14
www.securedtouch.com |1 BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD PREVENTION www.securedtouch.com 2020 | WHITEPAPER 1

BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

www.securedtouch.com | 1

BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD PREVENTION

www.securedtouch.com

2020 | WHITEPAPER

1

Page 2: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

TABLE OF CONTENTS

2

STRIKING A BALANCE BETWEEN USER EXPERIENCE AND FRAUD DETECTION………….

WHAT IS BEHAVIORAL DATA AND WHY DOES IT MATTER?....................................................

BEHAVIORAL DATA BOOSTS FRAUD DETECTION.........................................................................

BOT DETECTION.............................................................................................................................................

ACCOUNT TAKEOVER...............................................................................................................................

NEW ACCOUNT FRAUD.............................................................................................................................

EMULATOR DETECTION............................................................................................................................

THE ADDED VALUE OF BEHAVIORAL DATA.......................................................................................

BEHAVIORAL DATA IS CORE IN THE FIGHT AGAINST FRAUD.................................................

4

6

6

8

10

11

12

13

3

Page 3: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

STRIKING A BALANCE BETWEEN USER EXPERIENCE AND FRAUD DETECTION

STRIKING A BALANCE BETWEEN USER EXPERIENCE AND FRAUD DETECTION

3

Across the globe, fraud and payments teams share the same pains. Why? Their tools

share the same shortcomings in one way or another. They either forego strong fraud

detection for a smoother user experience, implement it at the later stages of the

customer journey to reduce the impact on user experience, or to save on fraud ops

related costs. The ramifications of this choice can sometimes be difficult to quantify.

Yet, there is no doubt that late detection of suspicious transactions and undetected

fraud continues to overburden internal resources and chargeback related costs. It is a

tough pill to swallow but the alternative choice creates friction for users, which leads

to angry customers and lost sales.

It’s not all doom and gloom.

The development of Behavioral Biometrics offers a solution that can strike a balance

between friction and security. Behavioral data – the data used in Behavioral

Biometrics technology - represents users’ innate behavioral interactions with

websites, applications, devices and more. It is a powerful data source that excels at

rooting out fraudsters. In this whitepaper, we will take a deep dive into the WHAT,

HOW and WHY of behavioral data, and the ways it is helping businesses combat fraud

while providing a better user experience.

Page 4: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

WHAT IS BEHAVIORAL DATA AND WHY DOES IT MATTER?

When a user interacts with a device or application, they do so in a way that represents

‘normal’ human behaviors. Throughout any session, every interaction, e.g. swipe,

mouse click, generates information that can be represented by a data set. This is

behavioral data. What’s interesting about this data is that up until now, it has been

ignored. It’s a rich source that can provide unique insights into behavioral patterns.

Behavioral data provides a new perspective on fraud by identifying the user’s intent,

thereby helping fraud fighters accurately distinguish between fraudsters and

legitimate users. Fraudsters have distinct behavioral patterns; bots and emulators

present distinct behaviors. Their intent here, behind the activity, is the key.

Let’s put it into context. Fraud solutions that are popularly used in eCommerce sit

almost exclusively on the payment stage of the customer journey. The data used to

approve a transaction is static and compared to historical data in order to make a

decision (see image 1). This is a siloed approach that gives limited visibility into the

legitimacy of the user. What’s missing here is all the behaviors and interactions that

have taken place since the beginning of the session, there is a gap. And this gap is

what fraudsters are exploiting. Moreso, there are even opportunities now for

fraudsters to monetize their attacks without the need to complete a typical

transaction.

WHAT IS BEHAVIORAL DATA AND WHY DOES IT MATTER?

4

The key to fraud detection is identifying user intent

Page 5: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

WHAT IS BEHAVIORAL DATA AND WHY DOES IT MATTER?

Behavioral Biometrics uses machine learning in order to adapt and learn from the

moment a user session begins. This is its key differentiator. It provides a holistic view

of the entire customer journey flagging suspicious activities earlier before any

damage can be done. In the case of bots and emulators in particular, this allows for

much more rapid and efficient detection. In order to detect manual fraud, nuanced

behavioral anomalies are flagged. The depth of behavioral data that Behavioral

Biometrics uses provides a level of visibility into users’ actions that is far more

granular than has been used before. This is how we can recognise user intent.

In order to turn this abstract idea into something more concrete, we are going to

apply this to the problems you face on a regular basis. We will extract key behavioral

data that allows us to close these gaps.

zip code CVV

IP address

Image 1: Examples of Static Data Currently Being Used

5

Page 6: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

BEHAVIORAL DATA BOOSTS FRAUD DETECTION

BEHAVIORAL DATA BOOSTS FRAUD DETECTION

6

BOT DETECTIONWe are all familiar with bots; legitimate tools used to

automated actions at scale, quickly and efficiently -

exactly why they are a popular tool used by fraudsters.

Yes, there are good bots, but for the purpose of this

whitepaper we will focus on the bad ones. They are used

to commit various types of attacks against merchants:

DDoS, credential stuffing, price scraping attacks and

more. We will explore specific examples further on.

Current bot detection solutions focus on data sources like device attributes and

velocity checks, which offer limited scope and their detection range is limited to

known bots (bad or good). This makes them ineffective at catching newer or more

sophisticated bots. To make matters more challenging, bots are becoming

sophisticated enough at mimicking human behaviors to bypass popular bot detection

systems like Google reCAPTCHA. This is the precursor to late detection in fraud. The

bots are just too fast, completing their task before any flags are raised.

In late 2018, attackers created a script that allowed them to steal access tokens and

take over a total of 30 million Facebook accounts in two waves. By using bots, they

were able to scrape a hoard of personal data before the breach was discovered. It

hasn’t yet been determined what has been done with this data, it’s likely the

fraudsters used it for further attacks. This is the tip of the iceberg when it comes to

understanding the potential damage fraudsters can inflict on businesses.

Page 7: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

BEHAVIORAL DATA BOOSTS FRAUD DETECTION

HOW BEHAVIORAL DATA CLOSES THE GAP Despite their effort, even the most advanced bots can’t fully imitate gestures and

interactions that reflect innate nuances in normal human behavior. They can

complete very simple actions or can be customized to process logic. In order to

complete large scale attacks at speed, simple bots will be used, such as API direct

attacks or credit card stuffing. While slightly slower and subject to more investment

from the fraudster, more sophisticated bots are used to satisfy logic based challenges

presented by the GUI of a higher value target. Regardless, they expose themselves by

exhibiting non-human behaviors:

7

For example, a finger swipe on a mobile device has multiple dimensions: speed, angle,

pressure, and changes in the device’s orientation. Bots can’t generate this type of

sensory data, or they do so in a noticeably unrealistic way. They can also reveal

themselves by ‘moving’ the mouse too quickly, rapidly switching between keyboard

and mouse inputs, or by inputting text too fast. These types of behaviors are

inconsistent across these tools, requiring a flexible solution that can accommodate

these disparities. Machine learning provides this adaptability and can be trained to

look for non-human behaviors. Since it doesn’t rely on pre-defined rulesets or

signatures, it can identify and learn behaviors of new bots.

Performing unusually fast

swipes, mouse movements,

or other actions

Leaving the same behavioral

footprint on different devices

Copying and pasting data

at very fast rates

Attempting to mimic human

gestures while adding

random noise

Bots expose themselves by exhibiting non-human behaviors

Page 8: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

BEHAVIORAL DATA BOOSTS FRAUD DETECTION

ACCOUNT TAKEOVERSMany merchants require customers to create an account

in order to complete a transaction. Some will offer special

rewards to loyal customers as an incentive. It gives

merchants access to data about their customers that in

turn, allow them to sell more. This is why account

takeover attacks are so attractive to fraudsters.

Accessing these user accounts can include saved

payment details, access to additional PII, and other perks

like account reputation.

Of course, customers need to have a login and password to secure their accounts. We

will not delve into the controls that may be set at this stage of the customer journey,

however, it is critical to understand that they are susceptible to the same type of

vulnerabilities as the payment stage, described above. Furthermore, with the amount

of stolen PII available on the dark web, the chances that fraudsters can beat (or even

bypass) this security control, are exceptionally high.

