spycloud.com
Open in
urlscan Pro
2606:4700::6812:1a6c
Public Scan
Submitted URL: https://go.spycloud.com/e3t/Ctc/RF+113/cs47Y04/VVrBlY7WnG-BW4wN3fn61VmZkW7gFL9V4GrSNvN5l4bkB3lLCyV1-WJV7CgzKkW6GWknh286C...
Effective URL: https://spycloud.com/4-ways-underground-data-helps-criminals-sneak-past-fraud-controls-and-what-you-can-do-about-it/?...
Submission: On March 11 via api from CH — Scanned from DE
Effective URL: https://spycloud.com/4-ways-underground-data-helps-criminals-sneak-past-fraud-controls-and-what-you-can-do-about-it/?...
Submission: On March 11 via api from CH — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* Sign in Check Your Exposure * Start Here * What We Offer * * * Use Cases * Enterprise Protection Prevent account takeover that can lead to ransomware * Consumer Protection Combat account takeover and online fraud * Investigations Unmask criminals attempting to harm your business * Data Partnerships Enhance your solution with SpyCloud’s data * * Industries * Financial Services * Ecommerce * Government * Telecom * * WHAT WE OFFER Account Takeover & Online Fraud Prevention powered by the world’s most actionable collection of Recaptured Data. * What is Recaptured Data? Learn More About Our Products * Company * Overview * Our Data * Our Customers * Our Team * News & Press * Events * Careers * Become A Partner * Become A Partner * Data Partners * Channel Partners * Resources * Blog * Case Studies * Research Reports * Webinars * Whitepapers * Legal & Privacy Center Get a Demo 4 WAYS UNDERGROUND DATA HELPS CRIMINALS SNEAK PAST FRAUD CONTROLS – AND WHAT YOU CAN DO ABOUT IT * January 14, 2022 * Julia Kisielius * Account Takeover, Credential Stuffing, Fraud Prevention, Malware, SpyCloud News, SpyCloud Products With an increase in online fraud threats, accelerated by consumers’ digital adoption during pandemic shutdowns, businesses need confidence that the users interacting with their websites are legitimate. Given the constantly-shifting nature of criminal activity, even the most sophisticated fraud prevention programs struggle to separate good users from bad actors, particularly when criminals use stolen data to sidestep traditional fraud prevention measures. Today, we’re expanding SpyCloud’s offerings with a new solution to help enterprises prevent criminals from using stolen data to create false identities and get away with fraud. SpyCloud Identity Risk Engine is a fraud prevention tool that draws on data from the criminal underground to assess user risk – something no other solution on the market can offer. It can be layered into an existing control framework to help fraud teams make more accurate decisions, enabling them to prevent more fraud and let more good business through uninterrupted. Identity Risk Engine delivers actionable analytics that help organizations: * * Predict fraud tied to malware – Detect when consumers have had their personal data stolen by malware, putting them at elevated risk of fraud * Detect synthetic identities – Spot irregularities in a user’s information suggesting that the identity has been stolen or created using persona data available to criminals * Anticipate account takeover – Identify warning signs that consumers are at high risk of account takeover, such as high rates of password reuse across their accounts Check out our video to learn more about how Identity Risk Engine helps enterprises stop hard-to-detect fraud. HOW SPYCLOUD IDENTITY RISK ENGINE CAN STRENGTHEN YOUR FRAUD CONTROL FRAMEWORK SpyCloud Identity Risk Engine can help enterprises make more confident fraud decisions for a variety of different scenarios. Here are just a few examples. SCENARIO #1: A SURGE OF NEW ACCOUNT ENROLLMENTS COME IN. HOW CAN YOU TELL WHICH ONES ARE LEGITIMATE? A common challenge we’ve heard from customers since the onset of the pandemic is understanding how to handle an influx of new account signups. While many of the new enrollments come from real users expanding the services they use online, many also come from cybercriminals. The problem is significant: one in every 11 new account creations is potentially fraudulent, according to Lexis Nexis. Fraudulent account creations are often difficult to detect because criminals enroll using legitimate data stolen from real users, typically combined into synthetic identities. The firehose of new registrations exacerbates the challenge of weeding out bad actors without slowing down the enrollment process for legitimate new users. Identity Risk Engine helps enterprises detect risky account creations by flagging when a new user’s information includes anomalies that suggest the identity has been stolen or constructed. Enterprises can call the API during the account creation process to support other identity verification processes such as Know Your Consumer (KYC). In addition to a score indicating the user’s risk level, Identity Risk Engine also returns reason codes that explain why the account has been flagged as suspicious. > One in every 11 new account creations is potentially fraudulent. SCENARIO #2: A CUSTOMER TRANSACTS VIA GUEST CHECKOUT. SHOULD YOU LET THE PURCHASE GO THROUGH? Guest checkout reduces friction for casual shoppers, but can provide limited information to support fraud decisions. Without an account to provide historical information, it can be difficult to determine how to proceed with the transaction. Fraud prevention controls can help, but typically offer limited protection if a bad actor has recycled stolen data that belongs to real users. Identity Risk Engine takes some of the guesswork out of evaluating guest checkout transactions by enriching the data available to your fraud team with insights drawn from recaptured underground data. SpyCloud distills billions of data points into a clear risk signal by correlating identity information and analyzing factors such as the recency and scope of previous exposures, password hygiene, evidence the user’s data has been collected by malware, and other key risk indicators. With the risk score and reason codes SpyCloud delivers, you can make a confident decision about whether to let the order go through, prompt the user for additional identity verification, or reject the transaction. Using recaptured underground data to assess fraud risk can help you not only reduce fraud, but also reduce manual review rates. One retailer in the beta for this product found that they could have avoided manual review for 76% of the orders they tested with Identity Risk Engine. > “We could have avoided manual review for 76% of the orders we tested with > Identity Risk Engine.” > > – Large Retailer SCENARIO #3: SOME OF YOUR CUSTOMERS UNKNOWINGLY USE DEVICES INFECTED WITH MALWARE. HOW CAN YOU PREVENT CRIMINALS FROM USING THEIR DATA FOR FRAUD? It’s a silent threat: a user logs in with their usual browser, location, and credentials, or perhaps even a stored cookie. No alarms are raised and nothing seems amiss – until weeks later, when the real account holder issues a chargeback or reports other fraudulent activity. After the fact, the fraud team may or may not discover that the reason the fraudulent transaction slipped past their defenses was because the original user’s data had been siphoned by malware and was used to steal their accounts and identity. Data collected by credential-stealing malware makes it easier for criminals to bypass anti-fraud measures. Each consumer whose data has been collected by malware is at significant risk of account takeover, identity theft, and other forms of online fraud. Unlike any product on the market, Identity Risk Engine can identify high-risk users ahead of time, helping to prevent fraud losses tied to malware infections. Across the customer beta tests we performed during this product’s development, Identity Risk Engine revealed that about 1% of tested consumer accounts had been affected by malware. By identifying that criminals have access to customers’ browser fingerprints, exact credentials, and sensitive information, you can proactively flag their account or take action before ATO and fraud can occur. > According to our customer beta tests, Identity Risk Engine revealed that about > 1% of tested consumer accounts had been affected by malware. SCENARIO #4: AN EXISTING ACCOUNT HOLDER LOGS IN AND CHANGES THEIR ADDRESS. DID THEY MOVE, OR WAS THEIR ACCOUNT TAKEN OVER? Account takeover represents a huge problem for enterprises, and a lucrative opportunity for criminals. Last year alone, SpyCloud recaptured 1.7 billion credentials from the criminal underground, and 70 percent of users with more than one password in our database had reused them. Criminals test these passwords against online accounts, which they use to drain funds, steal loyalty points, make fraudulent purchases, resell, and monetize in any other way they can think of. For years, SpyCloud has been a leader in account takeover prevention because we enable enterprises to detect and reset compromised credentials – but with the addition of Identity Risk Engine, fraud teams can enrich their risk models with enough new information to tailor the customer journey based on individual user risk. Understanding users’ exposure on the criminal underground can not only help enterprises take action to protect vulnerable accounts, but also avoid unnecessary friction for customers who are at exceptionally low risk. Exposure type, severity, and timing can all influence the user’s risk. For example, if a user’s password has appeared in a combolist, it means their credentials are circulating widely in a format that’s easy for unsophisticated criminals to use in automated attacks. Their account is likely to be hit with credential stuffing attacks. In contrast, a user whose credentials have recently appeared in a fresh third-party breach is at higher risk of targeted account