Fraud prevention as a service

For the purpose of this article, an online fraud is a situation in which a fraudster assumes the victim's identity or creates a new, fake one in order to profit from online activities. The 2 most common types of online fraud are:

Bartosz Sajewski

1. What is an online fraud?

For the purpose of this article, an online fraud is a situation in which a fraudster assumes the victim's identity or creates a new, fake one in order to profit from online activities. The 2 most common types of online fraud are:

  • Account takeover

Account takeover is a type of fraud wherein a fraudster gains access to (takes over, if you will) an online account.  Attackers usually gain access to login credentials in following ways:

  • Bruteforcing - essentially, guessing a password, or a combination of login and password;

  • Phishing - gaining access to accounts by telling users that they work for their, for example, bank;

  • Data breach - every once in a while there is a loud data breach and thousands of logins and passwords are leaked. Many of us, use the same credentials for various sites, making the attack that much easier;

  • Malware - attackers trick users to install software that steals their credentials.

After that, they use the account to which someone’s identity is assigned.

  • Remote Desktopping

Remote desktopping involves a combination of social engineering and using the PC remotely to open fake accounts based on real identities. Fraudsters usually trick users to install malware by phishing and then take control over their device and all the files in it., thanks to which they can create a fraudulent identity based on a real person, and even use their device to do so. 

2. How does Nethone work? What is profiling?

Nethone’s tool works behind the scenes and extracts over 5,000 attributes about each user that enters your site or application. These data points can be divided into 4 categories:

  • Hardware - these information are used to learn about the device itself - for example, is the claim of being a mobile device real, or is it an emulation? 

  • Software - the Profiler analyses the software environment, plugins, applications, the use of fraudulent tools;

  • Network - Nethone checks whether the user is using proxies, VPNs or wants to anonymise themselves in another way;

  • Behaviour - the tool checks how the user interacts with the application, how do they behave and estimates if it’s a human or a bot.

Table of content

  • 1. What is an online fraud?
  • 2. How does Nethone work? What is profiling?
Bartosz Sajewski