One of the main pains in catching ATO is that detection will come after the fact, and

the damage is already done. An added complication is now attacks are focused on

monetizing earlier, bypassing even the need to complete a traditional transaction. The

fraudster’s journey is not so simple as a quick log in, transaction and log out. He now

looks for other vulnerabilities to get the highest ROI he can: they look for other ways

that they can monetize. The AirBnB example below is a perfect example of how an

ATO attack can be even more sophisticated. These attacks can be taken even further,

email addresses, account settings and payment methods can be changed.

8

ATOs are a growing threat, recent statistics show that the amount of attacks

increased by 30% between Q2 & Q3 last year. In one of countless examples, a

fraudster hacked into a user’s Airbnb account and charged over $1,000 in bookings.

The charges appeared legitimate to both Airbnb and the owner’s card issuer and were

only identified when the owner reviewed her credit card bill. Meanwhile, the

fraudster locked her out of the account and continued booking trips while she was left

fighting the charges and for access to the account.

Page 9: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

BEHAVIORAL DATA BOOSTS FRAUD DETECTION

HOW BEHAVIORAL DATA CLOSES THE GAP ATO can be performed using both automated and/or manual techniques. Based on

the previous section, it’s quite straightforward to understand how behavioral data

can be used to catch a bot in this context. The differences within this type of attack

are more nuanced and are augmented further depending on the stage of the

customer journey that the fraudster is focused on: the login, the session and

monetization. More often than not, after a successful credential stuffing attack,

monetization is completed manually.

Manual methods are more difficult to detect as it is not such a straightforward case

of separating between human and non-human behaviors. A fraudster using this

technique is likely to be sophisticated and experienced, with their sights set on high

value accounts. Behavioral data generated by these actions represents a

behavioral footprint of the fraudster that is distinct from that of a normal user. The

very fact that a fraudster’s interactions with a website or app are driven by his

mission is what gives him away; repeated behavioral patterns of the same flow on

different accounts include how fast he's navigating between the pages or moving

the mouse to the next "click". The way he's filling in fields on a form, how fast he's

typing, where and when he is using copy/paste are added data points that make

these behaviors so distinct from good users. Since fraudsters tend to target

accounts that are frequently used and in good standing, this distinction becomes

even clearer. Detecting the fraudster’s intent early in the customer journey, long

before they reach the payment stage is possible using this approach.

9

57% businesses are experiencing increasing fraud losses associated with account takeover and new account fraud

Page 10: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

BEHAVIORAL DATA BOOSTS FRAUD DETECTION

NEW ACCOUNT FRAUDUsing fake or synthetic identities to create new accounts,

fraudsters will make use of legitimate payment details and

complete transactions without raising red flags, making

transaction analysis a non-issue. Neither the merchant nor

the victim would know they were defrauded until after it

happened. This method is also used to commit referral

fraud in loyalty programs by creating fake new accounts to

make use of introductory rewards.

Instances of synthetic and fake identities are popular and growing. Using these

identities to create fake accounts, it is estimated that fraudsters net an average of

$15,000 per attack, with some attacks earning as much as $200 million. According to

their 2019 Identity Fraud Study, losses from new account fraud increased from $3

billion in 2017 to $3.4 billion in 2018.

HOW BEHAVIORAL DATA CLOSES THE GAP

10

In the same way behavioral signatures are generated by an ATO attack, fraudsters

behave in noticeably different ways to legitimate users that allows their intent to be

determined. They will also use a mix of automated and manual methods, such as:

Performing consistent, repeated actions, eg. entering the sign-up process

multiple times with different data

Navigating between pages in a steady, rehearsed way

Performing the identical actions on multiple different devices, indicating

bots or emulators

Creating many accounts from a single device

For new accounts in particular, these behaviors are extremely unusual. For instance, a

normal user would not be familiar with the placement of a registration form or the

order of the fields, this would be apparent from behavioral patterns such as

navigation fluency. The depth of data available allows Behavioral Biometric systems

to recognize and flag them as indicators of fraud.

