ban-account-takeover

ACCOUNT TAKEOVER

Avert Any ID Threat

Revelock detects any anomalies that signal an account takeover by simply asking are you really you? Unlike other technologies that require you to keep up with every new attack that comes along, Revelock focuses on unusual behavior for a particular user that indicates an attack. 

all-in-one-prevention-platform-09

 

id-impersonation-icon ID Impersonation Attacks

Every ID Impersonation attack starts with stolen credentials.

Revelock takes a two-pronged approach to defending against ID impersonation attacks. First, Revelock prevents malware or phishing attacks from stealing credentials to begin with. Revelock Active Defense enables fraud teams to detect malware, RATs or phishing attacks and automatically enforces policies that vanquish them - immediately protecting users and mitigating risk.

Because many stolen credentials are readily available on the Dark Web for bad actors to use to impersonate legitimate users, Revelock also offers a second, deeper line of defense.  Our Know Your User approach continually asks, “are you really you?” to give legitimate users access while blocking bad actors. Our hybrid AI technology analyzes user behavior, biometric, device and network data to create a BionicID™ for all users starting at sign-up.

We update, analyze and compare this BionicID at every interaction continuously scoring risk based on per user models, population-based models and bad actor models to stay ahead of the rapidly evolving threat landscape and the latest ID impersonation threats. Any deviation from predefined parameters, for example when bad actors use stolen credentials to login, triggers pre-configured follow-on actions.

id-manipulation-iconID Manipulation Attacks

Revelock Active Defense protects banks from the most common types of ID manipulation attacks designed to hijack a user session, including: 

  • Remote Access Trojans that allow bad actors to take control of a user's computer during a banking session.
  • Remote Access Tools, which are legitimate applications that attackers can compromise and use to take control of a device.
  • Form grabbing malware attacks capable of injecting code into a browser session to dupe the user into entering confidential data (credentials, PINs, OTPs, etc.).

Once bad actors use one of these attacks to control the device, they can display spoofed content, such as web pages and pop-up banners, to fool users into providing credentials. They might also execute fraudulent transactions, such as submitting a one time password to approve a transfer. Because these attacks bypass traditional account security and temporarily take control of a victim’s account after the user logs in, this type of attack is easier to execute. 

Revelock detects these attacks by continuously scoring risk based on per user models, population-based models and bad actor models. Revelock Active Defense then stops them by:

  • Blocking Remote Access Trojan generated webpage or pop-ups immediately protecting the user.
  • Stopping attackers using Remote Access Tools that gained control of a user’s device by taking specified actions, such as requiring additional authentication, automatically terminating the session, or locking the account.

risk-based-scoring-icon-1Continuous Risk Scoring

Revelock’s Know Your User approach analyses the risk of every user interaction by continually examining user BionicIDs™ for anomalies, continuously scoring risk based on per user models, population-based models and bad actor models, as well as making sure user devices are not infected by malware and that user sessions have not been hijacked. Fraud analysts can use the Revelock Console to adjust the sensitivity of anomaly-based alerts to minimize false positives. 

This continuous user verification and risk analysis enables you to comply with a range of regulations  Strong Customer Authentication (SCA), PSD2 Compliance, Card Not Present (CNP) fraud prevention, 3D Secure verification, and Anti Money Laundering (AML) regulations while improving the efficiency of your New Account Opening and Transaction Monitoring systems.

Should this analysis uncover BionicID™ anomalies, Revelock immediately takes pre-specified follow-up actions. For example, if malware has compromised a user’s device, the mobile app or web page can provide the first line of defense and stop the attack.  

Verifying users at every interaction reduces false positives and user friction by instantly safeguarding against issues such as hijacked sessions while minimizing the need for step-up-authentication. Revelock’s continual verification of users and devices is completely silent and fully transparent.

new-account-fraud-iconNew Account Fraud

With New Account Fraud, bad actors use real customer data or a combination of real and fake data to create synthetic IDs to open new accounts. Revelock can identify previously unseen users by:

  • Analyzing new user systems, device and network data looking for clear high risk identifiers and scoring accordingly.
  • Creating a BionicID™ for each new user comparing it to existing ones and identifying known bad actor BionicIDs™ discovered with Revelock Hunter and block them automatically.

card-not-present-iconCard Not Present (CNP) Fraud

In Card Not Present scenarios bad actors use stolen credit card information to make online purchases ranging from luxury goods, electronics, digital products and gift cards – all things easily resold for cash. Whether the purchase is completed directly or is stepped up with 3D Secure, Revelock can help identify suspicious card not present attempts by:

  • Analyzing new user systems, device and network data looking for clear high-risk identifiers and score them accordingly.
  • Creating a BionicID™ for each new user comparing it to existing ones and identifying known bad actor BionicIDs™ previously discovered with Revelock Hunter and automatically block them.

What to Read Next

footer-demo-ban-02

Reveal & Respond