SlideShare a Scribd company logo
Fraud in Igaming 101
Martyn Sukys, 2018 January, Betsson Group, Malta
Last year, in the UK alone, almost 11bn GBP (13.5bn USD) was lost to fraud and cybercrime.
“20% of all online financial frauds can be attributed to igaming”
Mastercard (Europay)
But Why?
Most igaming operators are transitioning to premium models that enable customers to
save credit card numbers and other identity information to their accounts—creating
irresistible opportunities for cyberthieves.
“Gambling sites have been seeing dramatic and sustained spikes in bot attacks this year.
Bots make up as much as half of all daily traffic during key attack peaks.”
Quarterly cybercrime report from ThreatMetrix.
94% of Companies Reported Fraud-Related Issues
82% of the survey’s respondents were dissatisfied with the
payment systems that are integrated into their casino gaming
platforms
CASEXE conducted a survey across over 50 successful online gambling businesses in Europe and the Commonwealth
independent states
Gambling Fraud. Multiple account fraud
Fraudsters create dozens or hundreds of accounts using fake credentials in order to tilt the balance in their favor
online. For instance, they could use it for:
● Bonus abuse: numerous fake accounts benefit from new signup bonuses, coupons and other attractive
offers. While these promos are an excellent way to attract new players, they can quickly make your platform
run at a loss if you hand out too many of them.
● Gnoming: using multiple accounts to help one player win. The other accounts are used to lose deliberately so
one can pocket all the wins and bonuses that go with it.
● Chip dumping: this is a practice found at the poker table. Like with gnoming, the idea is to make multiple
accounts join the same table in order to cheat the system and influence the results in favor or against one
particular player.
● Impersonation: playing on behalf of another individual. Can be without their consent or with consent. ,
Threat actors would also look for proxy servers using RDPs and SOCKS5 VPN, through which they’d be able to
conduct carding and impersonation. When the impersonation happens with consent, the experienced player
uses TeamViewer to play on behalf of a newbie - enjoying their privileges and scamming the gaming site in
return for profit percentages.
Gambling Fraud. Payment attacks
● Stolen credit cards (aka Carding): fraudsters can use stolen card information to top
up their account, that is using illegitimate money to pocket real wins.
● Chargebacks: this happens after the fraudsters have already topped their account.
They then request a chargeback from their banking or credit card provider, which
means getting refunded at the online gambling provider’s expense.
● Phone top up abuse: if your online casino offers phone top up, fraudsters now have
sophisticated ways of topping up their client. They call burner phone holders, and
trick them into topping up their balance, which actually goes to fund their gambling
accounts.
The dark web provides an incredible landscape where criminals help each other, and sell
information for unlawful purposes. If the company lets a fraudulent transaction through
easily, the ‘good news’ is quickly spread to other fraudsters. You can even buy detailed
guides on how to commit every type of fraud.
The good part - if fraud is detected and escalated, the news spread fast as well.
Fraudsters drop the idea of recurrent attack as a potential waste of time.
Image: Movie Unfriended: Dark Web
“Carding and Identity Theft (Impersonation) is the most emergent risk.”
IntSights
Where to look for fraud?
● Compromised Accounts
● Player Collusion
● Multi-Accounting/Account Sharing
● Bots
● Deposit Fraud
● Player Fraud (promo, deposit bonus, affiliate & rakeback abuse)
● Fraudulent Chip Dumping
● Responsible Gaming
How to protect?
● Build returning gamers gaming profiles
● Use monitoring platforms to know in advance whether data and credentials were
stolen or leaked, whether payment methods are stolen or fake, and when this
happened
● Train people to treat malicious emails. Fraudsters indeed target employees, usually
by using phishing methods.
● Implement users ID, Age verification, PEP check
● Implement Device fingerprinting tracking
● Perform IP analysis
● Perform Risk scoring
What’s on market?
● ID verification providers
● Politically exposed person list providers
● Anti Money Laundering regulators (AML)
● Sign up monitoring providers
● Log in monitoring providers
● Withdrawal and deposit monitoring providers
● Actual games and tables monitoring providers
Image: http://www.007.com/characters/the-bonds/
No site/tool/person is bullet proof, and game security
& fraud issues will always occur where there is
money involved, same as the real world

