FraudHIGH

Customer Authentication - Why Are They Sending Money to Scammers?

Featured image for Customer Authentication - Why Are They Sending Money to Scammers?
HNHelp Net Security·Reporting by Help Net Security
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, customers can be tricked into sending money even after logging in securely.

Quick Summary

Fraud expert Lenny Gusel reveals how separating identity management from fraud detection increases risks. Customers can still be scammed even after authentication. Integrating these systems is crucial for security.

What Happened

In a recent video by Help Net Security, Lenny Gusel, Head of Fraud Solutions at Feedzai, highlights a pressing issue in digital security. He explains how customer identity and access management (CIAM) has become intertwined with digital fraud detection. The crux of the matter is that treating these systems separately can create significant risks for organizations and their customers.

The concept of continuous, contextual trust is central to this discussion. Unlike traditional CIAM, which grants access at a single point in time, modern fraud detection systems monitor user behavior throughout an entire session. This includes analyzing device signals, network context, and user interactions, such as how they tap or swipe on their devices.

Who's Being Targeted

The convergence of CIAM and fraud detection is crucial for all organizations that handle sensitive customer information. Businesses that have not integrated these two systems may find themselves vulnerable to scams. Customers, despite passing authentication checks, can still fall victim to fraudsters. This is particularly concerning in scenarios like account openings, in-session behavioral monitoring, and third-party payment flows.

Organizations that fail to adapt to this integrated approach risk losing not only money but also customer trust. Fraudsters are increasingly sophisticated, often exploiting gaps in security that arise when systems are not aligned.

Signs of Infection

Gusel outlines several signs that indicate when a customer might be at risk of falling for scams, even after authentication. These include unusual account activity, such as unexpected payment requests or changes in user behavior that deviate from the norm.

By continuously monitoring these behaviors, organizations can apply necessary friction to transactions that appear suspicious, allowing genuine customers to navigate their accounts without interruption. This proactive approach can significantly reduce the likelihood of fraud.

How to Protect Yourself

To combat these risks, organizations must integrate their CIAM and fraud detection systems. This means adopting technologies that allow for real-time monitoring and analysis of user behavior. By doing so, they can identify potential threats before they escalate into significant financial losses.

Here are some recommended actions:

  • Implement continuous monitoring of user sessions to detect unusual activities.
  • Educate customers about recognizing signs of fraud and how to report suspicious activities.
  • Adopt advanced fraud detection tools that leverage machine learning to adapt to new threats.

By taking these steps, organizations can not only protect their customers but also enhance their overall security posture against evolving fraud tactics.

🔒 Pro insight: Organizations must prioritize integrating CIAM with fraud detection to mitigate risks and enhance customer trust in digital transactions.

Original article from

HNHelp Net Security· Help Net Security
Read Full Article

Related Pings

HIGHFraud

Device Code Phishing - Attacks Surge 37 Times in 2026

Device code phishing attacks have skyrocketed this year, with a 37x increase. Users of IoT and streaming devices are particularly at risk. New phishing kits like EvilTokens are making these attacks easier for cybercriminals. Stay alert and protect your accounts.

BleepingComputer·
HIGHFraud

Job Scams - Coca-Cola and Ferrari Offers Are Traps

Scammers are impersonating Coca-Cola and Ferrari with fake job offers to steal your passwords. Job seekers are at high risk as these scams become more sophisticated. Protect your personal information by verifying job offers directly with companies.

Malwarebytes Labs·
HIGHFraud

FCC Proposes $4.5 Million Fine for Voxbeam's Fraudulent Calls

The FCC is proposing a hefty fine against Voxbeam for allowing fraudulent calls to reach American consumers. This could lead to stricter regulations on voice service providers. Stay alert to protect your personal information from scams.

The Record·
HIGHFraud

Windows Extortion Plot - Engineer Pleads Guilty to Charges

A former engineer has pleaded guilty to locking Windows admins out of servers in an extortion scheme. This incident underscores the risks of insider threats. Rhyne's actions could lead to a 15-year prison sentence. Companies must strengthen their cybersecurity measures to prevent similar attacks.

BleepingComputer·
MEDIUMFraud

Business Email Compromise - The New Threat Landscape Explained

A recent fraud attempt shows how business email compromise is evolving. Small organizations are now prime targets for these scams. Awareness is key to staying safe.

Cisco Talos Intelligence·
HIGHFraud

Vacant Homes - Adversaries Exploit Mail for Fraud

Criminals are exploiting vacant homes to intercept mail and commit fraud. This method targets sensitive information, leading to identity theft. Stay vigilant and monitor your mail to protect yourself.

BleepingComputer·