Cloud

6/21/2018
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Report Shows Fraud on the Rise with Sharp Growth in US-Based Activity

DataVisor reports 900 million malicious activities and transactions in Q1 2018.

MOUNTAIN VIEW, CA -- (June 20, 2018) - DataVisor, the leading provider of fraud detection solutions using unsupervised machine learning, today released its DataVisor Fraud Index Report for Q1 2018, providing the latest insights into trends in global fraud activity and attack techniques. Last quarter, DataVisor uncovered a total of 900 million malicious activities and transactions. The report reveals dramatic growth in fraud infrastructure, with fraudulent accounts growing by 50 percent from Q4 2017 to Q1 2018.

North America Emerges as a Leading Source of Financial Crime

The proportion of fraud originating from North America doubled since the previous quarter. The United States in particular hosts more than 51 percent of fake accounts targeting online and financial services in North America and Europe, dwarfing countries in Southeast Asia and Eastern Europe that have historically been hotspots for fraud.

Bad Actors Continue to Migrate to the Cloud

Fraudsters are taking advantage of cloud service infrastructure, such as virtual servers and anonymous proxies, which allow them to easily orchestrate attacks at scale and hide behind legitimate networks. Approximately 27 percent of accounts associated with cloud service provider IP ranges appear to be fraudulent, with some data centers having more than 90 percent fraudulent activity.

Fraudsters Step up Device Spoofing to Evade Detection

Fraudsters are getting better at mimicking legitimate user activities, including using device platforms popular among real users. 28 percent of fraudulent accounts originated from Mac OS X devices this quarter, representing a 4-fold increase over last quarter. As Mac OS is associated with fewer fraud activities in the past, fraudsters are likely spoofing their user agent strings to avoid detection.

“Our research shows that fraudsters are not only scaling up their attacks, but also becoming more sophisticated,” said Ting-Fang Yen, director of research at DataVisor. “Fraudsters are evolving quickly and using the latest technologies to evade detection -- an example is the widespread practice of device and OS spoofing. Solutions that automatically adapt to ever-changing attacks will be critical for businesses looking to protect themselves against fraud and abuse.”

The DataVisor Fraud Index Report for Q1 2018 is based on attacks detected by the DataVisor UML Engine between January and March of 2018 from analyzing 40 billion application-level events and 680 million user accounts across some of the largest internet properties and financial services in the world.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19279
PUBLISHED: 2018-11-14
PRIMX ZoneCentral before 6.1.2236 on Windows sometimes leaks the plaintext of NTFS files. On non-SSD devices, this is limited to a 5-second window and file sizes less than 600 bytes. The effect on SSD devices may be greater.
CVE-2018-19280
PUBLISHED: 2018-11-14
Centreon 3.4.x has XSS via the resource name or macro expression of a poller macro.
CVE-2018-19281
PUBLISHED: 2018-11-14
Centreon 3.4.x allows SNMP trap SQL Injection.
CVE-2018-17960
PUBLISHED: 2018-11-14
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
CVE-2018-19278
PUBLISHED: 2018-11-14
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed lengt...