Online Retailers Are Fighting Account Takeover Fraud Fires
Online merchants and retailers are facing an ever-growing threat from account takeover fraud, which is accelerating within the card-not-present space. Account takeover occurs when user credentials for a retailer’s website are compromised, leading to exploitation of a consumer and potentially offering a large return on investment for the fraudster. Per research from ACI Worldwide and Javelin Strategy, this type of sophisticated attack accounted for a staggering USD $5 Billion in fraud losses in 2017 alone. The card-not-present environment, due to anonymity, allows a fraudster to hide themselves in the act.
There are a few different ways that consumers can become victims of account takeover fraud, and once they have been exposed, the floodgates are open for a fraudster who not only has access to one merchant’s website, but a set of credentials that can be tried on other merchants’ websites (due to consumers’ proclivity for reusing usernames and passwords). Because of this, account takeover has become a popular tactic amongst fraudsters, and stolen credentials can be a lot more valuable than one stolen credit card.
A growing number of merchants and retailers allow for consumers to store their payment credentials on their websites, so once the fraudster has access they can begin their shopping spree and ship the purchases to new locations. The fraudster also creates a challenge for the genuine consumer to log back into the website, by changing the password and physical address on file and essentially locking out the genuine account. For the retailer trying to investigate, it becomes difficult to determine whether this is truly suspicious behavior, as the legitimate consumer no longer has knowledge of the changed password or email address used for communications when attempting to verify and reestablish their account.
How does account takeover happen?
- Consumers may be tricked or lured into revealing their credentials through friend requests on social media, emails requesting password and account info, or other phishing attempts.
- Data breaches can occur from network security vulnerabilities that lead to account takeover – essentially allowing sensitive customer data to be exploited, and often enhanced through a tactic known as credential stuffing. In brute force attack style, automated tools scan and collect account credentials through trial and error, which are then automatically populated into a merchant site until there is a match and a successful login. A set of account credentials which are valid and working can be sold on the dark web for a very nominal purchase price, and along with the username and password come instructions as to which merchant websites the account info can be used to log into.
- Spam emails, designed to appear legitimate, lead a consumer to click on malicious links or open files that can download malware onto their devices. These may install software known as ‘key loggers,’ which can monitor and track keystrokes such as a username, password, and even responses to security questions. This data is fetched and returned to the fraudster, who uses it to log into and take over an account.
How can account takeover be prevented?
- Consumers should be advised that it is best practice to utilize stronger passwords when an account is created or a password updated. The password may contain capital letters, numbers and special characters. In addition, merchants should also require a certain length of the password (fraudsters are known to target less tech-savvy individuals) and should also monitor access points and times.
- Merchants should choose a fraud solution that considers a consumer’s profile. This can consist of an email address, a physical address, a phone number or even a device fingerprint – it is important to track the data around how long these individual data elements have been associated through number of days of usage. When analyzing transactions, the merchant can expect to see a match of previously used customer data for the same consumer, but if there is suddenly a change in any data element along with new address or a payment instrument, the merchant may want to perform additional validation.
- A merchant’s fraud strategy should aim to fully comprehend consumers’ unique transactional behaviors, such as the average spending pattern through a payment instrument, an IP address, an email address, or a phone number. Typically, a fraudster’s average ticket purchase price would be 3-4x higher compared to legitimate consumers’ purchases. When there is an abnormal change or a sudden spike compared to the typical spend, this may serve as a red flag.
- It is also important to monitor average spend behavior per card ‘BIN’ (multiple cards generated from same bin by the issuing bank with each individual card being unique), as well as bot-generated emails or disposable emails. Linking fraudulent behavior from multiple cards in a very short time span may be tied to the BIN attack and the BIN should be blacklisted in a timely manner.
- Fraudsters frequently use bot-generated emails to hide their identity, so merchants should be able to identify such domains and blacklist them as well. Merchants should also look for similarities between the email address and the name on the account.
Overall, customer profile patterns play a tremendous role when it comes to mitigating account takeover fraud, because they help merchants and analysts better detect anomalies. Understanding these patterns leads to wiser decision-making, resulting in reduced losses.
Based on internal research from ACI, 17% of new customers (for a typical merchant) had an existing history across other merchants, versus 84% of fraud being on profiles with minimal (less than 8 days) or no history. This illustrates that global customer profile data is essential when choosing a fraud strategy, so that merchants can see an increase in sales with the least customer friction.
Find out more about ACI’s Stream Analytics Engine, which helps merchant fight fraud – including account takeover.
