{"id":35831,"date":"2020-06-09T03:36:26","date_gmt":"2020-06-09T07:36:26","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=35831"},"modified":"2021-07-27T08:29:10","modified_gmt":"2021-07-27T12:29:10","slug":"cyber-fraud-prevention","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cyber-fraud-prevention\/35831\/","title":{"rendered":"What&#8217;s changing in cyberfraud and how to keep your business safe"},"content":{"rendered":"<p>Today, ecommerce is a basic need. Customers expect speed and convenience, and the 2020 coronavirus lockdowns have only accelerated that demand. Swimming in that tide that raises all boats, Kaspersky\u2019s fraud prevention: 2019 report notes a growing number of sharks. One in 50 online financial and ecommerce sessions worldwide are conducted by cybercriminals.<\/p>\n<blockquote><p>As fast as online service technology evolves, fraudsters find loopholes. We\u2019re at a crucial point of change in combatting new hacking tools and fraud schemes.<\/p><\/blockquote>\n<p>So what\u2019s changed, and what\u2019s changing?<\/p>\n<h2>Bots fake loyalty<\/h2>\n<p>Ecommerce customers often receive bonuses as part of loyalty programs, such as for registering, giving reviews and referring friends. With bots, fraudsters create numerous fake accounts and receive bonuses just as real users do. The fraudster then uses the bonuses to buy goods at a big discount for resale.<\/p>\n<h2>Bots are taking the best seats<\/h2>\n<p>Research by Distil Networks estimates some <a href=\"https:\/\/www.fastcompany.com\/90314213\/bts-ticketmaster-fail-maybe-blame-the-ticket-bots\" target=\"_blank\" rel=\"noopener nofollow\">40 percent of traffic to ticket sales sites comes from bots<\/a>. Fraudsters buy gig, show and sports event tickets with bots, reselling on social media, peer-to-peer sites or ticket resale sites when the event is sold out. This means fans are finding it harder to get tickets and end up paying more.<\/p>\n<h2>Crawlers are copying prices and photos<\/h2>\n<p>Cyberfraudsters also use web crawler bots (used legitimately by search engines to give accurate results to search queries) to \u201ccrawl\u201d ecommerce competitor websites, recording pricing and making theirs more competitive. They may also steal unique content like images and product descriptions to use on their website, damaging the search rankings of the original website because <a href=\"https:\/\/support.google.com\/webmasters\/answer\/66359?hl=en\" target=\"_blank\" rel=\"noopener nofollow\">search engines penalize sites with duplicate content<\/a>.<\/p>\n<h2>Bots are getting more like us<\/h2>\n<p>In 2019 a new generation of \u201chuman bots\u201d emerged, designed to mimic human behavior impeccably. Previously, bots moved around web pages in repetitive and simple navigation patterns. The new-generation \u201chuman bots\u201d do things humans do, like shake the mouse and make rapid movements.<\/p>\n<p>This new human-like behavior is a problem for anti-fraud systems. So far, many have relied on these human foibles to tell bot from human.<\/p>\n<h2>How fraudsters manipulate<\/h2>\n<p>The easiest way for fraudsters to attack online businesses is through customers. They use manipulative strategies known as <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-social-engineering\" target=\"_blank\" rel=\"noopener nofollow\">social engineering<\/a>. They either scare people or earn their trust to get credentials like logins and passwords, and other personal information.<br>\n<img decoding=\"async\" class=\"aligncenter size-large wp-image-35833\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/06\/09031702\/114_fraud_prevention_report_inline-1-1024x768.jpg\" alt=\"cyber fraud prevention\" width=\"1024\" height=\"768\"><br>\nImagine you get a call from someone saying they\u2019re with the security department of an ecommerce site you visit. They say someone has tried to buy a high-value item with your credit card and that to stop the transaction, you must download an authentication app.<\/p>\n<blockquote><p>It\u2019s a fraudster, of course. The app grants remote access, mirroring the screen of your device and letting the fraudster steal personal information like your full name, address or social security number.<\/p><\/blockquote>\n<p>They then <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/dark-web-monitoring\/29084\/\" target=\"_blank\" rel=\"noopener nofollow\">sell your personal information on the dark web<\/a>, opening doors to all kinds of fraud, like using your name and bank account to apply for loans.<\/p>\n<p>Remote access tools (RATs,) used legitimately by IT support teams in many organizations to access your computer screen to resolve issues, are a powerful tool for fraud in the wrong hands. Fraudsters often target accountants because they work with payment orders. The fraudster accesses the victim\u2019s screen without their knowing and substitutes bank details for their own.<\/p>\n<p>You may recognize the methods employed in these growing attacks. Some are not new. Here are three emerging cyberfraud trends.<\/p>\n<h2>Trend 1: Fraud as a service<\/h2>\n<p>Cybercrime is an easy way to make money without leaving home. This has led to rapid growth in \u2018fraud as a service (FaaS.)\u2019 FaaS makes internet fraud less challenging for newcomers, and so increases the number of people involved.<\/p>\n<blockquote><p>On dark web forums, illegal websites or social media, anyone can buy a set of hacking tools and a leaked customer database, then pay for training on how to make illegal money.