May 7, 2018 By Shane Schick 2 min read

According to the latest cybercrime statistics, more than 210 million attempted fraud attacks occurred during the first quarter of this year, representing a 62 percent increase from 2017.

In its “Q1 2018 Cybercrime Report,” ThreatMetrix reported a record volume of 1 billion bot attacks, 100 million of which came from mobile device users. These campaigns primarily targeted e-commerce merchants. In fact, the report suggested that e-commerce transactions are 10 times riskier than those in a more traditional financial services setting.

Cybercrime Statistics Indicate Increasing Sophistication of Fraud Attacks

The rising use of bots may reflect the increasing sophistication of attacks involving fraudulent online payments and the creation of phony new accounts, according to ThreatMetrix. For example, there were 150 million rejected transactions over the course the quarter, representing an 88 percent increase over the same period a year ago. Bots are being used to launch account validation attacks, test passwords on good user accounts and more.

The report noted that cybercriminals are also evolving in terms of the frequency, complexity and duration of attacks. In some cases, high-volume attacks are being conducted over sustained periods of days or even weeks, as opposed to the shorter, more isolated incidents that have been detected in the past.

The authors admitted, however, that there are still unanswered questions about attack volumes since some victims may be slow to discover, contain and report breaches.

E-Commerce Fraud: A Global Threat

It’s no wonder that cybercriminals are focusing on e-commerce, the study noted, given that merchants are trying to strike the right balance between providing a streamlined user experience and protecting customers’ information. The report revealed that payment attacks represented only 3.6 percent of incidents. Incidents occurring during the login and account creation stages, meanwhile, accounted for 13.5 and 32.8 percent of attacks, respectively.

While the U.S., U.K. and other large European countries have traditionally been the top regions in terms of attack origins, ThreatMetrix reported an increase in activity from smaller growth economies, such as Russia and Vietnam. In other words, as the world becomes more digital, the work of cybercriminals and bots is becoming equally global in scope.

More from

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

IBM identifies zero-day vulnerability in Zyxel NAS devices

12 min read - While investigating CVE-2023-27992, a vulnerability affecting Zyxel network-attached storage (NAS) devices, the IBM X-Force uncovered two new flaws, which when used together, allow for pre-authenticated remote code execution. Zyxel NAS devices are typically used by consumers as cloud storage devices for homes or small to medium-sized businesses. When used together, the flaws X-Force discovered allow a remote attacker to execute arbitrary code on the device with superuser permissions and without requiring any credentials. This results in complete control over the…

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists…

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today