Cloud

6/21/2018
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Report Shows Fraud on the Rise with Sharp Growth in US-Based Activity

DataVisor reports 900 million malicious activities and transactions in Q1 2018.

MOUNTAIN VIEW, CA -- (June 20, 2018) - DataVisor, the leading provider of fraud detection solutions using unsupervised machine learning, today released its DataVisor Fraud Index Report for Q1 2018, providing the latest insights into trends in global fraud activity and attack techniques. Last quarter, DataVisor uncovered a total of 900 million malicious activities and transactions. The report reveals dramatic growth in fraud infrastructure, with fraudulent accounts growing by 50 percent from Q4 2017 to Q1 2018.

North America Emerges as a Leading Source of Financial Crime

The proportion of fraud originating from North America doubled since the previous quarter. The United States in particular hosts more than 51 percent of fake accounts targeting online and financial services in North America and Europe, dwarfing countries in Southeast Asia and Eastern Europe that have historically been hotspots for fraud.

Bad Actors Continue to Migrate to the Cloud

Fraudsters are taking advantage of cloud service infrastructure, such as virtual servers and anonymous proxies, which allow them to easily orchestrate attacks at scale and hide behind legitimate networks. Approximately 27 percent of accounts associated with cloud service provider IP ranges appear to be fraudulent, with some data centers having more than 90 percent fraudulent activity.

Fraudsters Step up Device Spoofing to Evade Detection

Fraudsters are getting better at mimicking legitimate user activities, including using device platforms popular among real users. 28 percent of fraudulent accounts originated from Mac OS X devices this quarter, representing a 4-fold increase over last quarter. As Mac OS is associated with fewer fraud activities in the past, fraudsters are likely spoofing their user agent strings to avoid detection.

“Our research shows that fraudsters are not only scaling up their attacks, but also becoming more sophisticated,” said Ting-Fang Yen, director of research at DataVisor. “Fraudsters are evolving quickly and using the latest technologies to evade detection -- an example is the widespread practice of device and OS spoofing. Solutions that automatically adapt to ever-changing attacks will be critical for businesses looking to protect themselves against fraud and abuse.”

The DataVisor Fraud Index Report for Q1 2018 is based on attacks detected by the DataVisor UML Engine between January and March of 2018 from analyzing 40 billion application-level events and 680 million user accounts across some of the largest internet properties and financial services in the world.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.