Cloud

6/21/2018
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Report Shows Fraud on the Rise with Sharp Growth in US-Based Activity

DataVisor reports 900 million malicious activities and transactions in Q1 2018.

MOUNTAIN VIEW, CA -- (June 20, 2018) - DataVisor, the leading provider of fraud detection solutions using unsupervised machine learning, today released its DataVisor Fraud Index Report for Q1 2018, providing the latest insights into trends in global fraud activity and attack techniques. Last quarter, DataVisor uncovered a total of 900 million malicious activities and transactions. The report reveals dramatic growth in fraud infrastructure, with fraudulent accounts growing by 50 percent from Q4 2017 to Q1 2018.

North America Emerges as a Leading Source of Financial Crime

The proportion of fraud originating from North America doubled since the previous quarter. The United States in particular hosts more than 51 percent of fake accounts targeting online and financial services in North America and Europe, dwarfing countries in Southeast Asia and Eastern Europe that have historically been hotspots for fraud.

Bad Actors Continue to Migrate to the Cloud

Fraudsters are taking advantage of cloud service infrastructure, such as virtual servers and anonymous proxies, which allow them to easily orchestrate attacks at scale and hide behind legitimate networks. Approximately 27 percent of accounts associated with cloud service provider IP ranges appear to be fraudulent, with some data centers having more than 90 percent fraudulent activity.

Fraudsters Step up Device Spoofing to Evade Detection

Fraudsters are getting better at mimicking legitimate user activities, including using device platforms popular among real users. 28 percent of fraudulent accounts originated from Mac OS X devices this quarter, representing a 4-fold increase over last quarter. As Mac OS is associated with fewer fraud activities in the past, fraudsters are likely spoofing their user agent strings to avoid detection.

“Our research shows that fraudsters are not only scaling up their attacks, but also becoming more sophisticated,” said Ting-Fang Yen, director of research at DataVisor. “Fraudsters are evolving quickly and using the latest technologies to evade detection -- an example is the widespread practice of device and OS spoofing. Solutions that automatically adapt to ever-changing attacks will be critical for businesses looking to protect themselves against fraud and abuse.”

The DataVisor Fraud Index Report for Q1 2018 is based on attacks detected by the DataVisor UML Engine between January and March of 2018 from analyzing 40 billion application-level events and 680 million user accounts across some of the largest internet properties and financial services in the world.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14373
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. In TIFFFindField in tif_dirinfo.c, the structure tif is being dereferenced without first checking that the structure is not empty and has the requested fields (tif_foundfield). In the call sequences following from the affected library functions (TIFFVGetFiel...
CVE-2018-14374
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an empty fmt argument to unixErrorHandler in tif_unix.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFClientOpen, TIFFFdOpen, TIFFRawStripSize, TIFFCheckTile, TIFFComputeStrip,...
CVE-2018-14375
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow vulnerability can occur via an invalid or empty tif argument to TIFFRGBAImageOK in tif_getimage.c, and it can be exploited (at a minimum) via the following high-level library API functions: TIFFReadRGBAImage, TIFFRGBAImageOK, and TIFFRGBAIm...
CVE-2018-14378
PUBLISHED: 2018-07-17
An issue was discovered in LibTIFF 4.0.9. A buffer overflow can occur via an invalid or empty tif argument to TIFFWriteBufferSetup in tif_write.c, and it can be exploited (at a minimum) via the following high-level library API function: TIFFWriteTile.
CVE-2018-14363
PUBLISHED: 2018-07-17
An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.