Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 31 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

The Rise of the Machines: Cybercriminals are cashing in on their ‘Bot Army’ as attacks hit record high

by The Gurus
May 20, 2016
in Editor's News
Share on FacebookShare on Twitter

Cybercriminals are driving up fraud levels to a record high by creating substantial armies of automated cyber robots – otherwise known as Bots. ThreatMetrix, The Digital Identity Company, has today released its Q1 Cybercrime Report revealing that 311 million Bot attacks were detected and stopped over a 90 day period.
Although around for some time, Botnet attacks have become more complex, sophisticated and harder to predict than ever before. In many cases, they are mirroring the activity of normal consumers transacting online – be that banking or online shopping. Alongside the loud and fast hacks we are now used to hearing about in the news, The ThreatMetrix Network is now also seeing ‘low and slow attacks’ that are designed to evade any protection measures in place, and appear more like normal user traffic. This is making it ever-increasingly difficult for businesses to distinguish between real customers and cybercriminals and leading to millions, if not billions, of pounds of lost business in the UK.
The UK, alongside Germany and the US, remains one of the most attacked nations in the world.
How are these armies created?
When fraudsters get a new list of user credentials from the dark web, they launch a series of massive credential testing sessions that cause huge transaction spikes over a couple of days. Once a successful hit is made, those curated lists of known password and login combinations are taken to other sites to launch slower velocity attacks, which are harder to detect. A staggering 264 million attacks were detected specifically across e-commerce merchants in this last quarter alone putting online shoppers and retailers hugely at risk of a serious breach.
“These attacks are particularly hard to detect because they aren’t always picked up by traditional rate control measures. Our normal lines of defense just aren’t working. Businesses need a smarter approach that can differentiate between a human and a bot the moment they start to transact,” commented Vanita Pandey, vice president, strategy and product marketing at ThreatMetrix.
“Consumer data is everywhere. Fraudsters can create pitch-perfect attacks because they know so much about us. Businesses must become smarter at detecting the full spectrum of possible attacks, from huge automated identity testing sessions, to advanced social engineering attacks that hijack individual accounts. This starts with really understanding the digital identities of consumers so that high-risk behaviour can be detected in real-time.”
New Forms of Identity and Credential Testing
In addition to botnets testing the validity of stolen identities, The Network is seeing new ways to test credentials obtained through the dark web. Online businesses are inadvertently providing a perfect way for fraudsters to anonymously test stolen payment credentials, such as credit cards, before making a big ticket purchase.
Industries with low digital sophistication are easy targets. ThreatMetrix detected a series of £5 payments made with stolen credit cards targeting the charity sector.
Identity spoofing was also a strong attack vector in the FinTech space with fraudsters using cloaking technologies such as proxies or spoofed locations to mask their true identities and locations. This has given rise to an increase in fraudulent new loan applications.
“The challenge for digital businesses today is that cybercriminals are becoming so sophisticated at building convincing identities using a jigsaw of stolen credential pieces, it is becoming harder than ever to distinguish them from legitimate customers,” continued Pandey. “It is only by looking holistically at the context of the transaction, along with all the information we know about the user, that organisations have the power to stop fraudsters in their tracks.”    
Digital Identities, Powered by The Network
The ThreatMetrix Digital Identity Network analyses the myriad connections between a user’s devices, locations and anonymised personal information as they transact online. This builds a unique and trusted digital identity that fraudsters can’t fake. Leveraging the power of digital identities to establish trusted user behavior is the best way to authenticate user identity.
 
To learn more, download the “ThreatMetrix Cybercrime Report: Q1 2016” here.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

LinkedIn breach way bigger than expected – industry reaction

Next Post

7 modern security problems solved with Encrypted Traffic Management (ETM)

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information