 billion bot attacks seen in the Digital Identity Network this quarter, 100 million of which were from mobile devices.
  • 51 percent of transactions come from mobile devices (55 percent for financial institutions), a 200 percent increase compared to Q1 2015.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method to disable passcode authentication. NOTE: the vendor indicates that this is not an attack of interest w...
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.1 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. ...
PUBLISHED: 2018-08-16
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
PUBLISHED: 2018-08-16
An issue found in Progress Telerik JustAssembly through 2018.1.323.2 and JustDecompile through 2018.2.605.0 makes it possible to execute code by decompiling a compiled .NET object (such as DLL or EXE) with an embedded resource file by clicking on the resource.
PUBLISHED: 2018-08-16
ASUSTOR ADM 3.1.0.RFQ3 uses the same default root:admin username and password as it does for the NAS itself for applications that are installed from the online repository. This may allow an attacker to login and upload a webshell.