Begin Simulation
Post-Login Account Fraud Simulation
Fake account abuse (a.k.a. new account fraud) is commonly used by fraudsters to exploit organizations' apps and websites. In this simulation, we'll cover how HUMAN helps you detect and neutralize fake accounts if they have made it through the registration process.
Post-Login Account Fraud
Simulation
HIDE ME
Account Fraud is Costly
Fake accounts are used by cybercriminals to commit fraud and abuse. Examples include abusing subscription services and introductory offers or testing stolen credit cards. This type of fraud and abuse has obvious financial impacts on organizations, as well as negative customer experiences and the costs of KYC (know your customer) checks.
Fake accounts are created with false or stolen details.
Promotion abuse, such as exploiting introductory coupons, is a common type of new account fraud.
Testing stolen card details to see if they work is often a consequence of account fraud.
Initial Deployment
HUMAN detects and neutralizes fake accounts by analyzing traffic for abusive and malicious behaviors. This is achieved by deploying a JavaScript snippet to relevant paths (for example login and registration paths, as well as post-login pages that could be targets for abusive activity).
Insert JS Snippet on Template for all relevant pages
Setting Up Rules
Setting up automated response actions is straightforward. Drag and drop actions that will trigger a rule (e.g., a high risk score or particular email domain). Then set automated response actions, such as blocking the device fingerprint, adding the incident to the dashboard, and locking the account.
Choose the response actions that will automatically apply when the rule conditions are met.
Define the trigger conditions for the rule. Multiple conditions can be included in the same rule.
Drag and drop the rule conditions and response actions for fast rule creation.
Dashboard View
When you log into the console, you will start with the Business Insights dashboard. The overview covers incidents, risk levels, most common risky behaviors, what mitigation actions have been taken, geographic source, and email/IP reputation.
Understand what triggered a fake account detection and see what response actions were taken.
See how many fake accounts are detected each month and the associated risk levels.
Get a high-level overview of suspicious activities, monitored activities and devices, and protected accounts by the numbers.
Identify any geographical hotspots for detections and view the email domain and IP address reputations associated with risky behaviors.
SCROLL
Investigation
See the status of the detection, post-investigation.
See how many fake accounts are linked in the detection.
Choose between detections pending investigation, resolved cases, and viewing all.
Understand the activity that triggered the detection.
Switching to the main dashboard, we can see an overview of recent fake account events, split into those that are awaiting review and those that have been resolved. High-level details here show the fake account detections with key details, including how many fake accounts comprise each detection, when it was detected, the trigger and any response actions. Selecting an item takes us to the Investigation Dashboard, where we can examine items in more detail.
Deeper Analysis
The Linked Accounts section shows how many other fake accounts were involved in the event. The Activities Timeline details what took place when (e.g., when fake accounts were registered and low/high risk activities occurred). Linked Account Connections shows which accounts were created using the same IP, device, network, domain, or country. You can see a detailed list of events by scrolling down.
Access a detailed breakdown of activity associated with flagged accounts. Selecting the account ID allows you to investigate it further.
The Activities Timeline shows monitored activities over time for the account. Risky behaviors are clearly called out.
See how many accounts are linked in the same detection (clusters), risk score, and the attack type.
A visual representation of the account clusters shows which accounts are tied to the same email domain. The type of abuse is also called out.
Request a Demo
Account Fraud Defense gives you the ability to - Block Mass Account Creation - Neutralize New Account Fraud - Reduce Abuse and Fraud Request a full demo today.