Related Blog Posts
Request for Pay – What Does It Mean For Financial Institutions?
What do banks – one with $60B+ in assets, one a mid-size regional bank, and one, a small innovative credit union – have in common with payment networks and the ‘Big 4’ consulting firms? They were all part of the first ACI #PaymentsForBreakfast event in North America! The theme was real-time payments, but the focus was more specifically on Request for Pay.
Why Open Banking Might Need to Rely on a Magic Illusion of 24x7 Availability
The adage “the more things change, the more they stay the same” appears to ring true when applied to the early phases of the evolution of open banking (or open payments). Especially when you contrast it with the early days of ATM withdrawals; particularly those made in the dead of night so you could pay cash for your after-party greasy feast.
Sibos Preview: The Five Trends Transforming Real-Time Payments
Real-time is now a reality, with more than 30 schemes live around the world. And real-time is in the spotlight as banks and financial service providers make their way to Sydney for Sibos 2018. What better time to look ahead at the key trends that are going to shape the ongoing development of real-time payments.
Winners and Losers in the Regulation Vs Competition Debate? How About New Business Models?
As Summer has abruptly turned to Fall, I have found myself daydreaming of a European vacation (and yes, I realize it’s Fall there too… or rather, Autumn). Maybe it’s the Instagram feed full of friends on a summer sojourn to Italy, France, or Germany, or the constant barrage of Premier League kickoff commercials on the NBC Networks (Let’s Go Gunners!), but yesterday it was something else entirely that had me drifting off into a memory-induced Nutella-crepe state of euphoria.
API Management: The Reason Digital Open Banking Can Fly
When it comes to thinking about the different roles that an API Manager can play for an organization, I personally think that an airport provides the perfect analogy. The customer is the passenger, the third-party organizations using a bank’s APIs are the airlines and the airport itself is the bank. I also think this analogy helps to visualize the variety of API management capabilities – including the role of an API gateway.
The Mexican Fintech Revolution – ¿Qué onda in Open Banking?
Mexico has joined an elite group of nations, being amongst the first to pass open banking regulations. Specifically designed to open up its financial services and technology sector, the so-called ‘Fintech Law’ appears to have taken notes from PSD2, UK Open Banking, Singapore’s ‘organic’ approach, and others – and balances these against Mexico’s unique context and aims.
ACI’s Lu Zurawski, one of the industry's foremost open payments experts, and Sonia Gomez, a Latin America payments authority, discuss this balancing act; including the drivers, the regulation and the potential benefits.
Working Up An Appetite for APIs in Australia
This week ACI hosted the latest installment of our #paymentsforbreakfast forums in Australia, with the early birds catching the open banking worm in both Sydney and Melbourne.
Given the similarities between the Australian and UK open banking movements, we enticed ACI’s UK-based Lu Zurawski (Solutions Practice Lead - Retail Banking) to Australia to share his learnings from being heavily involved in the UK Open Banking working group.
APIs and Cash Management (Harnessing the Hammer, Part 2)
In my last blog post, we talked about the hammer and the nail; the hammer in this case being open APIs, and the nail being the market need to adapt to changes in customer behavior and expectations from our commercial market. We laid out why the US is in a different position when it comes to open APIs—it has to do entirely with the regulatory environment, which is allowing us to start with the largest revenue opportunity first. Finally, we challenged you, the reader, on how you can begin on your journey. And that is where we are going to pick things up. What steps can you take today, and what use cases can you explore as we start getting our hands dirty?
Three Key Takeaways from the Latest Payments Insight Survey
Blinkist is a reading app that summarizes books into 15-20 minute reads; these reads are called “blinks.” It’s helpful for a few reasons – I can scan books before I purchase them, I can get new ideas without having to read the full book, and I can learn to summarize information. It’s safe to say that I (and probably many who are strapped for time) are a little obsessed with Blinkist! So here I present my own summary – in three key takeaways – of the new ‘2018 Global Payments Insight Survey: Retail Banking,’ which finds that 51% of banks are increasing spend on payment technology.
The Hidden Cost of Digital Payments for Retail Payment Players
It is not exactly breaking news that non-cash payments are on the rise globally, with column inches dedicated to the launch of digital financial-inclusion projects. But going cashless is not only a challenge for humanitarian endeavors, or developing countries. We all agree that removing cash from the system will save payments players big bucks in the future, but we must also consider the immediate impact of digital transformation on the legacy infrastructure of the powerhouses of the payments ecosystem.