Examples of unusual behaviors that signal malicious intent

Page 11: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

BEHAVIORAL DATA BOOSTS FRAUD DETECTION

EMULATOR DETECTIONEmulators were originally created as a way to play mobile

games on desktops, and have become a tool for fraudsters

to replicate or mimic devices. What makes them even

more attractive tools, is that security on mobile devices

tend to be more lax than desktops. Many fraud detection

solutions try to detect emulators based on superficial data,

such as the type of hardware that they’re running on.

However, high quality emulators can replicate genuine

hardware or provide false information, inadvertently

helping fraudsters to avoid detection.

HOW BEHAVIORAL DATA CLOSES THE GAP A major shortcoming of emulators is their inability to replicate certain types of

sensor readings - understandable as this is not their original function. The data

they provide is either incomplete or inconsistent with that of a normal device.

This makes it harder for fraudsters to emulate complex gestures, like slight

movements of the device when swiping a finger.

Behavioral data uses multiple sensor readings to detect complex and nuanced

gestures. For example, tapping a device always results in the device moving. If a

tap doesn’t change the phone’s acceleration or orientation in a specific

correlation to the tap X/Y coordinates, it does indicate the tap was emulated or

otherwise artificial. This is apparent regardless of the user - it could be a bot

being used with an emulator or a fraudster performing his task manually.

Behavioral data flags these anomalies by differentiating them from normal

usage and non-human behaviors.

Emulators can play a role in all forms of fraud, including new account fraud. For

example, Gett, a global provider of corporate on-demand transportation, discovered

an increasing amount of fraud involving emulated devices. Because emulators can

easily obfuscate real device attributes, using rule-based detection resulted in a high

rate of false positives and flagging of legitimate users.

11

Page 12: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

BEHAVIORAL DATA BOOSTS FRAUD DETECTION

Behavioral data does more than fight fraud. It improves the user experience by

replacing intrusive authentication measures such as step-up authentication, while

working continuously and invisibly throughout the customer journey. This allows for a

better overall customer experience by reducing friction, generating fewer false

positives, and lowering the chances of a successful attack.

It can also lead to reduced costs in fighting fraud. Successful attacks can result in

significant losses due to not only the fraud itself, but the decline in customer trust and

reputation. Behavioral data is unique in that it has no significant onboarding costs,

provides instant bot detection, and requires no changes in user behavior.

Behavioral data is widely available, and the number of users is increasing. By 2023,

over 1.5 billion smartphones will use it to support Behavioral Biometrics. This will

place Behavioral Biometric technology in the hands of billions of customers;

organizations simply need to leverage it.

THE ADDED VALUE OF BEHAVIORAL DATA

12

Friction at the checkout contributes to the majority of cart abandonment

Page 13: BEHAVIORAL DATA: THE KEY TO UNLOCKING BETTER FRAUD …

BEHAVIORAL DATA IS CORE IN THE FIGHT AGAINST FRAUD

BEHAVIORAL DATA IS CORE IN THE FIGHT AGAINST FRAUD

Fraudsters are getting smarter, so we need smarter solutions for detecting and

combating them. Behavioral data provides a stronger, more intelligent form of

identification that doesn’t add steps for users. It supports a fraud detection solution

that can adapt to even the most sophisticated forms of fraud, works on all stages of

the customer journey, allows for early detection of fraudsters, and does not rely on

private user data.

Users are oblivious to the collection of the data and that’s the beauty of it. It allows

Behavioral Biometrics technology to work invisibly and continuously to protect

transactions and combat fraud without requiring direct user intervention. After all,

users shouldn’t be overly preoccupied with the processes underlying their

transactions. The easier it is for customers to complete transactions, the less likely

they are to abandon them.

Leveraging the power of behavioral data, Behavioral Biometrics is a novel approach

to fraud detection and the market is quickly adopting it. It has the power to provide

stronger, seamless fraud detection that doesn’t negatively impact the user

experience. Enterprises can stay ahead of the constantly changing fraud landscape

and support a fast track to transaction completion for customers.

See more insights on behavioral data here: securedtouch.com.

13