Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: A Deluge of Powerful Fraud Tactics Are Giving Businesses Trust Issues
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: A Deluge of Powerful Fraud Tactics Are Giving Businesses Trust Issues
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
AICybersecurity ExecutivesExpert Opinions

A Deluge of Powerful Fraud Tactics Are Giving Businesses Trust Issues

Andy Sheldon
September 23, 2024 at 11:09 AM
By Andy Sheldon  - North American VP of Deduce Andy Sheldon
Share
Cyber Intelligence exclusive with Andy Sheldon of Deduce
SHARE
Andy Sheldon, North American VP of US-based ID fraud specialist Deduce

It feels like fraudsters are consistently staying one step ahead of us. Back in early 2022, a study found that one out of every four accounts made online was fake—and that number has only gotten worse. The auto lending industry, for example, saw a staggering $7.9 billion in losses due to a 98% spike in synthetic fraud in 2023. They’re not alone in fending off more fraud attempts than ever as malicious actors turn to generative artificial intelligence to increase both the sophistication and the sheer number of fake accounts trying to bypass verification steps and swindle businesses.

Contents
SuperSynthetic Identities On the RiseAre Banks and Businesses Overcorrecting?Who Can You Trust?

The increase we’ve seen in synthetic identities is causing a new host of problems. Not only are more businesses finding themselves with fake customers in their systems—financial institutions mistakenly giving credit to synthetic identities, colleges and universities grappling with applications from fake students, and more—but some of the measures being taken to tamp down on fraudsters’ relentless advances have had the unfortunate side effect of pushing away legitimate customers.

SuperSynthetic Identities On the Rise

While synthetic identities have been a thorn in the side of security and risk management professionals for years, “SuperSynthetic” identities have risen to prominence thanks to advances in AI and are even more formidable. These identities are fully automated, but rather than brute forcing their way through defenses and simply playing to the law of large numbers (if you try enough, eventually one will get through), they go for the long con.

SuperSynthetic identities prefer to slowly make small transactions like deposits, account balance checks, and other things that seem humanlike over the course of weeks or even months. Then, when the low-key activity hasn’t set off any alarms in a bank’s defenses (and it is usually financial institutions that are the targets here), an application for a line of credit is put in, with the odds of acceptance higher due to the slow drip of legitimate seeming activity. Of course, once that line is extended, the damage is done, and the money might as well be considered lost.

To use a metaphor from classic science fiction—and a recent pair of movies—think of it like the way Dune’s warriors use blades rather than firearms. The advanced shields they wear are set to repel anything that comes at them at high speed, but a blade that crosses the threshold slow enough will avoid detection and be able to pierce the opponent. When security systems are geared toward detecting fake identities created en masse and thrown at a company, the subtler, slower frauds might sneak in undetected.

Are Banks and Businesses Overcorrecting?

In response to the increased activity and sophistication of recent synthetic fraud attempts, many organizations have greatly heightened their security measures—sometimes to the detriment of their customers.

While in theory, it seems like a good idea to leave no stone unturned and turn the sensitivity up, so to speak, flagging every user action that is the slightest bit suspicious, in practice, you’ll end up with a good number of false positives—and annoyed customers. Some things that normal people do, such as use VPNs, shorten their name with a nickname (like Sam instead of Samantha), or check on their account while traveling to a new place, can be interpreted as suspicious by security systems tuned to anything outside of the routine.

As a result, these businesses have to spend time and resources manually reviewing these instances, which should have coasted through without issue. They might need the user to clear other verification hurdles around their identity, and there are few ways to chase off customers more effectively than making them wait or work more for a process they have to come to expect to be quick and seamless.

In this way, increased fraud hurts businesses on a second front, impacting customer relationships and causing some users to abandon the company or avoid getting on board in the first place.

Who Can You Trust?

Financial institutions and other industries must start fighting fraudsters on the axis of trust. If they utilize ways to confirm quickly if a user is likely to be who they say they are and keep them from any delays or additional security steps, that’s the most beneficial path forward from the customer service perspective. At the same time, if the user or applicant is not trustworthy, the additional hoops to jump through can be laid out—this way, overall security is not negatively impacted and there’s not a tradeoff when smoothing the path for real customers.

It all comes down to how trust is built into security protocols and how reliable those trust assessments are. Preemptively assessing user identities by tapping into anonymized identity networks that review the actions of a user rather than simply their credentials can be a reliable way of assessing user trustworthiness and then tailoring an application or checkout process accordingly without them ever realizing what’s happening on the backend. “Trust signal” factors such as a user’s geolocation, recency and frequency of activity, whether they utilize VPNs or travel often, and activity on other in-network sites and apps all should be considered and combined into a single and clear picture of trustworthiness.

With these considerations tracked, financial institutions and other businesses fighting off fraud can hold off on tuning their security systems to Fort Knox levels, which will dissuade real users who are just trying to check their account balance.

Deduce uncovers stolen & AI-driven synthetic identities that bypass incumbent fraud detection systems. Deduce tracks almost 200 million identities multiple times every week, monitoring 1.5 billion online activities daily from 150,000 websites & apps. Multi-layered digital forensics reduce friction & boost customer acquisition performance while capturing incremental fraud.

TAGGED: vpn, Cybersecurity, verification, phishing, impersonation, deduce, vulnerability, andy sheldon, fraud, supersynthetic, banking, artificial intelligence, finance, cyber fraud, expert opinion
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article chinese phishing attack on the US military Chinese phisher steals top US military secrets
Next Article International Cyber Expo, London 2024 Cyber gets physical at Expo ‘24
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
Cyber EspionageSurveillanceSpywareNewsChina

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025
AI powered ransomware
ransomwareNewsAI

AI-powered ransomware fuels cybercrime

Cybercriminals are now weaponizing artificial intelligence (AI) to create potentially devastating off-the-shelf ransomware. Researchers at cybersecurity company ESET have discovered what they called "the first known AI-powered ransomware". The malware, which ESET has named PromptLock, has the ability to exfiltrate, encrypt, and possibly even destroy data, though this last functionality appears not to have been implemented in the malware as yet.

August 28, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?