This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Coffee giant Dunkin’ fell victim to a credential stuffing attack in October 2018, and the fraudsters who initiated the scheme were soon after selling users’ loyalty credits on dark web marketplaces for a fraction of their values. Rewards points are also valuable as bad actors can either spend them or sell them on dark web marketplaces.
“A similarly damaging trend is accounttakeovers (ATOs) where a bad actor gains access and takes over an online accountusing stolen or hacked credentials. We’ve always seen RDC attacks, but they’ve popped up more regularly this year and I suspect it’s just the tip of the iceberg.
This new vigilance is the result of rampant cybertheft throughout the pandemic, from brazenly diverting government Paycheck Protection Program loans to the bad businesses of credential theft and accounttakeovers. Much of this is caused by criminals sensing opportunity. It’s on banks to deter them.
Built on the company’s Document Verification (DocV) solution, Selfie Reverification also detects signs of deepfaking, and readily identifies age discrepancies between the photo and the credential. Credential stuffing is a common attack in part because it takes advantage of the tendency of individuals to reuse usernames and passwords.
The fallout hits everyone involved via a fraudulent transaction, and, as the data shows, accounttakeovers are on the rise. Zekri said the “trust anchor” can carry extra weight through a government-issued credential “that has in it, and encompasses, the complete verification process that went into that credential.”
A BEC attack is when a fraudster gains unauthorized access to a business’s account. The most damaging form of BEC is accounttakeover (ATO) attacks. One usecase of BEC is when fraudsters use compromised data to trick staff into providing further information, such as their bank details or company secrets.
And in Asia especially, amid the battle of the super-apps, the goal is to drive as much activity through those apps and mobile wallets as possible, through QR payments in shops, lending, ride-hailing and food delivery (to name just a few usecases). For the firms that get it right, the opportunity within APAC is significant.
Yet it’s also a process that’s built around checking an individual’s credentials against various static data sources to confirm that person is who they claim to be and are not on any kind of watch list. Boku, through Boku Identity, authenticates consumers using a device that is an intrinsic enabler of the trust: the mobile phone.
By using thousands of real-time device signals, from geolocation and IP information to behavioral data such as battery life, phone orientation and font count, suspicious setups and settings across desktop and mobile devices can be flagged and blocked.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content