-
Notifications
You must be signed in to change notification settings - Fork 6
Description
Hey folks! I'm from CAF, a Brazilian company founded in 2019 that aims to prevent identity frauds with a variety of products, such as digital onboarding, background checking and facial authentication.
Context and threat
Several types of attacks come from automation carried out by malicious agents engaged against legitimate targets and, in particular, against targets in the financial segment (web and mobile applications).
The most relevant attacks monitored and contained by our team in LatAm refer to abuse in the creation of accounts in digital banks and fintech apps.
In this context, creating fake accounts for money laundering or receiving stolen money in other ways has become quite important for cybercrime, especially in Brazil.
Therefore, preventing account creation by malicious actors is important not only because of fraudulent account creation but it also prevents carrying out other scams, especially those related to phishing against legitimate users.
Despite using real people data in their creation, these accounts are referenced as "Orange accounts" (straw-man, stooge accounts), as they are not controlled by the real owners, but by third parties, usually cybercriminals.
An attack example that ends up using these accounts is what we know as the WhatsApp Scam, where a person impersonates another on WhatsApp and ends up managing to trick a legitimate user into making a fraudulent transfer to an "orange" account. The targets most exposed to this type of attack are older people who are unable to perform some type of validation during the conversation with the criminal.
In most observed cases, abuse is not automated as digital banks already have several defenses in their KYC processes, but they are usually associated with high financial value transactions.
In all transactions of this nature, we observe several similar characteristics (clear signs) of a fraud being carried out.
Proposal
Our proposal is to create a device score mechanism respecting the regionalization/context where that transaction is taking place. Initially, this score would be just another signal for the decision to authorize or not a transaction, however, in a future version of this API, this decision could be made on-device.
For example: Observing signs such as apps installed, apps cloned, battery level, number of times the user used the device in the last 24 hours, device usage pattern (eg if only one app was used many times in the same day, this could be a important signal) and various other signals, it is possible to assign a score for that device.
To protect user privacy, our proposal is, similar to FLEDGE's proposal, that a worklet, configured to load data(K,V)/endpoints from a legitimate backend (from an anti-fraud company, for example), could be used to make the decision (like an on-device auction) of the device score (in a first version, only pattern-matching rules could be used for the calculation – in the future, ML models could be loaded to a more complex calculation).
In this proposal, instead of extracting data from the device, we load logic from reliable backends so that the score decision is kept on-device.
Ideally, user consent should be requested for high-risk transactions that make use of this API, since a variety of data could be used in this calculation (all pre-existing client-side data).
Relevant signs
Observing signs such as apps installed, apps cloned, battery Level, number of times the user used the device, device usage pattern (eg if only one app was used many times in the same day).
Privacy implications and safeguards
If the implementation is carried out completely on-device, there is no exposure of end-user data for possible identification.
This post was made together with @menegais1.