Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/19/2013
06:43 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

iovation Finds 30 Percent Of Transactions Conducted From Tor Are Fraudulent

Company also announced general availability of a new capability for its flagship Reputation Manager 360 service

PORTLAND, Ore. – September 17, 2013 – iovation, stopping Internet fraud and identifying good online customers with the world's most comprehensive device reputation database, today announced 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1% for all online transactions in August. The company also announced the general availability of a new capability for its flagship fraud-fighting Reputation Manager 360 service that enables online businesses to expose devices leveraging Tor for transactions.

Tor is a privacy protocol that is intended to help people to browse the Internet anonymously. It does so by redirecting web traffic along hard-to-follow routes and assigning web users a random IP address that can change at any time. This helps to mask users' true geolocations and the IP addresses of their Internet-connected devices. According to Tor metrics, more than 1.5 million people use Tor every day as of early September 2013, up from 500,000 a day in early August 2013.

"Cybercriminals are always looking for ways to fly under the radar," said Scott Waddell, Chief Technology Officer at iovation. "While Tor on its surface appears to be for the greater good, it is disproportionately used for fraudulent and abusive transactions. Of note, Tor use more than doubled in August, likely due to a massive botnet leveraging Tor for command and control communications."

The fraud findings were produced by iovation by analyzing 240 million transactions conducted in August 2013 originating from the 1.5 billion devices it has in its device reputation database. Transactions utilizing Tor were identified by iovation by leveraging technology it developed to correlate transactions to IP addresses that are part of Tor.

The same technology iovation leveraged to measure Tor-related fraud will be generally available to iovation customers starting today. By identifying high-risk devices and transactions specifically using Tor, iovation customers gain an additional level of insight that can have significant uplift in the battle to reduce fraudulent activity.

This new feature is available free of charge for customers of iovation's ReputationManager 360. The service leverages current and past device behavior intelligence to stop fraud. With this intelligence, iovation stops more than 200,000 fraud attempts daily, proactively identifying devices that are associated with abuse and stopping bad actors before they can strike.

About iovation

iovation protects online businesses and their end users against fraud and abuse through an industry-leading combination of advanced device identification, shared device reputation and real-time risk evaluation. More than 2,300 fraud managers around the globe leverage iovation's database of Internet devices and the relationships between them to determine the level of risk associated with any type of online transaction. Retail, financial services, insurance, social network, gaming and other companies make real-time queries to iovation's knowledge base of more than 1.5 billion devices from every country in the world. Clients also leverage iovation's Fraud Force Community, an exclusive virtual crime-fighting network of the world's foremost security experts, to share intelligence about cybercrime and prevention techniques. Every day, iovation stops more than 200,000 fraud attempts. For more information, visit www.iovation.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.