The ThreatMetrix® Cybercrime Report: Q1 2015 examines cybercrime attacks detected by the ThreatMetrix® Digital Identity Network during Q4 2014 and Q1 2015. These attacks were detected during real-time analysis and interdiction of fraudulent online payments, logins and new account registration.

During this period, the ThreatMetrix Digital Identity Network analyzed more than six billion transactions, with nearly one-third originating from mobile devices, and protected more than 250 million active user accounts across 3,000 customers and 15,000 websites. Through its analysis of the top customer transactions across industries, the ThreatMetrix Digital Identity Network provides unique insights into legitimate end customers’ “digital identities,” even as they move between applications, devices and networks and highlights some representative key market trends.

A sampling of key highlights includes:

  • E-Commerce: The report highlights the trends in the 2014 holiday shopping season, which was a period of record online transactions and unprecedented number of attacks. These attacks are directly associated with the growing data breaches over the past year. Impersonation or “spoofing” attacks are now the most common threat. The ThreatMetrix Cybercrime Report: Q1 2015 is the first of its kind to analyze how stolen and compromised identities are used for cybercrime.
  • Financial Services: While online banking authentication transactions continue to dominate the financial services industry, the payment transactions increased during this period driven by the increasing adoption of alternate payment methods and bankcard authentication solutions, and increase in online money gifting during the holiday season.
  • Media: The analysis of transactions from the media industry, consisting of social media, content streaming and online dating websites, show a growth in payment transactions through media organizations while the overall fraud levels continue to be higher than other industries.
  • Mobile: Mobile usage represents nearly one-third of all activity on the ThreatMetrix Digital Identity Network and continues to grow as more and more consumers use their mobile phone, tablets and connected devices (such as the Apple Watch) too access content, make purchases, conduct banking transactions and pay bills.
  • Device Spoofing: Leveraging activity across industrious, mobile and desktop, the report also identified the top attacks by transaction type and founding spoofing, such as IP address, geolocation, identity and device spoofing to be the most common attack types across all transaction attempts.

Get The Full Report

DOWNLOAD NOW