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Tejasvi Bhatia
 
BOTNET
BOTNETBOTNET
BOTNET
Arjo Ghosh
 
Corruption In India
Corruption In IndiaCorruption In India
Corruption In India
Akshay Bharwani
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Elijah Ezendu
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
PsychoticBanda
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
N F
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
Tayyab Farooq
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
JamRivera1
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
Ansar Gill
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
Quick Heal Technologies Ltd.
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Jayant Raj
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
BOTNET
BOTNETBOTNET
BOTNET
 
Corruption In India
Corruption In IndiaCorruption In India
Corruption In India
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing
PhishingPhishing
Phishing
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similar to Fraud in igaming 101

Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
Mike Bike
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
h9gfhypx97
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101
Kount
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
ClubHack
 
How to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudHow to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments Fraud
ITIO Innovex
 
Unit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsUnit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of Frauds
Kumarasamy Dr.PK
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
Vi Tính Hoàng Nam
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
Rashmibansal15
 
Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
Boston Institute of Analytics
 
a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016
Eli Marcus
 
Authorized Push Payment Fraud: Money 2.0 Conference Throws Light On The Preve...
Authorized Push Payment Fraud: Money 2.0 Conference Throws Light On The Preve...Authorized Push Payment Fraud: Money 2.0 Conference Throws Light On The Preve...
Authorized Push Payment Fraud: Money 2.0 Conference Throws Light On The Preve...
Money 2Conf
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
PawanKumarJha7
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
PawanKumarJha7
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
Merchantech - Payment Processing Services
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explained
AaronSmith41007
 
KYC Solutions for online gambling
KYC Solutions for online gamblingKYC Solutions for online gambling
KYC Solutions for online gambling
TrustIDnow
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
darrengracia
 

Similar to Fraud in igaming 101 (20)

Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
How to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments FraudHow to reduce payments fraud? Payments Fraud
How to reduce payments fraud? Payments Fraud
 
Unit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsUnit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of Frauds
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
 
Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 
a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016
 
Authorized Push Payment Fraud: Money 2.0 Conference Throws Light On The Preve...
Authorized Push Payment Fraud: Money 2.0 Conference Throws Light On The Preve...Authorized Push Payment Fraud: Money 2.0 Conference Throws Light On The Preve...
Authorized Push Payment Fraud: Money 2.0 Conference Throws Light On The Preve...
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
Fraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explainedFraud management - eCommerce fraud explained
Fraud management - eCommerce fraud explained
 
KYC Solutions for online gambling
KYC Solutions for online gamblingKYC Solutions for online gambling
KYC Solutions for online gambling
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 

More from Martyn Sukys

Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
Martyn Sukys
 
Fighting telecom fraud. Explaining SMS SS7 fraud
Fighting telecom fraud. Explaining SMS SS7 fraudFighting telecom fraud. Explaining SMS SS7 fraud
Fighting telecom fraud. Explaining SMS SS7 fraud
Martyn Sukys
 
Machine learning outsource or not outsource
Machine learning outsource or not outsourceMachine learning outsource or not outsource
Machine learning outsource or not outsource
Martyn Sukys
 
What is Machine Learning
What is Machine LearningWhat is Machine Learning
What is Machine Learning
Martyn Sukys
 
Design thinking presentation & personal branding
Design thinking presentation & personal brandingDesign thinking presentation & personal branding
Design thinking presentation & personal branding
Martyn Sukys
 
Kas bendro tarp agile ir inovaciju
Kas bendro tarp agile ir inovacijuKas bendro tarp agile ir inovaciju
Kas bendro tarp agile ir inovacijuMartyn Sukys
 
10 inovacijos mitu
10 inovacijos mitu10 inovacijos mitu
10 inovacijos mitu
Martyn Sukys
 

More from Martyn Sukys (8)

Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 
Fighting telecom fraud. Explaining SMS SS7 fraud
Fighting telecom fraud. Explaining SMS SS7 fraudFighting telecom fraud. Explaining SMS SS7 fraud
Fighting telecom fraud. Explaining SMS SS7 fraud
 
Machine learning outsource or not outsource
Machine learning outsource or not outsourceMachine learning outsource or not outsource
Machine learning outsource or not outsource
 
What is Machine Learning
What is Machine LearningWhat is Machine Learning
What is Machine Learning
 
Design thinking presentation & personal branding
Design thinking presentation & personal brandingDesign thinking presentation & personal branding
Design thinking presentation & personal branding
 
