Risk Assessments/Management, Data Security, Breach, Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Network Security, Threat Management, Threat Management, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Fraudsters using credentials harvested from massive breaches, study finds

Digital identities are being exploited on a routine basis by sophisticated cybercriminals, a new study from ThreatMetrix found.

No surprise there, but "ThreatMetrix Cybercrime Report: Q2 2015," based on attacks the security technology company detected between April and June 2015, uncovered a number of unforeseen trends.

For one, increasingly sophisticated attackers were increasingly targeting diverse data sets to effectively stitch together consumers' credentials. And new account creation continued to be at high risk as fraudsters use stolen credentials harvested from massive breaches.

Further, fraudsters were either replaying stolen identities using proxies, device and location spoofing to cloak a true digital identity or piggy-backing on top of users' session with malware or man-in-the-middle attacks.

The only way to effectively secure customers against cyberattacks is by leveraging anonymized shared intelligence built on global profiles of authentication and transaction histories, the study concluded.


An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds