Sign in
  • News
  • Interviews
  • 2021: The Comeback Year
  • Articles
  • Insights
    • Guest Post
    • Use Cases
  • Quick Bytes
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Friday, January 15, 2021
  • Sign in / Join
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • 2021: The Comeback Year
  • Articles
  • Insights
    • Guest Post
    • Use Cases
  • Quick Bytes
Home Featured Articles Surging Traffic in Digital Commerce Driving More Fraud Attacks
  • Featured Articles

Surging Traffic in Digital Commerce Driving More Fraud Attacks

By
Sudipta Choudhury
-
December 2, 2020
13
Fraud Attacks

With the explosion in online commerce, fraud incentives shoot up as cyber-attackers are more active than ever.

The rapid surge in consumer digital traffic has triggered more fraud attacks lately. Certainly, as we move ahead, more people are likely to be online, and the typical online behavioral patterns will no longer be applicable. A recent study by Arkose Labs indicated the holiday levels of digital traffic would continue to increase daily.

Hackers are exploiting the old fraud modeling frameworks. They often fail to take modern realities into account and attempt to blend in via trusted traffic – resulting in undetected attacks. And it has resulted in more credential stuffing and bot attacks.

Even after the pandemic ends, such high fraud levels accompanying high traffic volumes will stay rather increase with time. Hence, it is pivotal for businesses to be aware of the latest attack trends. This would help them to remain more vigilant, identifying and stopping digital scams over time successfully.

Read More: Combating Ransomware Attacks with Innovative Strategies

Statistics say, the third quarter of 2020 has witnessed the highest levels of bot attacks globally. Overall, nearly 1.3 billion attacks were detected – with around 64% occurring with logins, and almost 85% of attacks emanating from the desktops or public computers.

In the view of the widespread availability of usernames, passwords, and email addresses from several data breaches, credential stuffing has emerged as a prime driver of the attack traffic. Besides, there is easy access to automated tools for carrying out cyber-attacks at scale.

The study revealed about 770 million automated credential stuffing attacks had been detected and stopped in 3Q20. The pandemic induced rise in digital traffic indicates that businesses have been functioning with their “holiday season” levels of traffic since March 2020.

As mentioned by Vanita Pandey, Vice President of Marketing and Strategy at Arkose Labs, “As the world becomes increasingly digital as a result of COVID-19, fraudsters are deploying an alarming volume of attacks, and continually devising new and more sophisticated ways of carrying out their attacks.”

Read More: Cyber-attacks Linked with IoT Devices Are on the Rise

Most of 2019 saw a shift from automated attacks to human-driven fraud attacks; however, computerized attacks overshadowed 2020. This trend is most likely to revert with more targeted attacks in Q4, amid the holiday and shopping season. This is because the fraudsters usually hire low-cost attackers to commit human nuance and intelligent attacks.

Clearly, for e-commerce companies, every day is “Black Friday”. As a result, many businesses are better equipped to tackle the substantial outcome of holiday season fraud as well as traffic. However, the marketplace is waiting to see if the upcoming holiday sales and attacks shoot up, given the record traffic levels across industries.

  • TAGS
  • account takeover
  • ATO attacks
  • behavioral analytics
  • Black Friday
  • COVID-19
  • cyber attack
  • cybersecurity
  • data analysis
  • e-commerce
  • e-commerce fraud trends
  • fraud prevention system
  • holiday season
  • online buyer behavior
  • online scams
  • upcoming holiday sales
Previous articleAdvarra Announces Appointment of Steven Buonaiuto as Chief Financial Officer
Next articleSecuring the Edge in a World of Cloud and IoT
Sudipta Choudhury
Sudipta Choudhury
http://itsecuritywire.ondot.media
Marketing professional with experience in B2B and MR industry. Skilled in Marketing, Strategy Making, Copywriting and Content Creation, Sales, and SEO with excellent Communication Efficiency. Holding a dual master's degree focused on Marketing from IBS, Pune and ICFAI University.

RELATED ARTICLESMORE FROM AUTHOR

Will enterprises be able to mitigate the looming Shadow IT 2.0 crisis

Will enterprises be able to mitigate the looming Shadow IT 2.0 crisis?

CIOs Considering Implementation of Self-Repairing Endpoints

CIOs Considering Implementation of Self-Repairing Endpoints

Managing and Securing the Digital Footprint of an Organization

Managing and Securing the Digital Footprint of an Organization

Latest posts

Telecommunications Industry Association

Telecommunications Industry Association Applauds Congress for Critical Investments in Broadband and Network Security

December 22, 2020
HID Global

HID Global Acquires Access-IS, a Leading Global Provider of Miniaturized Reader Devices That Combine Key...

August 17, 2020
SafeBreach, breach-and-attack simulation

SafeBreach Raises $19 Million to Expand Channels, Accelerate Product Development

April 17, 2020
Microsoft Information Protection

Dataguise Announces Integration with Microsoft Information Protection, Joins Microsoft Intelligent Security Association

September 18, 2020
Black Hat 2020

SafeBreach Experts Showcasing Research with New Exploits at Black Hat 2020

July 8, 2020


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • Will enterprises be able to mitigate the looming Shadow IT 2.0 crisis?
  • CIOs Considering Implementation of Self-Repairing Endpoints
  • Organizations urged to use own DoH resolvers by NSA
  • User-friendly and privacy-protecting web search introduced by Xayn
  • Two chrome extensions devs sued by Facebook

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy