Sign in
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Sign in
Welcome!Log into your account
Forgot your password?
Privacy Policy
Password recovery
Recover your password
Search
Sunday, February 5, 2023
  • Sign in / Join
Sign in
Welcome! Log into your account
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
A password will be e-mailed to you.
ITSECURITYWIRE FAVCON ITSECURITYWIRE FAVCON ITSecurityWire
  • News
  • Interviews
  • Articles
  • Podcasts
  • Insights
    • Future Ready
    • Guest Post
    • Use Cases
    • Events
  • Quick Bytes
  • RESOURCES
Home Featured Articles Surging Traffic in Digital Commerce Driving More Fraud Attacks
  • Featured Articles

Surging Traffic in Digital Commerce Driving More Fraud Attacks

By
Sudipta Choudhury
-
December 2, 2020
49
Fraud Attacks

With the explosion in online commerce, fraud incentives shoot up as cyber-attackers are more active than ever.

The rapid surge in consumer digital traffic has triggered more fraud attacks lately. Certainly, as we move ahead, more people are likely to be online, and the typical online behavioral patterns will no longer be applicable. A recent study by Arkose Labs indicated the holiday levels of digital traffic would continue to increase daily.

Hackers are exploiting the old fraud modeling frameworks. They often fail to take modern realities into account and attempt to blend in via trusted traffic – resulting in undetected attacks. And it has resulted in more credential stuffing and bot attacks.

Even after the pandemic ends, such high fraud levels accompanying high traffic volumes will stay rather increase with time. Hence, it is pivotal for businesses to be aware of the latest attack trends. This would help them to remain more vigilant, identifying and stopping digital scams over time successfully.

Read More: Combating Ransomware Attacks with Innovative Strategies

Statistics say, the third quarter of 2020 has witnessed the highest levels of bot attacks globally. Overall, nearly 1.3 billion attacks were detected – with around 64% occurring with logins, and almost 85% of attacks emanating from the desktops or public computers.

In the view of the widespread availability of usernames, passwords, and email addresses from several data breaches, credential stuffing has emerged as a prime driver of the attack traffic. Besides, there is easy access to automated tools for carrying out cyber-attacks at scale.

The study revealed about 770 million automated credential stuffing attacks had been detected and stopped in 3Q20. The pandemic induced rise in digital traffic indicates that businesses have been functioning with their “holiday season” levels of traffic since March 2020.

As mentioned by Vanita Pandey, Vice President of Marketing and Strategy at Arkose Labs, “As the world becomes increasingly digital as a result of COVID-19, fraudsters are deploying an alarming volume of attacks, and continually devising new and more sophisticated ways of carrying out their attacks.”

Read More: Cyber-attacks Linked with IoT Devices Are on the Rise

Most of 2019 saw a shift from automated attacks to human-driven fraud attacks; however, computerized attacks overshadowed 2020. This trend is most likely to revert with more targeted attacks in Q4, amid the holiday and shopping season. This is because the fraudsters usually hire low-cost attackers to commit human nuance and intelligent attacks.

Clearly, for e-commerce companies, every day is “Black Friday”. As a result, many businesses are better equipped to tackle the substantial outcome of holiday season fraud as well as traffic. However, the marketplace is waiting to see if the upcoming holiday sales and attacks shoot up, given the record traffic levels across industries.

  • TAGS
  • account takeover
  • ATO attacks
  • behavioral analytics
  • Black Friday
  • COVID-19
  • cyber attack
  • cybersecurity
  • data analysis
  • e-commerce
  • e-commerce fraud trends
  • fraud prevention system
  • holiday season
  • online buyer behavior
  • online scams
  • upcoming holiday sales
Previous articleAdvarra Announces Appointment of Steven Buonaiuto as Chief Financial Officer
Next articleSecuring the Edge in a World of Cloud and IoT
Sudipta Choudhury
http://itsecuritywire.ondot.media
Marketing professional with experience in B2B and MR industry. Skilled in Marketing, Strategy Making, Copywriting and Content Creation, Sales, and SEO with excellent Communication Efficiency. Holding a dual master's degree focused on Marketing from IBS, Pune and ICFAI University.

RELATED ARTICLESMORE FROM AUTHOR

Identity and Access Management (IAM) Advanced Practices Organizations Must Include

Identity and Access Management (IAM) Advanced Practices Organizations Must Include

How a Risk-Based Approach Can Better Strengthen IT Security

How a Risk-Based Approach Can Better Strengthen IT Security

Myths of Air Gap Security

Myths of Air Gap Security

Latest posts

Stardog

Stardog Expands Enterprise-Grade Security to Knowledge Graph in the Cloud

August 11, 2022
Everything-Blockchain-Inc.-Introduces-EB-Control

Everything Blockchain Inc. Introduces EB Control

July 28, 2022
Aura Extends Intelligent Safety Platform with New Capabilities to Proactively Protect Consumers Online-01

Aura Broadens its Intelligent Safety Platform to Protect Customers Online

March 11, 2022
Netacea research: Skewed analytics cost businesses as much as click fraud

Netacea research: Skewed analytics cost businesses as much as click fraud

December 7, 2021
Msbuild for Cobalt Strike Beacon Execution Abused by Threat Actors

Msbuild for Cobalt Strike Beacon Execution Abused by Threat Actors

December 29, 2021


An invaluable resource for all your IT security initiatives and assets.

Knowledge sharing platform for all IT security needs and plans. Peer to peer conversations that leverage industry experts and leaders for ideas, opinions and business insights.

Media@ITSecurityWire.com
Sales@ITSecurityWire.com

Recent Posts

  • Vulnerability in Cisco Industrial Appliances Permits Malicious Code to Survive Reboots
  • F5 BIG-IP Vulnerability May Cause Denial of Service and Code Execution
  • HeadCrab Botnet Captures 1,200 Redis Servers for Cryptomining
  • Identity and Access Management (IAM) Advanced Practices Organizations Must Include
  • How a Risk-Based Approach Can Better Strengthen IT Security

Visit Our Other Publication

Quick Links

  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
  • About Us
  • News
  • Featured Articles
  • Featured Interview
  • Guest Post
  • Privacy Policy
  • Do Not Sell My Information
An Imprint of OnDot ® Media © | All rights reserved | Privacy Policy