A leading payments industry news source for more than 17 years. Glenbrook curates the news and keeps you abreast of the important daily headlines in payments.
Search Payments News
May 2, 2022
On the web
Four Ways Merchants Can Protect Against Account Takeover
Forbes
“Account takeover (ATO) is the process by which criminals use a variety of methods, including purchasing stolen information from the dark web, social engineering, phishing, password cracking or credential stuffing to take ownership of online accounts that do not belong to them for a variety of nefarious purposes. Unfortunately, this attack method has seen an uptick during these turbulent times. In the last year, 27% of the global merchants that participated in the 2022 Global Payments and Fraud Report experienced some form of ATO fraud, and this attack method now ranks as the fifth most prevalent for North American merchants.”
August 25, 2021
On the web
Coinbase Slammed for What Users Say Is Terrible Customer Service After Hackers Drain Their Accounts
CNBC
“Interviews with Coinbase customers around the country and a review of thousands of complaints reveal a pattern of account takeovers, where users see money suddenly vanish from their account, followed by poor customer service from Coinbase that made those users feel left hanging and angry. Making the issue even worse, cryptocurrency transactions cannot be reversed, according to the FBI. Experts say once criminals access an account, funds can be drained in minutes.”
May 20, 2020
On the wires
Account Takeover Attacks Are an Enormous Vulnerability for Which Many Merchants Are Unprepared
“Riskified, the payments and fraud-prevention solutions provider, today released a survey on the effect of Account Takeover (ATO) attacks on eCommerce merchants and customers. ATOs happen when a bad actor gains access to a legitimate customer’s eCommerce store account and uses that account for fraud. The survey shows that ATO attacks have a huge negative impact on customers and merchants, damaging brand reputation and hurting merchants’ bottom lines. Despite that, many merchants lack security measures, and more than one in three (35%) of merchants report that at least 10% of their accounts have been taken over in the last 12 months.”
May 13, 2019
On the web
What You Need to Know If You E-transfer Money | CBC News
CBC
“A system to transfer money online — used over a million times a day in Canada — is not as safe as it advertises, says a Royal Bank customer who had $1,734 stolen during an e-transfer. The theft occurred after Anne Hoover of Peterborough, Ont., e-transferred money from her RBC account to her friend Fran Fearnley, only to have a fraudster intercept the transaction and divert the money to his own account at another bank. “I always use e-transfer,” says Hoover. “I thought it was a safe way to send money.” An RBC manager says an internal investigation indicated that Fearnley’s email account had been hacked, and when Hoover sent the e-transfer, the fraudster figured out the answer for the security question necessary to deposit the money, and then redirected it to a different bank account.”
February 27, 2019
Top Post
Retailers Were Inundated With 10 Billion Credential-Stuffing Attempts In Just Eight Months
Digital Transactions
“In the Web-services provider’s most recent “State of the Internet Security” report released Wednesday, Akamai says criminals like credential stuffingbecause it’s a numbers game. It’s an integral element in taking over a legitimate account to appear as the bona fide customer, thus skirting anti-fraud measures. In credential stuffing, criminals pull data from a database containing valid passwords and user names and attempt to get into a consumer’s online accounts, without much operator action.”
October 11, 2018
On the wires
Identity Spoofing Hits the Jackpot as the Primary Attack Vector on Gaming and Gambling Sites, Reveals New ThreatMetrix Cybercrime Report
“In the second quarter, location spoofing became the fastest growing attack vector in the space, increasing 257% year-on-year. This is due to the availability of more sophisticated location spoofing tools, which fraudsters use to attempt to disguise their true location to launder money. From collusive play and self-excluders, to malicious account takeovers (ATOs), operators must always be able to differentiate trusted users from fraudsters.”
September 25, 2018
On the web
2018 Payment Security Report
Verizon Communications
“Lack of sustainable control environments remains a top contributor and precursor to ineffective controls, which in turn become susceptible to data breaches. Organizations achieve sustainable PCI Security compliance when they demonstrate a consistent capability to maintain ongoing operation of all required security controls within their compliance environment.”
September 14, 2018
On the web
Interac: One Phish to Phish Them All
Cybercrime & Doing Time blog
“I recently had the pleasure of bumping into some of my Canadian friends at a Law Enforcement conference. So when I saw someone mention a “National Bank of Canada” phish, I thought I would pull on the string a bit and see if it was actually an “Interac” phish. Interac is a system for easily sending money between different Canadian banks. The phishers love it, because by imitating Interac, they can steal login information from any Canadian, regardless of where they bank. By walking up to a higher directory, sure enough, the National Bank of Canada phish was just a tiny part of an underlying Interac phish hosted at 178.128.125[.]127, a Digital Ocean box in Kalívia, Attiki, Greece.”
August 30, 2018
On the web
Why Synthetic identity fraud on the rise – The battle is just beginning
Payments Cards and Mobile (Opinion)
“Synthetic identity fraud differs from tradition identity theft in that the perpetrator creates a new synthetic identity rather than stealing an existing one. The process starts with someone stealing real social security numbers that aren’t actively being used — think children and elderly people who use little, if any, credit — and then creating identities by adding fake addresses.”
August 27, 2018
On the web
What Cyber-War Will Look Like
The Scholar's Stage
“In a report Cancian wrote for the Center for Strategic and International Studies on how great powers adapt to tactical and strategic surprise, Cancian sketched out twelve “vignettes” of potential technological or strategic shocks to make his abstract points a bit more concrete. “
Payments News
Give us your email address or link to our RSS feed and we’ll push the daily Payments News headlines to you.
Top Stories from Payments News
Glenbrook Payments Boot camp®
Register for the next Glenbrook Payments Boot Camp®
An intensive and comprehensive overview of the payments industry.
Train your Team
Customized, private Payments Boot Camps tailored to meet your team’s unique needs.
OnDemand Modules
Recorded, one-hour videos covering a broad array of payments concepts.
Glenbrook Press
Comprehensive books that detail the systems and innovations shaping the payments industry.