Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

8/5/2019
10:30 AM
DJ Murphy
DJ Murphy
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Fighting Back Against Mobile Fraudsters

The first step toward identifying and preventing mobile fraud threats is acknowledging that mobile security requires a unique solution.

Merchant and e-commerce organizations are no strangers to the struggles of fraud protection. Amazon, a recent target, noted that its merchants were hit by "extensive" fraud over six months in 2018. Hackers stole thousands of dollars from hundreds of merchant accounts by redirecting money to their own bank accounts. In addition, knowing that global digital commerce sales are forecast to skyrocket in 2020 and consumers are increasingly turning to mobile to make purchases and online transitions, businesses must consider the unique fraud threats they face on mobile devices.

Why Mobile Fraud Must Be Treated Differently
Businesses often approach mobile fraud prevention with the same tactics, technology, and mindset they use for traditional desktop e-commerce. The transactions that happen on mobile and the nature of the data captured are quite different than those that happen on desktop, which means merchants should consider a different fraud solution for each channel. For example, mobile orders can be purchased in various ways through a consumer's personal mobile device, website, or app. It is important for businesses to see where the transaction is made in order to identify fraudulent activity correctly.

One way they can do this for mobile is by taking a closer look at the consumer's device ID and geolocation, which provides a unique identifier for each individual, such as the type of phone they use, mobile carrier, and even the default language that's set on the phone. For example, if a consumer has never traveled abroad but has been making purchases internationally, this identifier helps catch fraud in the early stages. While it is possible for fraudsters to spoof a device ID, it is a less-common fraud method.

The Root of an Attack
While fraudsters continue to generate more sophisticated attacks, one of the most common types of mobile fraud is account takeover (ATO). ATO often results when people reuse usernames and passwords across multiple online accounts. If their login information is stolen in a recent breach, that username and password combination is often sold to any number of fraudsters who then test it across the Web until they are given access.

Combating Fraud with Mobile Fraud Prevention Technologies
One of the most targeted victims of mobile fraud are bank customers. A recent report from Javelin found that at least 1.5 million victims of existing account fraud had fake accounts opened by cybercriminals.

While mobile banking makes it easier for customers to access their bank accounts, this also makes them more susceptible to mobile fraud. Mobile banking is an appealing target for fraudsters because of the ease of access to customer information and the speed of electronic wire transfers to an outside bank account. Whether the customer falls for a phishing scam or downloads a malicious app, there are various schemes fraudsters use to infiltrate customer bank accounts. Financial institutions without the proper security measures in place risk putting their customers in the front lines of ATO or identity theft — issues that can be prevented with fraud prevention technologies.

Many financial institutions smartly require customers to go through multifactor authentication (MFA) in order to access their bank accounts. MFA reduces the chances of mobile fraud by putting multiple authentication and verification methods in place that require customers to approve every transaction made. This may include asking the customer for additional verification methods such as inputting their PIN, SMS text verification, answering security questions, or using biometric authentication, such as their fingerprints.

Other fraud prevention solutions include machine learning and artificial intelligence that predict the user's actions as well as behavioral biometrics that identifies how users behave with their mobile devices. These technologies help businesses identify and prevent fraudulent threats from occurring before it happens.

Whether you manage a mobile commerce platform or a financial institution, acknowledging that mobile security requires a unique solution is the first step toward identifying and preventing mobile fraud threats. And implementing the right fraud prevention technologies ensures that your business and customers are out of harm's way.

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

DJ Murphy is the Editor-in-Chief, Security Portfolio, at Reed Exhibitions, where he oversees all content. He also leads programming for CNP Expo, a leading event for the card not present and fraud prevention industry. He manages a staff of content producers dedicated to ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18214
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...