Ebook Fraud Dictionary
Ebook Fraud Dictionary
-
to Protect Your Business
seon.io
A
SEON Technologies Ltd. info@seon.io
0044-20-351-44790
Fraud Dictionary 2019
All the analysts agree: online fraud is going to increase in the upcoming years. And at
SEON, our job is both to fight it, and to help companies prepare against attacks.
This is why we wanted to compile a list of all the useful terms you might need to
understand, prevent, and combat fraud.
The vocabulary of online security and cybercrime evolves fast, and it’s important to
keep up with the latest terms. But it’s also important to know the basics if this is your
first entry into the world of cybercrime. We’ve compiled a list of both in this dictionary.
2
Fraud Dictionary 2019
2FA
3D SECURE
A security protocol designed for online credit and debit card transactions. It is
designed as an additional password validated by the issuer, which helps transfer
liability to the customer in case of fraud.
2-3 3
Fraud Dictionary 2019
ACCOUNT FARMING
ACCOUNT TAKEOVER
A form of identity fraud where fraudsters gain access to a victim’s account. This
can be for an online store account, bank account, or even app login. The goal is
usually to extract monetary funds, but account takeovers (ATOs) are increasingly
used for other means, such as abusing promotions and coupons, extracting
more user information, or cheating on gambling sites.
Anatomy of 01
an ATO
STEP
02
They log in and change the
shipping address.
STEP
A
account’s linked credit card.
STEP
4
Fraud Dictionary 2019
AFFILIATE FRAUD
Affiliate marketing is a model where marketers are rewarded for directing visitors
towards a specific business. The company tracks conversions through referral
links, and pays out money to the best marketers.
Fraudsters try to earn these commissions by: spamming the referral links; using
software to imitate human behavior and generate fake clicks and transactions;
and maliciously diverting traffic from other sites.
In some cases they will clone the vendor’s website, and host it on a domain
name that looks similar. More advanced techniques include malicious browser
extensions that swap legitimate affiliate URLs for their own, and even inject ads
with referral links into ad-free web pages.
API
ARBERS
A
In the world of online betting and gambling, arbitrage is a technique which sees
fraudsters create multiple accounts to increase their winning odds. Those who
use it are referred to as arbers.
AUCTION FRAUD
5
Fraud Dictionary 2019
BACK DOOR
A way for criminals to bypass security systems to access the data they’re after.
Contrasts with a front door attack, where a virus or attack is done with help from
the user, for instance by downloading an infected email attachment.
BAITING
BIN ATTACK
B
BITCOIN
6
Fraud Dictionary 2019
BONUS ABUSE
Also known as promo or coupon abuse. This type of fraud sees fraudsters create
multiple accounts to cash out promotional offers. It can be used for signup
bonuses, and is particularly prevalent in the gambling industry.
BOT ATTACKS
In the context of fraud prevention, bots are used to automate and repeat the
same attack with different data until it works. Bots can be used to attempt ATOs,
create multiple accounts (account farming), or process numerous stolen credit
card numbers at checkout.
BOTNET
Also known as a zombie army. A botnet is a network of computers that have been
infected with bots (viruses) for mass attacks. These botnets can try to infect
more computers or spread spam for affiliate fraud, amongst other reasons. They
can also act as a proxy to mask a criminal’s original IP address.
BROWSER HASH
B
In device fingerprinting, a browser hash is an ID created by combining data from
a user’s browser, operating system, device and network. This hash remains
unchanged, even if the user browses privately, or if they clear their browser
cookies and cache. However, a device with multiple browsers or multiple browser
versions installed will generate different hashes.
BURNER PHONE
Also called a “burn phone”. The term originates from the drug dealing world, and
is used for inexpensive mobile phones designed for temporary use. It allows
fraudsters and criminals to link an account to a disposable phone number, for
instance to bypass 2FA.
These days, phone numbers can be generated via burner phone apps or services.
These work like prepaid phone cards, only allowing you to use them for a limited
amount of time before being recirculated. Because they go through your phone’s
original cellular data, they are not untraceable.
7
Fraud Dictionary 2019
CANVAS FINGERPRINTING
A form of online tracking. It uses the HTML5 canvas element on web pages to
identify and track browser, operating system, and installed graphics hardware. It
is used in device fingerprinting.
CARDING
General fraudster term for using stolen credit card data. This is either used for
direct purchases, or charging prepaid or gift store cards, which are then resold.
CATFISHING
A form of social engineering where fraudsters and criminals create fake online
identities to lure people into emotional or romantic relationships for personal
or financial gain. Online seduction and blackmail are used to acquire personal
information such as credit card numbers, social security numbers, or home
addresses, amongst others.
C
CC
What fraudsters call stolen credit card data. A full CC contains the original
cardholder’s name and address, expiry date, and CCV. It becomes a Fullz when
other personal data points are added to the package.
8
Fraud Dictionary 2019
CHARGEBACK
Chargebacks are a protection for buyers who want to dispute online purchases.
They can claim a chargeback to defend themselves against fraud or purchases
made without their knowledge or permission.
The credit card company involved with the transaction will review the
chargeback claim and review evidence for or against it. If it is approved, the
buyer is refunded, and the merchant has to pay a chargeback fee to cover the
administrative costs.
Here is the anatomy of a chargeback:
C
Merchant can’t provide good evidence.
Funds are taken from the Acquirer’s
bank and transferred back to the
buyer’s issuing bank
CLEAN FRAUD
Also known as Friendly Fraud, First-Party Fraud or Fraud by False Claim. It’s
fraudulent transactions that don’t get detected as they appear legitimate. Harder
to flag because it only involves real data, so no fake identities or user accounts.
CLICKJACKING
9
Fraud Dictionary 2019
CONFUSION MATRIX
Also known as an error matrix. It is a table designed to see correct and incorrect
predictions for a classification problem. It helps visualize the errors and the type
of errors so you can measure and improve its precision.
223 0 0
APPROVE
0 EUR 0 EUR 0 EUR
3 38 3
REVIEW
0 EUR 24,000 EUR 0 EUR
0 1 1012
DECLINE
0 EUR 4,000 EUR 91,360 EUR
COOKIE HASH
An ID generated for each browser session. While clearing cookies and cache will
generate a new hash, it is still useful for fraud prevention: if multiple users share
the same hash, it shows they are using the same browser and device.
CRYPTO
C
financial transactions. It’s often referred to as “digital money”. While it has many
consumer benefits (low transaction fee, fast, decentralized), it is also the main
currency that fraudsters and criminals use to exchange products and services
on the darkweb.
CRYPTOMINING
CYBERSECURITY
10
Fraud Dictionary 2019
DARK WEB
SURFACE WEB
Google
Wikipedia
4%
Bing
Financial Records
D
Medical Records Governemnt Resources
90%
Academic information
Private Communications
Drug traficking, weapons
6%
and other illegal informations
and activities
11
Fraud Dictionary 2019
DATA ENRICHMENT
“Fraud Prevention is all about discovering who you are dealing with.
What kind of users should be allowed into your system, and which
ones will try to scam you in the long term. This is where enriching
simple data fields externally can make all the difference.”
DECISION TREE
D
The path from root to leaf represents the entirety of a classification rule, and
fraud analysts can quickly understand or tweak them to get more precise results
as needed.
DEEP FAKE
A technology that uses real video or audio from a person, and allows people to
create synthetic versions of that person.
12
Fraud Dictionary 2019
DEEP LEARNING
Deep Learning (DL), is a form of Machine Learning (ML) that can be fed huge,
unstructured data sets. It is at times used to solve problems too complex for
machine learning.
DEEP WEB
The entirety of the web that is not accessible by search engines. For instance,
online banking pages, legal and government documents, or scientific reports
have no reason to be indexed. The Dark Web is part of the Deep web.
DEVICE FINGERPRINTING
D
device and cookie hashes that act as IDs.
DEVICE HASH
A string that acts as an ID based on the device hardware only (GPY, screen size,
HTML5 canvas, etc..) While many users can share the same device hash (for
instance two iPhone 7 Safari users), this allows the flagging of Remote Desktop
Connections, virtual machines or emulators, which all share the same hashes.
DIGITAL FOOTPRINT
Also known as Digital Shadow. The trail of data created when using the Internet
on any device. For fraud prevention, it can be found in a user’s online profiles,
association with data breaches or blacklists. In a more general sense, it can
also include emails sent, websites cookies, and subscriptions to online services,
amongst others.
13
Fraud Dictionary 2019
DOMAIN QUALITY
DOS / DDOS
DROP ADDRESS
The address where fraudsters sent good purchased illegally (for instance with
a stolen card). Some will go as far as making an abandoned house look lived
in (mowing the lawn, plugging in electricity generator) to use the post box for
recovering their goods.
D
Accomplices in drop address scams are often unaware they are helping fraudsters.
They are often recruited through online job offers. The fraudster pretends to be in
a different country, and offers to pay the hired person to forward them the stolen
goods.
DUMPSTER DIVING
14
Fraud Dictionary 2019
EMULATOR
Also known as a Virtual Machine. Software used to appear like (spoof) a device,
browser or operating system. This allows fraudsters to repeat multiple attempts
at login, signup or payment with with different parameters so they don’t get
blocked.
EMAIL PROFILING
Gaining more information about a user based on their email address. It is also
referred to as Reverse Email Lookup, Backward Email Search, or Email Checker.
You can see if the email exists, if it is linked to social media profiles, or found on
blacklists and data breaches.
DOMAIN IS A FREE PROVIDER
E
EMAIL ADDRESS IS DELIVERABLE
A technique which compares the characters used in an email address with other
known information. For instance, an email name which contains a lot of numbers
could be suspicious. Those containing a name that doesn’t match the user’s
name are also considered risky.
ENCRYPTION
The process of encoding information so that only authorized parties can read it.
It is used on websites, highly recommended for storing personal data, and useful
in personal communications.
15
Fraud Dictionary 2019
Legitimate user actions that are blocked by fraud prevention tools. A high rate of
false positives could show that the prevention rules are not calibrated properly.
Note that false declines are a source of tremendous friction and frustration for
users, and can damage businesses profits, who will turn towards more flexible
competitors. Using a good algorithm and confusion matrix can help see when
and why these happen to maximise true positives.
FLAGGING
Marking users as suspicious via a fraud prevention tool. Their actions can be
blocked, or reviewed manually based on data points such as home address, IP
address, social media usage, device fingerprinting or more. Ideally, the flagged
data points should be marked as such as shared between multiple users of the
fraud prevention team.
FRAUD
F
Using deception for personal gain. While online fraud is considered a cybercrime,
not all cybercrime has to do with online fraud in nature. Protecting businesses
against it is the job of fraud analysts. They can use a fraud prevention tool, or
fraud filter to automate the process.
FRICTION
Slowing down a user journey. With fraud prevention tools, it can be adding an
extra security step, or manual review to confirm a transaction. Friction is notable
for decreasing conversions, so online businesses need to balance security and
ease of use.
16
Fraud Dictionary 2019
FRIENDLY FRAUD
When customers claim a chargeback for being the victims of fraud. It’s also
known as lie fraud and is the fastest growing reason for chargebacks. Friendly
fraud happens when buyers experience remorse, they refuse to pay for a family
member’s purchase, or simply want to exploit the system to gain a product or
service without paying for it.
FULLZ
The name fraudsters give to a package containing a person’s real name, address,
and form of ID. It usually contains all the information needed to steal someone’s
identity.
F 17
Fraud Dictionary 2019
GATEWAY (PAYMENT)
The name of the service that authorizes payment processing for merchants.
PayPal, Stripe or WorldPay are all payment gateways, acting as a bridge between
credit card companies, banks and retailers. You can implement fraud prevention
at that stage of the transaction process.
GHOST BROKING
GRAPH NETWORK
G 18
Fraud Dictionary 2019
HEURISTIC RULES
Heuristic rules in computer science help solve a problem faster and with fewer
resources than with classic detection methods. In fraud prevention, it can be a
system that blocks transactions quickly based on a blacklisted data point such
as user ID, email, browser hash or other.
It’s worth noting that heuristic rules use algorithms that trade accuracy for speed.
This makes them particularly useful for time-sensitive requests, for instance
when trying to decide if a transaction is fraudulent or not as quickly as possible.
HONEYPOT
HTTPS
H
See also: SSL / TLS
19
Fraud Dictionary 2019
IDENTITY FRAUD
IDENTITY THEFT
Acquiring someone’s personal data such as credit card numbers, phone number,
or other data points in order to impersonate for a number of actions: opening
new accounts, applying for loans, purchasing goods, or posting fake ads and
reviews.
IP ADDRESS
20
I
Fraud Dictionary 2019
KEYLOGGING
Installing a program that logs and shares every key pressed on someone’s
device. They are used to gather sensitive information such as passwords and
bank details.
KYC
K-L
bothersome for users a smoother user experience
LINK ANALYSIS
The practice of using data to create networks that help investigate relationships
between entities. Useful data for flagging fraudsters via link analysis can be
payment transactions, logins, or new account openings, amongst others.
21
Fraud Dictionary 2019
MACHINE LEARNING
Machine Learning (ML) is a branch of Artificial Intelligence (AI) that allows data
analysis to improve overtime, by learning from the data it is fed. It allows systems
to identify patterns and make decisions with minimal human intervention,
essentially reprogramming themselves with new, updated rules.
MATCHED BETTING
Using multiple accounts on gambling sites to improve betting odds and make
money from free offers. A person will place a Back bet (backing a certain
outcome). They will then create another account to place a Lay bet (backing the
opposite outcome). This cancels out the losses, but allows them to profit from
the free bet offer. Note that matched betting is legal in some regions, such as
the UK.
See also: Bonus abuse, Multi Accounting
MFA
M
See also: 2FA
MONEY MULES
People who receive money into their account and transfer it elsewhere for a fee.
It is usually done for money laundering, which makes money mules complicit in
illegal crimes.
Like with address drop scams, money mules are often unaware they are helping
criminals. They are commonly found via fake job posts, and hired under false
pretenses, for instance forwarding money a charity in a foreign country.
MULTI ACCOUNTING
When one person creates multiple accounts with the same platform. It can be
innocent (lost login details) or for fraudulent purposes, such as matched betting,
bonus abuse, or creating fake reviews.
22
Fraud Dictionary 2019
The technology that enables contactless payments. It allows two devices, such as
smartphones and POS terminals to exchange data in order to process transactions.
PHARMING
A cyber attack which redirects traffic from a website to another. The second
website is usually a copy of the original, designed to gather personal information
such as credit card numbers.
PHISHING
The malicious act of stealing someone’s personal data through deceptive emails,
phone calls, or other methods.
See also: See also: 2FA
PHONE ANALYSIS
N-P
Also known as reverse phone lookup. A process which lets you glean information
about a user based on a phone number. Checks can verify if the phone is valid,
network type, and even last time seen online and profile picture, if linked with
mobile-first services like WhatsApp or Viber. Linking a phone number to social
media networks is one of the best tools for getting a full picture of users based
on that single data point.
PROMO ABUSE
PSD2
The second Payment Services Directive from the European Union, which aims to
break bank’s monopolies over customer data. It is designed around the OpenAI
protocol, which allows access to customer’s banking data for integration with
third party services like sending payments.
23
Fraud Dictionary 2019
RANSOMWARE
RESHIPPING
Also known as Delivery Address Fraud and Fake Address Fraud. A process where
criminals fool people into sending goods or cashier cheques purchased with
stolen credit cards, usually to an address not linked to their name. It helps muddy
the trail between fraudulent purchases and delivery addresses.
R
See: Phone Analysis
24
Fraud Dictionary 2019
SCA
SIM SWAPPING
A.k.a. SIM splitting or SIM jacking. Takes advantage of 2FA via SMS. Sees
fraudsters acquire a phone number through hacks, phishing or sheer luck. They
then call the mobile phone’s provider, and claim to want to change their number
to a new one. The new number, which is in the fraudster’s possession, will then
receive all the SMS used for mobile verification, which allows them to access
other accounts such as email, social media, or even mobile banking.
