April 19, 2018 By Douglas Bonderud 2 min read

According to newly released fraud statistics, the total amount of “fraudulent conduct” reported in 2017 dropped by 6 percent. However, identity fraud is up, according to Cifas’ “The Fraudscape” report. It rose 1 percent last year to 174,523 total cases.

This marks a 125 percent increase over the last decade and is consistent with previous fraud profiles. The report also found that attackers typically leverage the identity of innocent victims, and they use the victim’s actual address to commit fraud in almost 80 percent of cases.

Fraud Statistics Show Rise in Online Scams

The Cifas data indicated that online retail fraud rose 49 percent last year. According to the report, identity fraud “remains a predominantly internet-based offense, with 84 percent of identity fraud occurring through online application channels.”

Account takeover (ATO) fraud is also on the rise, experiencing a 7 percent increase over 2016. A recent Javelin report found that ATO fraud tripled last year, causing more than $5 billion in losses. In addition, the average resolution time for ATO was 16 hours. New account fraud (NAF), meanwhile, rose 70 percent as cybercriminals leveraged personally identifiable information (PII) to create fake credit card and bank accounts.

The Cifas report also noted that actors are increasingly targeting older age groups for ATO fraud using social engineering techniques. These often take the form of phishing emails or over-the-phone “security checks” that ask victims to provide personal information for “verification.” Once attackers have PII in hand, they’re able to either compromise existing accounts or create new ones that may lead to claims of credit fraud or identity theft.

Anonymous Advantage

The report’s authors asserted that the evolution of fraud over the past 20 years has led to a situation where “offenders have the ability to commit their crime of choice without being seen or heard.” One law enforcement officer who was interviewed about the challenges of tackling online, organized crime group (OCG) fraud quipped that the police “are chasing Formula 1 cars with tricycles.”

With offenders now able to commit identity theft, ATO and NAF at a distance, the Cifas report pointed to a need for law enforcement to “consolidate, share and act upon information and data.” This is reflected in one of the report’s positive fraud statistics: Through noncompetitive data sharing, organizations were able to prevent roughly $1.85 billion in fraud losses last year.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today