Threatmetrix Whitepaper
Total Page:16
File Type:pdf, Size:1020Kb
Smart Device Identification for Cloud-Based Fraud Prevention Alisdair Faulkner Chief Products Officer White Paper: Smart Device Identification for Cloud-Based Fraud Prevention Contents Basic Device Identification is no longer enough ........ 3 Times have changed but your Device ID hasn’t .......................................................................... 3 Cookies are Obsolete .................................................................................................................. 5 Device Fingerprints Smudge and Fraudsters Wear Gloves ........................................................ 6 Compromised Devices are Commodities .................................................................................... 7 Smart Device Identification Requirements .................................................................................. 8 Smart versus Basic Device Identification Comparison ................................................................ 9 ThreatMetrix Smart Device Identification ................. 11 Identify Fraudsters and Authenticate Customers ...................................................................... 11 Cookieless Device Fingerprinting .............................................................................................. 12 IP, Browser and Packet Fingerprint Interrogation ..................................................................... 13 Real-time complex attribute matching and confidence scoring ................................................. 15 Man-In-The-Middle/Hidden Proxy and True Origin detection .................................................... 17 Compromised Device and Script detection ............................................................................... 18 Integrated Contextual Risk Scoring and Decisioning ................................................................ 19 Recommendations ................................................... 22 Page 2 White Paper: Smart Device Identification for Cloud-Based Fraud Prevention Basic Device Identification is no longer enough Times have changed but your Device ID hasn’t Device Identification, using a visitor’s computer to provide additional fraud prevention and authentication intelligence, remains the most effective first perimeter of defense to protect online transactions including payments, logins and registrations. Benefits include: • Zero customer imposition, providing passive two factor authentication for online transactions without requiring software or hardware tokens or challenge questions. • Not relying on the collection of personal identifying information (PII) • Stops first-time fraud attempts based on device anomalies and global behavior. Unfortunately since first generation device identification technologies were introduced the world has changed dramatically with an increase in the sophistication and globalization of cybercrime and a corresponding increase in exposure to enterprise fraud, risk and security teams. In this whitepaper you will learn about reasons to upgrade basic device identification and fingerprinting methods including: • The reliance of existing technologies on cookie or cookie equivalents. Browser and flash cookies are easy to delete and compromise. Private browsing modes make it easier for fraudsters to hide. Modern smartphones are harder to reliably tag. • Important security data is being ignored when collecting the device fingerprint. Simple browser fingerprinting technologies only gather information about the browser which is easy to spoof or subvert and it ignores important information encoded in the connection and packet. • Relying on simple hashing techniques to perform fingerprint matching misses fraud and causes false positives. Traditional SQL databases cannot perform the complex and extensive attribute matching needed in real time. • Lack of sophisticated proxy and Man-In-The-Middle detection. Simple IP proxy lists are no longer effective. • No knowledge of when a good customer’s device has been compromised. The widespread problem of infected computers due to botnets and Trojans means that simply recognizing an authenticated device is insufficient if that computer is now controlled or spied upon by hackers. Page 3 White Paper: Smart Device Identification for Cloud-Based Fraud Prevention In addition, you will learn new features and benefits associated with the next generation of ThreatMetrix smart device identification technologies including: • Cookieless device fingerprinting for better return visitor recognition • Multiple scoring techniques to truly validate the identity of a device • Going beyond simple browser fingerprinting technology to prevent more fraud • Real-time complex device fingerprint matching and confidence scoring for less false positives • Automatic detection of hidden proxies, compromised devices and MITM attacks to stop cybercrime at time of transaction. • Global device recognition and behavior tracking for proactive protection • Context aware risk based assessment across customer and transaction authentication processes for greater enterprise control. Page 4 White Paper: Smart Device Identification for Cloud-Based Fraud Prevention Cookies are Obsolete 2010 officially rang in the death knell for cookies as a way to reliably identify a device to prevent fraud underscored by Gartner analyst Aviva Litan in her report published in February of 2010 titled “ Privacy Collides With Fraud Detection and Crumbles Flash Cookies”. While it might seem obvious that a fraudster would delete browser cookies to avoid being identified the issue is slightly more nuanced. First generation device identification technologies rely on the general public’s and unsophisticated fraudster’s ignorance of Flash Cookies (Local Storage Objects) that are not deleted when regular browser cookies are cleared, and are invisible unless you know where to find them. Unfortunately for Basic Device identification vendors, online advertisers also use these same LSOs to resuscitate a cleared cookie which in turn, has incited a furor with privacy advocates. The result has attracted the attention of the FTC and the US Congress to impose privacy regulations to protect consumer’s rights. In response the browser and browser plugin companies have instituted private browsing and opt out features into their products to better accommodate consumer opt-out protection. Additionally, version 10.1 of Adobe’s Flash product now enables browser companies and consumers to delete LSOs in line with regular cookies. In addition, all the major browser companies have now implemented some form of private browsing mode that allows customers and intrepid fraudsters to temporarily suppress cookies and Flash objects and hence evade re-identification. 2010 also saw an explosive uptake in the number and variety of tablets and touch-based smartphones that make accessing the Internet and performing an online transaction from a mobile device a practical reality. Some of these devices such as the iPhone and iPad do not Page 5 White Paper: Smart Device Identification for Cloud-Based Fraud Prevention support Flash and also block third-party browse cookies by default further reducing the effectiveness of cookies and first generation device identification solutions for device recognition and reputation. Device Fingerprints Smudge and Fraudsters Wear Gloves Every interaction a customer makes with a website leaves a digital fingerprint about the device, the type of browser and the connection used. First generation device fingerprinting technologies typically use JavaScript or Flash to collect browser and clock information and use a hashing algorithm to generate some form of identifier. The problem is that this device fingerprint routinely changes as customers swap browsers, change physical locations and corresponding IP addresses with laptops, tablets and smartphones. As an illustration, a sample of transactions from ThreatMetrix Fraud Network shows that after 2 months 20% of visitors had changed their browser, and 25% had multiple IP Addresses. Further, fraudsters will deliberately try to manipulate or block browser settings in order to disguise their device fingerprint. The following graphs from the same sample shows that nearly 10% of transactions had one or more of JavaScript, Flash or cookies suppressed. Some of these transactions are fraudulent while at the same time many are transactions executed by privacy conscious customers and are valid. If these devices are not properly identified the end result to an ecommerce merchant, financial institution or other business will be either an increase of false positives resulting in loss revenues or increases in fraud resulting in increased costs. Page 6 White Paper: Smart Device Identification for Cloud-Based Fraud Prevention Compromised Devices are Commodities Thanks to sophisticated malware like Zeus, millions of good customer’s computers go bad on a daily basis. The problem is that existing fraud prevention and security solutions are blind to evidence that a particular device is infected at the point of a transaction leaving the enterprise exposed to Man-In-The-Browser (MITB), key-logging and Man-In-The-Middle (MITM) attacks. By orders of magnitude, however, the most common use of compromised computers is to turn an innocent’s computer into an IP proxy to avoid geolocation filters and known anonymous proxy IP lists. Using a real world example, one ThreatMetrix customer doing an average of 4,500 customer verification transactions a day had nearly 5% of transaction