PaymentsJournal

PaymentsJournal


The Architecture of an Attack: NuData Breaks Down Account Takeover Attacks

January 15, 2020

Looking back at the holiday season, merchants faced a
timeless struggle: stopping fraudsters. While dealing with fraud is a challenge
year-round, the holiday season makes it even more difficult.

In November and December, people shop more to prepare for
the holidays, causing eCommerce volumes to rise. Aware of the uptick in volume,
criminals launch attacks, trying to take advantage of merchants who are
struggling to keep up with all the traffic.

A common fraud vector used by criminals year around is
account takeover. This is when the fraudster gains access to a user’s account,
often by using stolen login information or through a brute strength bot attack.
In either case, once a criminal gains access to an account, they’re able to steal
more personal information, money, and goods.

A recent estimate found that merchants sustained $13 billion
in losses due to account takeovers in 2018, said Tim Sloane, VP of Payments
Innovation at Mercator Advisory Group.

“And that’s likely to get worse as criminals become more
active and smarter in the way they operate, using sophisticated tools to
perpetrate their crimes,” he cautioned.

To learn more about the types of account takeover attacks
and how companies can fight back, PaymentsJournal sat down with Robert Capps,
VP of Market Innovation at NuData, and Mercator Advisory Group’s Tim Sloane.

PaymentsJournalThe Architecture of an Attack: NuData Breaks Down Account Takeover AttacksPaymentsJournal The Architecture of an Attack: NuData Breaks Down Account Takeover AttacksPaymentsJournaljQuery(document).ready(function ($){var settings_ap37205890 = { design_skin: "skin-wave" ,autoplay: "off",disable_volume:"default" ,loop:"off" ,cue: "on" ,embedded: "off" ,preload_method:"metadata" ,design_animateplaypause:"off" ,skinwave_dynamicwaves:"off" ,skinwave_enableSpectrum:"off" ,skinwave_enableReflect:"on",settings_backup_type:"full",playfrom:"default",soundcloud_apikey:"" ,skinwave_comments_enable:"off",settings_php_handler:window.ajaxurl,skinwave_wave_mode:"canvas",pcm_data_try_to_generate: "on","pcm_notice": "off","notice_no_media": "on",design_color_bg: "111111",design_color_highlight: "ef6b13",skinwave_wave_mode_canvas_waves_number: "3",skinwave_wave_mode_canvas_waves_padding: "1",skinwave_wave_mode_canvas_reflection_size: "0.25",skinwave_comments_playerid:"37205890",php_retriever:"https://www.paymentsjournal.com/wp-content/plugins/dzs-zoomsounds/soundcloudretriever.php" }; try{ dzsap_init(".ap_idx_83806_2",settings_ap37205890); }catch(err){ console.warn("cannot init player", err); } });

During the conversation, Capps and Sloane discussed the
differences between basic and sophisticated account takeover attacks, described
the commonalities of sophisticated attacks, and reviewed some relevant use
cases.

Basic versus
sophisticated account takeover attempts

Before explaining the difference between basic and
sophisticated account takeovers, Capps provided a stark warning: It’s safe to
assume that nearly every consumer in the United State has had their data stolen
in some way, shape, or form over the past five to ten years.

Sloane noted that it’s easy for criminals to buy and sell
the personally identifiable information (PII) of consumers on the dark web, a
fact made possible by the numerous data breaches occurring each year.

With vast amounts of PII floating around on the internet,
“it’s only a matter of time before that data is used to attempt to login to any
valid account,” said Capps.