October 30, 2015 By Douglas Bonderud 3 min read

Worried about online fraud? Retailers and consumers both share this concern — and for good reason: According to CSO Online, reporting on a new ThreatMetrix study of Q4 2014 and Q1 2015, fraudulent login attempts reached 25 million per month. What’s more, the security firm says these only include “definitely illegitimate” transactions and warned the numbers were “actually undercounting the problem.” How can companies prepare for the online onslaught coming in the next few quarters as cybercriminals go for broke?

New Avenues for Online Fraud

While retail-based online fraud has focused on lifting credit card and personal data to make fraudulent purchases, cybercriminals are now targeting government websites to grab high-value, long-life-cycle information. Consider the IRS hack early this year, which saw the agency’s Get Transcript function compromised.

Once attackers had victims’ personal data — such as Social Security numbers, marital status and dates of birth — it was possible to file fraudulent tax returns and cause havoc for citizens trying to discharge their yearly financial obligations. But this is just the beginning; the kind of immutable data captured by malicious actors lets them cause harm to victims not only at the point of contact, but also over months and years in the form of fraudulent credit card accounts or spurious government filings.

Data breaches aren’t the only thing driving increased online fraud. As noted by Forbes, the upcoming switch to EMV credit card standards in the U.S. may cause more problems than it solves. New standards require merchants to support chip-and-pin approval rather than swipe-and-sign cards in an effort to reduce the chance of point-of-sale (POS) fraud. The move comes with significant consequences because if retailers don’t comply, they’re on the hook for any fraudulent transactions.

Securing physical terminals, however, could lead to collateral damage. A report by Trustev warns that online fraud in the U.S. could rise by more than 100 percent over the next three years. Why? Because for fraudsters already seeing success with fake logins and false accounts, the promise of card-not-present transactions is attractive since criminals only need card numbers, and not all online merchants employ the same level of data security.

Broad Spectrum

While some industries are more vulnerable — media, finance and e-commerce, for example — other enterprises may be at risk if employees have used company email addresses to access online services that have been compromised. The short answer here? Everyone is vulnerable, and attackers are going for broke as they find new ways to access payment details and create fraudulent accounts.

So how can companies stay safe through the rest of 2015 and into 2016? The first step is deploying reliable identification systems. These help reduce the number of false positives from the use of technologies like virtual private networks (VPNs), which often mimic the telltale signature of IP spoofing and other techniques. Two-factor authentication is also critical since it allows companies to significantly reduce the chance of fake login attempts, especially on mobile devices.

Learn why global threat intelligence is more important than ever in the fight against web fraud

The biggest favor companies can do for their bottom line, however, is understanding the basic nature of attackers: The easier the avenue, the greater the allure. Systems that permit overly simple account creation, don’t provide multiple identity verification steps and allow easy card-not-present transactions are magnets for malicious actors looking for low-hanging fruit. While recent retail data breaches have only added fodder to the fire and have many fraudsters going for broke as the online market expands, companies that take even small steps toward better identity protection will drive off all but the most determined cybercriminals.

Online fraud is a growing market. Expect 2016 to be a banner year for Internet thieves. But there’s still hope: By tapping the growing identity security and fraud prevention markets, it’s possible to limit the chance of becoming just one more of the 25 million.

More from Fraud Protection

What’s up India? PixPirate is back and spreading via WhatsApp

8 min read - This blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this content. PixPirate malware consists of two components: a downloader application and a droppee application, and both are custom-made and operated by the same fraudster group. Although the traditional role of a downloader is to install the droppee on the victim device, with PixPirate, the downloader also…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today