Page 38 - GS180301
P. 38

Education





                                                                      mate game sites can look exactly like the sites they're
                                                                      spoofing. Typically, the URL for a spoof site is only
                                                                      one letter different from the actual site, for example,
                                                                      www.online-gamet-net.com versus  www.online-gamer-
                                                                      net.com. When unsuspecting players mistype the
                                                                      web address, they arrive at what looks like their
                                                                      intended destination. Their login credentials get
                                                                      collected and are used to steal their account on the
                                                                      actual site.

                                                                   •  Bots: Fraudsters will refer "new players" that are
                                                                      actually bots using synthetic IDs and stolen credit
                                                                      card accounts. With each referral, a fraudster earns
                                                                      a reward to either turn directly into cash or boost
        Foiling fraud in                                              the value of the account so it can be sold on the Dark
                                                                      Web. One fraudster using this technique can gener-
        online gaming                                                 ate hundreds of referrals with minimal work. An en-
                                                                      tire, coordinated criminal gang deploying multiple
                                                                      bots can dramatically accelerate the damage.
        By Don Bush                                            Fighting fraud does more than combat financial losses; it
        Kount Inc.                                             helps keep game playing legitimate so customers will re-
                                                               turn. Players who experience bots or fraudulent accounts
                   nline gaming has risen in popularity over the   won't want to come back and continue to lose. So what can
                   last few years. Revenue clocked in at $108.9 bil-  businesses do to protect themselves and their loyal custom-
                   lion in 2017, and the compound annual growth   ers? First, they should use a fraud prevention system that
        O rate was 6.2 percent, according to market intel-     employs artificial intelligence (AI) and balanced machine
        ligence company Newzoo. With this, however, come crimi-  learning, along with multiple screening technologies and
        nals attempting to leverage the high-growth space for   transaction data. A comprehensive system should be able
        illegal gain.                                          to collect and analyze hundreds of discrete data points as-
                                                               sociated with every transaction.
        Fraudsters infiltrate the  online gaming world in many
        ways, including:                                       Fraud fighting practices to incorporate include:
            •  Small-ticket orders and card testing: Transac-      1. Advanced AI and machine learning:  AI and ma-
               tions for online game companies are typically low   chine learning technology have virtually unlimited
               in value and often take place within game play.     computing and memory capacity that enable them to
               Also,  these  orders  must  be  approved  or  declined   spot patterns in big data undetectable to humans and
               in real-time to avoid interrupting the game's flow.   predict emerging fraud threats in low-information sce-
               That presents a different set of challenges compared   narios, such as first-time fraud. However, it's important
               to physical goods merchants who can take time to    to note that AI and machine learning by themselves are
               manually review big-ticket transactions before ship-  not as powerful or precise as when they are comple-
               ping products. The nominal amounts typically in-    mented by a rules-based system for maximum control
               volved in online game transactions make these sites   and transparency.
               prime targets for card testing.
                                                                   2. Biometrics: Behavioral biometric technology can
            •  Account takeover and synthetic IDs: A significant   verify and confirm users' identities by monitoring how
               percentage of fraudsters are also gamers. For them,   they  naturally  interact  with  their  devices  ‒  through
               fraud is an economic activity, as well as a form of   mouse movements, keystroke dynamics and other be-
               competition. Once hackers find a successful fraud   haviors ‒ delivering instant identity verification.
               technique or tactic on one site, they use that knowl-
               edge at other sites. Games featuring game currency   3. Multiple, advanced screening: A single tool can be
               or points within game play are the prime targets for   easily defeated. It's essential to employ multiple tech-
               account takeover activity.                          nologies that screen multiple dimensions of every
                                                                   transaction and analyze massive amounts of data.
            •  Spoof sites: Spoof sites are closely linked with ac-
               count takeover fraud, providing stolen user data    4. Account registration: Information required for ac-
               that fuels account takeovers. Fraudulent spoof sites   count registration increases the amount of data avail-
               with cascading style sheet code stolen from legiti-



        38
   33   34   35   36   37   38   39   40   41   42   43