Your digital identity ecosystem is probably under attack right now. You may have some indication of the attack, like unexplained significant drops in network performance or a ransom request, or it may be completely unbeknownst to you. But chances are, you’re under attack. So how do you know if you’re under attack? Well, the safe bet is to simply assume you already are. But, there are other indicators. Odd login behaviour, large numbers of failed login attempts, and huge spikes in login attempts are all likely evidence of something malicious afoot.
As your trusted IAM partner, Ping has a vested interest in helping you protect your business. Our experience with the largest enterprises in the world has shown us that fraudsters, as big and scary as they can be, are also human and follow the path of least resistance. They mostly target the weakest links – your users. With the increasing sophistication and quality of attacks, users often fall victim to credential theft via phishing, vishing, smishing, and man-in-the-middle attacks, precisely because it is so challenging to differentiate malicious messages from genuine ones.
Stop Account Takeover
Detect and prevent fraud in real-time with the vendor you already trust.
Major forms of identity fraud stemming from attacks on your users include account takeover (ATO), new account fraud, and MFA fatigue. While Ping does everything possible to remediate vulnerabilities and protect your mission-critical Ping stack wherever possible, preventing bad actors in real-time at the user session level falls on you, the IAM administrator. It’s a large burden to bear, but Ping has your back and it starts with detection.
Ping Can Help Detect Account Takeover,
New Account Fraud, and MFA Fatigue
Account Takeover (ATO)
Cybercriminals hijack sessions and log in with stolen credentials.
New Account Fraud (NAF)
Hackers register with stolen or synthetic identities.
MFA Fatigue (aka MFA Bombing)
Fraudsters bombard users with MFA prompts to annoy to the point of authentication.
I am a big fan of Oscars and last year the Academy awarded seven of them to a motion picture called ‘Everything Everywhere All At Once’. I love this title because it encapsulates the essence of early fraud detection.
Everything means that we need to look beyond just credentials. While credentials are important, the context of the authentication journey is equally relevant. We are creatures of habit, and it is possible to profile our behaviour in digital channels. Examples include the devices we use, our location, how we type and move the mouse (behavioural biometrics), the applications we access, the times of day or night we are active, failed login attempts from specific IP addresses, or the number of accounts accessed from a single device. This list continues to grow as we evolve and learn about new trends and attack vectors.
Everywhere implies the need to examine all the channels available to the user. It is no longer sufficient to protect web applications without considering mobile devices or analogue channels like customer service helplines. Most of us use at least two of these channels in our everyday interactions with services such as retail, banking, energy or mobile communication.
All at once - a layered, defence-in-depth approach is essential for spotting malicious behaviour. Most risk signals from the context we evaluate during digital journeys could potentially be bypassed by malicious actors if viewed in isolation. However, by stacking and analysing these signals together in parallel, we significantly enhance our detection capabilities. For example, a malicious actor might use a VPN or proxy to appear closer to the genuine user's location and avoid detection of an impossible travel attack. However, if we also track those known services, another predictor - such as an anonymization attempt - will be triggered, increasing our ability to detect and thwart the attack.