Page 119 - Cyber Defense eMagazine July 2024
P. 119

simplest tampering methods. Many companies misunderstand  this and end up with a solution that gives
            them a false sense of security.

            But  even device  fingerprinting  solutions  that are  purpose-built  for  fraud prevention  have  become  less
            effective  over  the  last  few years.  The  big  operating  systems  have  limited  the  way  third-party  solution
            providers can use device data, making it even more difficult for traditional device fingerprinting solutions
            to identify new and returning devices.

            Fraudsters have also become increasingly sophisticated. They leverage advanced tools and tactics, like
            emulators, a device that enables them to tamper with apps in a synthetic environment, app cloners, and
            reset schemes to manipulate  or disguise device attributes. For example, fraudsters will perform factory
            resets or reinstall apps, effectively creating  a "new" device in the eyes of basic fingerprinting  solutions.
            These  “new”  devices  create  “new”  accounts  that  bad  actors  use  to  carry  out  scams  at scale  without
            detection.

            At this point, fraud teams are effectively flying blind. They might see 30 new accounts when, in fact, they
            have  all  been  created  by  the  same  user  from  the  same  device.  Without  reliable  device  identification
            capabilities, apps are significantly disadvantaged in their fight against fraud.



            The advantages of a modern approach


            Modern device fingerprinting solutions are purpose-built for fraud and risk management.  Many of these
            approaches  are  intentionally  cookieless,  making  them much  more stable  and immune  to manipulation
            techniques  like cookie  theft.  By  focusing  on high-quality  data  signals,  not  personal  information,  these
            solutions provide a much higher device recognition rate and remain privacy-centric.

            Next-generation device fingerprinting solutions, like the one developed by Incognia, take a new approach
            to device identification.  By adding new layers, like advanced tamper detection and location intelligence,
            modern device recognition solutions are more reliable and provide greater accuracy.



            Here’s what you should look out for when evaluating device fingerprinting  solutions:

            1.  Tamper  detection:  Advanced  tamper  detection  mechanisms  identify  and  thwart  attempts  to  mask
            device identity, ensuring that even sophisticated fraud attempts are detected.

            2. High device recognition rate: Modern device fingerprinting technologies are designed to persist against
            common  fraud  tactics  such  as  factory  resets,  app  reinstalls,  and  emulators  or  app  cloners.  Location
            intelligence adds an additional layer of security. By analyzing location patterns, unexpected relationships
            between devices and accounts often emerge, revealing risky behavior.

            3. Built-in risk analysis: Recognizing a device as new or returning is only half the battle. How do you know
            if it is risky or not? Look for solutions that provide you with risk analysis so that you can take action. A
            solution that combines hard-coded rules and machine learning models that adapt to new fraud gives you
            the most comprehensive  and actionable solution.




            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          119
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   114   115   116   117   118   119   120   121   122   123   124