Attacks/Breaches

5/8/2018
09:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

South America Emerges as New Hotbed of Identity Fraud: ThreatMetrix Report

SAN JOSE, California – (May 3, 2018) – ThreatMetrix®, A LexisNexis® Risk Solutions Company, today announced new data revealing the morphing nature of global cybercrime, triggered by the expanding worldwide circulation of breached identity information.

In Latin America, this is fueling an outbreak of new account creation fraud. According to the ThreatMetrix Q1 2018 Cybercrime Report, one quarter of all account registrations from this region are rejected as fraudulent. Stolen and synthesized identities are leveraged to attack the growing LATAM eCommerce market, as well as major global American retail corporations. Another key tactic in the LATAM region for monetizing stolen identities is to create fake new accounts using free trials and reselling these for profit.

Global cybercrime expansion is being driven by developing economies recently emerging as major perpetrators of fraud, creating new epicenters of cybercrime off the back of attacks that extend beyond their own borders into the surrounding region. Attacks from Brazil feature in the top five global nations perpetrating cybercrime, with activity targeting neighboring countries such as Argentina and Columbia – as well as leading digital economies in United States and United Kingdom. Vietnam retained its position on the top five list with attacks targeting Japan, Singapore and Australia.

Overall, organized bot attacks continue to proliferate, with a record 1 billion bot attacks seen on the ThreatMetrix® Digital Identity Network® this quarter. This is fueled by a rise in attacks originating from new and emerging economies such as Egypt, South Korea, Ecuador, Ukraine and Vietnam.

“Billions of online users are generating huge swathes of data and unfortunately it is becoming easier and easier for cybercriminals to steal and monetize this, wherever they are in the world,” said Vanita Pandey, Vice President of Product Marketing and Strategy at ThreatMetrix. “Stolen data gives cybercrime a fraudulent mask, as they highjack identities to open new accounts, takeover legitimate user accounts or perform fraudulent transactions. To combat this, digital businesses must embrace 360-degree identity insights that stitch together both offline and online attributes to confirm that users really are who they say they are.”

Identity Abuse Makes Global eCommerce Transactions Ten Times More Risky

Even amidst the traditional post-holiday lull, the overall attack levels for eCommerce remained high in Q1 with almost 150 million rejected transactions. This represents an 88 percent increase in fraud attacks over the previous year. eCommerce sites were also hit with 820 million bot attacks, and on average attack rates are ten times as high compared to financial services transactions.

These attacks continue to be focused on identity abuse and testing. As a result, the overall attack rates for account logins and new account creations have steadily grown in the eCommerce sector, with fraudsters targeting account takeovers to access sensitive personal credentials and saved credit cards.

Specifically, fraudulent new account registrations increased more than 30 percent over the previous year, as fraudsters used the relatively modest sign up requirements of eCommerce vendors as a breeding ground to test stolen identity credentials. And these tests often serve as a gateway to further attacks in other industries.

Digital commerce presents retailers with compelling new revenue streams and customer engagement opportunities. But with the ever-increasing presence of cybercrime, retailers are in a precarious position. They want to provide customers with a frictionless environment, which makes for an easy test bed for fraudsters, who are executing high scale attacks and testing accounts with stolen credit cards.

Payment Processors in the Crosshairs

Advances in technology and shifting consumer behavior are transforming payment processing, offering faster, more convenient ways to pay for purchases and, ultimately, rendering cash obsolete.

Transaction volume among payment processors in the ThreatMetrix Digital Identity Network has grown steadily each quarter, reaching 361 million this past quarter, with 43 percent of these transactions coming from mobile devices. However, payment processor transactions are seeing above-average attack rates and mobile attacks are on the rise.

Over 50 percent of transactions among payment processors are cross-border, which is significantly higher than the 30 percent cross-industry average. Among these cross-border payments attacks rates are 30 percent higher compared with domestic.

Other key highlights from Q1 2018 Cybercrime Report include:

  • 210 million attacks detected and stopped in real time; a 62 percent year-on-year increase
  • Attack growth outpaced transactions by 83 percent in comparison to Q1 2016
  • 58 percent of all account creations are now done on a mobile device, and attacks on mobile account creations grew 150% since the start of 2017
  • A record 1 billion bot attacks seen in the Digital Identity Network this quarter, 100 million of which were from mobile devices.
  • 51 percent of transactions come from mobile devices (55 percent for financial institutions), a 200 percent increase compared to Q1 2015.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6487
PUBLISHED: 2019-01-18
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.