-
Notifications
You must be signed in to change notification settings - Fork 6
Description
We are Allowme, a business unit from Tempest Security Intelligence, a cybersecurity company from Brazil, Latam, with more than 22 years in operation. Allowme's mission is to help companies protect the digital identities of their legitimate customers through a complete fraud prevention platform.
Context and threat
Automation is one of the main requirements for large scale attacks and high profit for attackers, therefore, it has become a priority from a malicious actor's point of view.
When doing a massive attack, fraudsters usually use navigation automation tools without a graphical interface, or Headless Browser (https://en.wikipedia.org/wiki/Headless_browser), usually using versions of Chrome Webdriver (https ://en.wikipedia.org/wiki/Selenium_(software)#Selenium_WebDriver).
However, a common characteristic in attacks of this nature is that the attacker essentially needs to create many instances of browsers to execute the attack and, when this is done, in general the created browser has very unique characteristics, as if they were installations performed at that moment.
Proposal
Being able to accurately and safely attest to improper manipulations, the lifetime of that User Agent instance, from its initialization to the present moment, can be of extreme importance and value in the detection of automated threats, both on the web and on mobile devices.
On web browsers
The combination of different signals could be used to estimate the lifetime of a device running, for example: lifetime of cookies, time of plugin installation, time since last update, lifetime of an associated profile to the browser, etc.
On mobile devices
For mobile devices, knowing the OS lifetime can be even more accurate, as the hardware can indicate this, in addition to the connection between the device and the manufacturer's application store (Google Play or Apple Store).
On Android, for example, we could use some relevant information, such as:
Date of acquisition of an App on Google Play
Date of installation/re-installation of the App on Google Play
However, an important decision to be made is whether to recompile Apps after the first installation, as this could compromise the lifetime of a given App.
Privacy implications and safeguards
There is no PII data being used to calculate the lifetime of a particular device, so there is very little threat to user privacy.
However, this data could be used as an additional signal to re-identify users if combined with browsing history and other behavioral information.
Safeguard #1
The API could only return if the lifetime is longer than a specific time period, for example:
If the lifetime is longer than 1 day
If the lifetime is longer than 1 week
If the lifetime is more than 1 month
If the lifetime is more than 3 months
If the lifetime is more than 1 year
Thus, it would be difficult to use this data to identify a person, even when combined with other user behavior data.