Source: Help Net Security
by Amit Klein
In this article “Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these systems, they are continuously looking for ways to conceal behaviors that might be identified as potential fraud.
Trusteer came across a tutorial published in underground forums that explains how to circumvent fraud detection systems that use device identification to track and detect anomalous transaction and access patterns. “