When our team built the SpecTrust Hub, their primary mission was to make it easy and fast to identify fraud. (Technically the visualization above shows a semi-circle, but you get the idea.) This real example of a bad actor crawling through a SpecTrust customer’s website shows a single device dynamically cycling through 11 IP addresses, starting a different web browsing session with each one, and even switching out emails across the sessions in an attempt to take over customer accounts with different login/password combinations.
It is unclear whether this was a bot or a human, as the sessions occurred over ~22 hours and just about 30 login attempts were made. Given the low frequency of these attempts and the cycling of IP addresses and browser sessions, some systems would very well have let this bad actor continue attempting to hack into the system.
Seeing visualizations such as the one above, where everything can be traced back to a single device, enables fraud fighters to 1) identify fraud, and 2) change access rules to prevent such account takeover attempts in the future.
SpecTrust’s platform made this visualization possible by combing through comprehensive customer data and stitching together relevant pieces to ultimately flag a high-risk user and fraud in the making.
Want to see more circles? Read about collusion between buyers and sellers in our marketplaces whitepaper here.