Post-Login Account Fraud Simulation
Fake account abuse (a.k.a. new account fraud) is commonly used by fraudsters to exploit organizations' apps and websites.
In this simulation, we'll cover how HUMAN helps you detect and neutralize fake accounts if they have made it through the registration process.
Post-Login Account Fraud
Post-Login Account Fraud
Account Fraud is Costly
Fake accounts are used by cybercriminals to commit fraud and abuse. Examples include abusing subscription services and introductory offers or testing stolen credit cards.
This type of fraud and abuse has obvious financial impacts on organizations, as well as negative customer experiences and the costs of KYC (know your customer) checks.
Fake accounts are created with false or stolen details.
Promotion abuse, such as exploiting introductory coupons, is a common type of new account fraud.
Testing stolen card details to see if they work is often a consequence of account fraud.
Insert JS Snippet on Template for all relevant pages
Setting Up Rules
Setting up automated response actions is straightforward. Drag and drop actions that will trigger a rule (e.g., a high risk score or particular email domain).
Then set automated response actions, such as blocking the device fingerprint, adding the incident to the dashboard, and locking the account.
Choose the response actions that will automatically apply when the rule conditions are met.
Define the trigger conditions for the rule. Multiple conditions can be included in the same rule.
Drag and drop the rule conditions and response actions for fast rule creation.
When you log into the console, you will start with the Business Insights dashboard.
The overview covers incidents, risk levels, most common risky behaviors, what mitigation actions have been taken, geographic source, and email/IP reputation.
Understand what triggered a fake account detection and see what response actions were taken.
See how many fake accounts are detected each month and the associated risk levels.
Get a high-level overview of suspicious activities, monitored activities and devices, and protected accounts by the numbers.
Identify any geographical hotspots for detections and view the email domain and IP address reputations associated with risky behaviors.
See the status of the detection, post-investigation.
See how many fake accounts are linked in the detection.
Choose between detections pending investigation, resolved cases, and viewing all.
Understand the activity that triggered the detection.
Switching to the main dashboard, we can see an overview of recent fake account events, split into those that are awaiting review and those that have been resolved.
High-level details here show the fake account detections with key details, including how many fake accounts comprise each detection, when it was detected, the trigger and any response actions. Selecting an item takes us to the Investigation Dashboard, where we can examine items in more detail.
The Linked Accounts section shows how many other fake accounts were involved in the event. The Activities Timeline details what took place when (e.g., when fake accounts were registered and low/high risk activities occurred).
Linked Account Connections shows which accounts were created using the same IP, device, network, domain, or country. You can see a detailed list of events by scrolling down.
Access a detailed breakdown of activity associated with flagged accounts. Selecting the account ID allows you to investigate it further.
The Activities Timeline shows monitored activities over time for the account. Risky behaviors are clearly called out.
See how many accounts are linked in the same detection (clusters), risk score, and the attack type.
A visual representation of the account clusters shows which accounts are tied to the same email domain. The type of abuse is also called out.
Request a Demo
Account Fraud Defense gives you the ability to
- Block Mass Account Creation
- Neutralize New Account Fraud
- Reduce Abuse and Fraud
Request a full demo today.