Protecting your organization against fraud is a continuous game of cat and mouse. It seems like as soon as you implement a detection mechanism, the bad guys find a way to get around it.

Device ID — the ability to uniquely identify and later recognize a user’s device — was one of the first tools enterprises used for authentication and fraud detection. Using regular and Adobe Flash cookies, you could tag a device and use that as the “something you have” component of the authentication process, thus replacing onerous hardware tokens. If a device was unknown, the enterprise could step up authentication measures.

Modern device ID solutions have become significantly more sophisticated than these early cookie-based solutions. They collect information on myriad device characteristics, both static and dynamic, including browser, operating system, internet connection and other properties. This allows security teams to create a unique fingerprint of the device, which can be used to authenticate customers or detect suspicious interactions.

While device ID remains an important and sometimes effective tool in the enterprise fraud detection arsenal, it is not nearly enough to constitute a complete fraud detection solution. Why is this?

Read the white paper: How digital banking is transforming fraud detection

Fraud Has Caught Up With Device ID Techniques

When device ID was first developed, bad actors quickly learned that they could copy cookies and use them on other devices, enabling them to appear legitimate. As the technique evolved to include things such as IP address and the type and version of browser and operating system, bad actors have reverse engineered device ID solutions and created increasingly detailed spoofing techniques to fool security algorithms.

Many malware strains today collect not only credentials, but also the data used to create a device ID. Bad actors can then manipulate their own device to appear to use the same browser extension, OS attributes and more to further impersonate their intended victim. This practice is known as device ID spoofing. Modern device ID solutions should include spoofing detection capabilities. Moreover, to keep up with the pace of sophisticated fraud activity, device ID spoofing detection must be updated daily based on ongoing research and threat intelligence.

RATs and Social Engineering

The eruption of remote access Trojans (RATs) and other similar threats has resulted in a new way for bad actors to avoid device ID-based fraud detection. An attacker using a RAT is actually using the victim’s device, which completely sidesteps any fraud detection capabilities based on device ID.

In addition to RATs, threat actors constantly develop schemes that take advantage of the weakest element of security strategy — humans — using social engineering tactics. Social engineering attacks such as business email compromise (BEC) target employees with access to company finances and trick them into making wire transfers to criminal bank accounts. In these cases, the fraudulent action comes from both the right device and the right user, something that a device ID-based fraud detection solution would be unable to detect.

Of course, the attacks that circumnavigate device ID-centric solutions are not yet simple enough to be conducted at scale. Fraudsters must invest significant time and research to complete these attacks successfully, but that doesn’t mean they should be overlooked. In fact, bad actors who employ these techniques generally target an institution’s highest-value accounts, making every successful attack potentially catastrophic.

Best Practices for Improving Fraud Strategies

What should an enterprise look for when implementing a fraud detection strategy? It should still include complex device ID as an integral feature, but it should be paired with a strong device ID spoofing tool that includes ongoing threat research and automatically adapts to new threats.

Perhaps more importantly, enterprises should think of device ID as just one tool in a multilayered identification toolbox. Device ID solutions should include additional indicators of fraudulent activity relative to the user, device, behavior or session. These can include behavioral biometrics, malware detection, phishing detection and global identity networks exposing repeated usage patterns over the multitude of these perspectives. It’s also important to consider ongoing transaction monitoring to identify accounts that might be compromised by social engineering.

From a wider security perspective, enterprises should always be wary of one-trick pony solutions. Any solution that uses device ID, biometrics or malware detection exclusively will never be enough to prevent fraud. Multilayered security solutions provide the depth needed to defeat the bad actors of today and tomorrow because they are infused with many layers of cognitive fraud detection and analytics to help prevent digital identity fraud.

In addition to highly complex device ID tools with spoofing detection, these solutions include ongoing global threat intelligence research, behavioral biometrics, malware detection, RAT detection and more. The security layers are pre-integrated, both on the technical level and on the derived risk balancing level, which helps organizations avoid the potential pitfalls of device ID-based fraud protection so they can offer their customers a seamless user experience.

Read the white paper: How digital banking is transforming fraud detection

More from Fraud Protection

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Remote access detection in 2023: Unmasking invisible fraud

3 min read - In the ever-evolving fraud landscape, fraudsters have shifted their tactics from using third-party devices to on-device fraud. Now, users face the rising threat of fraud involving remote access tools (RATs), while banks and fraud detection vendors struggle with new challenges in detecting this invisible threat. Let’s examine the modus operandi of fraudsters, prevalence rates across different regions, classic detection methods and Trusteer’s innovative approach to RAT detection through behavioral analysis. A rising threat As Fraud detection methods become more and…

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today