<\/p><\/blockquote>\n<p>Costs range from just 5 US dollars for stolen credit card data, to thousands of dollars for extensive fraud execution courses. The market is booming. Underground digital markets sell bots, digital fingerprints for remotely accessing devices and anonymizer tools that make internet activity untraceable.<\/p>\n<h2>Trend 2: Resale of bank account access<\/h2>\n<p>Cybercriminals often target small- to medium-sized businesses (SMBs) in finance who\u2019ve been acquired by large players, while they adjust their security to meet the buyer\u2019s requirements. Kaspersky found, by <a href=\"https:\/\/securelist.com\/ksb-2019\/\" target=\"_blank\" rel=\"noopener\">analyzing dark web forums and chats<\/a>, criminal groups target these smaller organizations, then resell access to both organizations\u2019 internal networks. They predict an increase in this kind of activity, especially in Africa, Asia and Eastern Europe.<\/p>\n<h2>Trend 3: Data leaks and deepfakes<\/h2>\n<p>We all love convenient and quick purchases like <a href=\"https:\/\/knowledge.wharton.upenn.edu\/article\/amazons-1-click-goes-off-patent\/\" target=\"_blank\" rel=\"noopener nofollow\">Amazon\u2019s 1-click ordering<\/a>, despite that these methods usually mean saving and sharing more of our personal information. Yet, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/decade-data-breaches\/28994\/\" target=\"_blank\" rel=\"noopener nofollow\">a month can\u2019t pass without a high-profile data breach<\/a> from a bank, online store or telecommunications company. Sometimes <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/body-recognition-privacy\/28958\/\" target=\"_blank\" rel=\"noopener nofollow\">sensitive personal customer data is exposed, such as biometrics<\/a>.<\/p>\n<p>We\u2019re also seeing the rise of impersonation methods where one person\u2019s image is replaced with another, using advanced audio, photo and video editing, known as <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/deepfakes-2019\/28954\/\" target=\"_blank\" rel=\"noopener nofollow\">deepfakes<\/a>. <a href=\"https:\/\/www.forbes.com\/sites\/jessedamiani\/2019\/09\/03\/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000\/#7ce7d35d2241\" target=\"_blank\" rel=\"noopener nofollow\">Fraudsters have already used deepfake voice imitation and social engineering to impersonate a CEO successfully<\/a>.<\/p>\n<h2>The best ways to protect your business from today\u2019s fraudsters<\/h2>\n<p>These six steps will help your business put in place the strong front against cyberfraud.<\/p>\n<h3>1.\u00a0\u00a0\u00a0 Assess risks<\/h3>\n<p>With growth, or any kind of change in business, comes the possibility of new risks of fraudulent activities. Make sure identifying opportunities for fraud is part of your risk assessment activity.<\/p>\n<h3>2.\u00a0\u00a0\u00a0 Review product design<\/h3>\n<p>Look at the design of your digital services and loyalty program from a fraudster\u2019s point of view. Try to find \u2018loopholes\u2019 they could exploit.<\/p>\n<h3>3.\u00a0\u00a0\u00a0 Use a fraud detection and prevention system<\/h3>\n<p>These systems may, for example, analyze online sessions, monitor transactions and analyze payment behavior. They help avoid the financial, reputational and legal consequences of fraud and cut operational costs, such as support team time.<\/p>\n<h3>4.\u00a0\u00a0\u00a0 Strengthen your security<\/h3>\n<p>Put detection and protection measures in place, such as using a <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/firewall\" target=\"_blank\" rel=\"noopener nofollow\">web application firewall (WAF)<\/a> to protect against bots and a <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/ddos-attacks\" target=\"_blank\" rel=\"noopener nofollow\">solution to protect against Distributed Denial-of-Service (DDoS) attacks<\/a>.<\/p>\n<h3>5.\u00a0\u00a0\u00a0 Strengthen your team<\/h3>\n<p>Make sure your employees understand how fraud happens and how to combat it by including cyberfraud in your <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/security-awareness-business-2019\/29183\/\" target=\"_blank\" rel=\"noopener nofollow\">cyberawareness training program<\/a>.<\/p>\n<h3>6.\u00a0\u00a0\u00a0 Record fraud<\/h3>\n<p>Measure what your business is losing through fraud regularly. Include direct loss, indirect loss and the impact on your brand reputation.<\/p>\n<p>If fraud hits your business, hire a fraud expert team to support you through and help you combat future incidents.<\/p>\n<p>By taking these steps, you can reduce the risk of cyber fraud affecting your business and make the most of the opportunities the rise of ecommerce brings.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As fast as ecommerce technology evolves, fraudsters find loopholes and new fraud schemes. What\u2019s changing in cyberfraud, and what can your business do to prevent it?<\/p>\n","protected":false},"author":2553,"featured_media":35832,"template":"","coauthors":[3631],"class_list":{"0":"post-35831","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-data-and-privacy","7":"emagazine-category-safer-business","8":"emagazine-category-trends","9":"emagazine-tag-bots","10":"emagazine-tag-data-security","11":"emagazine-tag-fraud","12":"emagazine-tag-predictions","13":"emagazine-tag-retail"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cyber-fraud-prevention\/35831\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/cyber-fraud-prevention\/22606\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/35831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2553"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/35832"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=35831"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=35831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}