takeover attacks, which can include creative, manual efforts by an attacker. (According to SpyCloud customers, targeted attacks represent just 10 percent of account takeover attempts and account for 80 percent of losses.) In either case, the user’s own password history is a critical factor. If the user has a high rate of password reuse across their other exposed logins (including passwords associated with their other email addresses), there’s a good chance those attacks will be successful at some point. It may be valuable to take an additional step to verify that the user is legitimate and not a threat actor, such as triggering multi-factor authentication or making them re-enter their stored credit card number. On the other hand, strong password hygiene across other accounts means that criminals most likely don’t have the tools to steal this user’s account. In this case, you can let the user proceed with their account update without disrupting the customer journey. > “I would include Identity Risk Engine anywhere immediately after inputting an > email address. If we executed SpyCloud prior to some of the other checks that > didn’t catch this activity, you become a cost-saver because those other steps > are usually more expensive.” > > – Financial Services Institution HOW IT WORKS SpyCloud Identity Risk Engine analyzes billions of data points and distills what’s important into summarized statistical elements you can use to drive action for your application. It can serve as a complement to your existing solutions, with the flexibility to be layered into a customer journey at high risk points of your choice (account creation, transaction, etc.). By querying the Identity Risk Engine API with as little as an email address or phone number, you’ll have access to a risk score and 20 reason codes – analytical elements that provide context for the risk score – both of which can help your organization make better fraud decisions and protect your bottom line from fraud. > To learn more about how SpyCloud Identity Risk Engine can help limit fraud and > customer friction, schedule a demo today. RECENT POSTS * TOP 5 TAKEAWAYS FROM SPYCLOUD’S ANNUAL IDENTITY EXPOSURE REPORT March 2, 2022 * THREE’S A CROWD: BREAKING DOWN TRIANGULATION FRAUD February 17, 2022 * BALANCING ACT: TACKLING THE TOP ECOMMERCE FRAUD CHALLENGES February 10, 2022 * PUTTING BREACH DATA TO WORK IN FRAUD PREVENTION November 29, 2021 * RISKY BUSINESS: WHY A STRONG SECURITY CULTURE SHOULD BE A TOP PRIORITY FOR ALL BOSSES November 11, 2021 SUBSCRIBE * January 14, 2022 * Julia Kisielius * Account Takeover, Credential Stuffing, Fraud Prevention, Malware, SpyCloud News, SpyCloud Products Transforming recaptured data to protect your business. Get a Demo INDUSTRIES * Financial Services * Ecommerce * Government * Telecommunications * Cryptocurrency Exchanges * Cyber Insurance * MSSPs & MDR Providers PRODUCTS * Employee ATO Prevention * Active Directory Guardian * VIP Guardian * Third Party Insight * Consumer ATO Prevention * Session Identity Protection * Identity Risk Engine * Fraud Investigations * Integrations * Data Partnerships RESOURCES * What is Account Takeover? * Blog * Case Studies * Research Reports * Webinars * Whitepapers COMPANY * Why SpyCloud * Our Customers * Our Team * News & Press * Events * Careers * Contact * * * * SpyCloud Inc. 2130 S Congress Ave Austin, Texas 78704 Call: 1-800-513-2502 ©2022 SpyCloud Inc. All Rights Reserved Terms | Privacy | Cookies Read our reviews on G2 We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept & Close,” you consent to the use of all the cookies. Cookie settings ACCEPT & CLOSE Manage consent Close PRIVACY OVERVIEW SpyCloud uses cookies and similar technologies to ensure the functionality of our site, recognize repeat visits and preferences, and measure the effectiveness of our campaigns and site content. Cookies that are not required for the site to function a... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Marketing marketing We use analytics data to make site improvements that positively affect our customer's online experience. Non Necessary non-necessary Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website. Save & Accept * Start Here * What We Offer ▼ * Use Cases ▼ * Enterprise Protection Prevent account takeover that can lead to ransomware * Consumer Protection Combat account takeover and online fraud * Investigations Unmask criminals attempting to harm your business * Data Partnerships Enhance your solution with SpyCloud’s data * Industries ▼ * Financial Services * Ecommerce * Government * Telecom * Company ▼ * Overview * Our Data * Our Customers * Our Team * News & Press * Events * Careers * Become A Partner ▼ * Become A Partner * Data Partners * Channel Partners * Resources ▼ * Blog * Case Studies * Research Reports * Webinars * Whitepapers * Legal & Privacy Center Check Your Exposure Get a Demo Sign In