SMURFING
S
In the iGaming industry, the term refers to a special kind of multi accounting. It’s
for gamers who want to improve their tactics without damaging the statistics of
their main account.
SMTP
Simple Mail Transfer Protocol. The protocol which allows the delivery of emails.
An SMTP check can be used by fraud tools to confirm the validity of an email
address.
25
Fraud Dictionary 2019
SOCIAL ENGINEERING
SPEAR PHISHING
Format via emails that target a specific organisation, or specific people within an
organisation. Spear-phishing usually involves some form of social engineering to
gain the confidence of intended victims. Unlike phishing, spear-phishing emails
are addressed to deliberately chosen recipients rather than sent out randomly.
S
SPOOFING
Falsifying data such as an IP address, email address or caller ID. For instance,
spammers will spoof a sender email address to mislead the recipient or gain
their trust for phishing.
SSL / TLS
Secure Sockets Later, and Transport Layer Security. Certificates that confirm
encryption between a server (typically a website) and client (browser). The
secured connections are established with a “Handshake” protocol, which can be
analyzed by certain tools.
26
Fraud Dictionary 2019
SSL INTERCEPTION
SYNTHETIC ID
S
Unlike common identity fraud, Synthetic ID fraud combines pieces of real personal
data with fake data to create a new, untraceable identity. An example is the rise
in synthetic IDs that use children’s personal info in order to have a clean credit
score for loaning fraud.
27
Fraud Dictionary 2019
TOKENIZATION
In data security, tokenization happens when you substitute sensitive data for
a non-sensitive equivalent. For instance, a customer’s account number can be
replaced with randomly-generated numbers. It is a security layer often used in
conjunction with encryption.
TRANSACTION FRAUD
Transaction fraud, or payment fraud and credit card fraud, is a broad term that
covers any crime committed when purchasing a service or item. It is the direct
result of card theft, account takeover, or card cloning.
TROJAN
T
TUMBLER
A service that moves cryptocurrencies from one digital wallet to another to make
it harder to trace back the funds back to the original owner. This is essentially
digital money laundering, usually performed for a fee for cryptocurrencies like
Bitcoin.
28
Fraud Dictionary 2019
The goal of unsupervised machine learning is to make sense of data that has not
yet been labeled, that is to say, where we do not have the right answer. It uses
different algorithms to identify anomalies, irregularities and outliers compared
with previous historic data.
One method is to automatically flag data points that noticeably deviate from
the statistical norm. Through training, the machine learning system can then
become more efficient at identifying regular noise from abnormal behaviour.
This is helpful to identify things like seasonal changes without increasing false
positives.
U 29
Fraud Dictionary 2019
VELOCITY CHECKS
The ability to check and compare user behavior using variable data such as
transaction amount, or login attempts during a specific timeframe. Looking at
the time elapsed between each action is a powerful tool that allows the creation
of Velocity Rules, and Velocity Filters.
Distinct Count of user ID for the same IP address in the last 10 seconds ≥ 1 + 1 SCORE
VOICE CLONING
A technology which allows criminals to “make” someone say what they want by
creating a synthetic, or cloned, version of their voice.
VISHING
Voice phishing done via phone calls. Callers will impersonate IT engineers,
bank managers, and even company executives, whose voices are synthetically
recreated via deepfake technology.
V-W
See also: Voice Cloning, Deepfake, Phishing
A machine learning model that delivers clearly readable rules. This helps fraud
analysts with manual reviews and understanding scores so they can adjust their
approve / decline thresholds. Whitebox models can use tools like Decision Trees
or other visualization and decision support tools to give transparency into the
classification process.
30
Fraud Dictionary 2019
And yet, knowing the difference between a whitebox and a blackbox system in machine
learning, for instance, can be tremendously beneficial. Not just for the fraud prevention
team, but across all business departments.
Since fraud is a problem that affects everyone, it is in the best interests of sales people
and executives to understand how prevention work too. Hopefully, this dictionary will be
a great primer on the topic that you can revisit for many years to come.