Page 27 - GS220101
P. 27

CoverStory




        adding that it's no longer, how can I get this or send security   Blueprint," cited the following near-term threats:
        keys to all my users or get them to download something?
        "The answer to all of those questions is, they already have   • Automation: Credential stuffing, password spraying
        it; it's just there in the devices and platforms," Shikiar said.   and brute force attacks will continue, many initiated
        "We're seeing widespread adoption of FIDO authentication     by bots mimicking humans.
        because it's supported so broadly in consumer devices. If
        I'm a web developer, it's quite easy for me to incorporate   • Account takeover: ATO attacks will increase, largely
        FIDO authentication into a website or web service instead    driven by readily available troves of stolen data on
        of a password."                                              the Dark Web and criminal enterprises.

        Verification                                               • Crypto attacks: Cryptocurrency platforms may be
                                                                     exposed to malware that infects the platforms and
        Michael Magrath, vice president, global regulations and      enables unauthorized access and theft of digital cur-
        standards at OneSpan, expects digital identity verification   rencies.
        and app shielding to play a broader role in omnichannel
        commerce in 2022 and beyond. Magrath also co-chairs the    • Phishing:  Phishing  attacks  have  become  more  re-
        FIDO Alliance's government deployment working group          fined in recent years, and scammers will continue
        and  serves  on  the  board  of  directors  at  the  Electronic   to improve tactics by making phishing emails more
        Signature and Records Association.                           personalized and specific.

        "Digital identity verification is a reality, and leading   • Targeted attacks: Attackers have studied prevalent
        financial institutions are already using it to remotely      fraud defenses and will use this knowledge to ma-
                                                                     neuver their resources and extract maximum returns.
        confirm a person's identity," Magrath said. "These solutions
        compare government issued IDs with information you've      • Ransomware: This preferred tool for targeted attacks
        provided on a document and take a selfie picture to          will affect the payment ecosystem globally and likely
        match the picture with your ID and make certain that         involve higher monetary demands in 2022.
        you're a living person." Magrath further noted that a good
        digital identity process happens very quickly, usually in   • Cyber activism: Protesters target businesses to dis-
        under a minute, allowing end users and vendors to start      rupt  websites  or  exploit  loopholes  in  business  net-
        relationships in a trusted environment. While end-users      works. They can use these protests as a means to
        interact with apps, service providers do a bunch of things   drop malware or ransomware to steal sensitive infor-
        behind the scenes, he added, such as obtaining information   mation or extort money.
        about the device, getting SIM card, geolocation and related
        data, and shielding individual apps.                       • IoT-driven attacks: Devices connected to the Internet
                                                                     of Things are vulnerable to cyberattacks, especially
        "App shielding is the second component of protection that    when consumers fail to change their default pass-
        prevents attackers from accessing mobile apps," Magrath      words.
        said. "If attackers get onto your phone in some way, they
        can't compromise your mobile banking, because the          • Supply chain attacks: Supply chain disruptions pro-
        banking application has been shielded."                      vide opportunities for fraudsters to exploit vulner-
                                                                     abilities, harvest sensitive data or infect systems with
        Intelligent solutions                                        malware.

        Kevin Gosschalk, CEO and founder at Arkose Labs, stated    • Account security: Attackers will continue to exploit
        technology has changed the game for both fraudsters and      external and internal loopholes in business networks
        the businesses trying to stop them. The same advanced        and web authentication methods.
        technologies that help  organizations  detect and prevent
        fraud are being weaponized by criminals, he explained,   "In 2022, businesses must remain aware of the shifting
        which is why we need Intelligence, not just tools, to   risks they face and take appropriate measures to protect
        bankrupt the business model of fraud.                   themselves and their consumers," Pandey wrote, urging
                                                                stakeholders to think in terms of deterrence, not just
        "Proxy IPs are readily available, and enterprise plans   mitigation.
        allow fraudsters to buy hundreds of thousands for an
        economical price," Gosschalk said. "They can buy SaaS   Part 2 of this series will explore two other pillars of digital
        software to load combo lists and launch attacks at scale   commerce: agility and transparency.
        with ease." Vanita Pandey, chief marketing officer at
        Arkose Labs, agreed, stating security analysts around the   Dale S. Laszig, senior staff writer at The Green Sheet  and managing
        world expect digital account openings and online activity
        to increase exponentially in 2022, adding fuel to attacks   director at DSL Direct LLC, is a payments industry journalist and content
        across  digital  touchpoints.  Pandey's  Dec.  20,  2021,  blog   strategist. Connect via email dale@dsldirectllc.com, LinkedIn  www.
        post, "Top 10 Fraud Trends in 2022 and Your Cybersecurity   linkedin.com/in/dalelaszig/ and Twitter @DSLdirect.

                                                                                                                27
   22   23   24   25   26   27   28   29   30   31   32