Kas bendro tarp agile ir inovaciju
Kas bendro tarp agile ir inovacijuKas bendro tarp agile ir inovaciju
Kas bendro tarp agile ir inovaciju
 
Inovuok arba mirk
Inovuok arba mirkInovuok arba mirk
Inovuok arba mirk
 
10 inovacijos mitu
10 inovacijos mitu10 inovacijos mitu
10 inovacijos mitu
 

Recently uploaded

My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
fkyes25
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 

Recently uploaded (20)

My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 

Fraud in igaming 101

  • 1. Fraud in Igaming 101 Martyn Sukys, 2018 January, Betsson Group, Malta
  • 2. Last year, in the UK alone, almost 11bn GBP (13.5bn USD) was lost to fraud and cybercrime.
  • 3. “20% of all online financial frauds can be attributed to igaming” Mastercard (Europay) But Why?
  • 4. Most igaming operators are transitioning to premium models that enable customers to save credit card numbers and other identity information to their accounts—creating irresistible opportunities for cyberthieves. “Gambling sites have been seeing dramatic and sustained spikes in bot attacks this year. Bots make up as much as half of all daily traffic during key attack peaks.” Quarterly cybercrime report from ThreatMetrix.
  • 5. 94% of Companies Reported Fraud-Related Issues 82% of the survey’s respondents were dissatisfied with the payment systems that are integrated into their casino gaming platforms CASEXE conducted a survey across over 50 successful online gambling businesses in Europe and the Commonwealth independent states
  • 6. Gambling Fraud. Multiple account fraud Fraudsters create dozens or hundreds of accounts using fake credentials in order to tilt the balance in their favor online. For instance, they could use it for: ● Bonus abuse: numerous fake accounts benefit from new signup bonuses, coupons and other attractive offers. While these promos are an excellent way to attract new players, they can quickly make your platform run at a loss if you hand out too many of them. ● Gnoming: using multiple accounts to help one player win. The other accounts are used to lose deliberately so one can pocket all the wins and bonuses that go with it. ● Chip dumping: this is a practice found at the poker table. Like with gnoming, the idea is to make multiple accounts join the same table in order to cheat the system and influence the results in favor or against one particular player. ● Impersonation: playing on behalf of another individual. Can be without their consent or with consent. , Threat actors would also look for proxy servers using RDPs and SOCKS5 VPN, through which they’d be able to conduct carding and impersonation. When the impersonation happens with consent, the experienced player uses TeamViewer to play on behalf of a newbie - enjoying their privileges and scamming the gaming site in return for profit percentages.
  • 7. Gambling Fraud. Payment attacks ● Stolen credit cards (aka Carding): fraudsters can use stolen card information to top up their account, that is using illegitimate money to pocket real wins. ● Chargebacks: this happens after the fraudsters have already topped their account. They then request a chargeback from their banking or credit card provider, which means getting refunded at the online gambling provider’s expense. ● Phone top up abuse: if your online casino offers phone top up, fraudsters now have sophisticated ways of topping up their client. They call burner phone holders, and trick them into topping up their balance, which actually goes to fund their gambling accounts.
  • 8. The dark web provides an incredible landscape where criminals help each other, and sell information for unlawful purposes. If the company lets a fraudulent transaction through easily, the ‘good news’ is quickly spread to other fraudsters. You can even buy detailed guides on how to commit every type of fraud. The good part - if fraud is detected and escalated, the news spread fast as well. Fraudsters drop the idea of recurrent attack as a potential waste of time. Image: Movie Unfriended: Dark Web
  • 9. “Carding and Identity Theft (Impersonation) is the most emergent risk.” IntSights
  • 10. Where to look for fraud? ● Compromised Accounts ● Player Collusion ● Multi-Accounting/Account Sharing ● Bots ● Deposit Fraud ● Player Fraud (promo, deposit bonus, affiliate & rakeback abuse) ● Fraudulent Chip Dumping ● Responsible Gaming
  • 11. How to protect? ● Build returning gamers gaming profiles ● Use monitoring platforms to know in advance whether data and credentials were stolen or leaked, whether payment methods are stolen or fake, and when this happened ● Train people to treat malicious emails. Fraudsters indeed target employees, usually by using phishing methods. ● Implement users ID, Age verification, PEP check ● Implement Device fingerprinting tracking ● Perform IP analysis ● Perform Risk scoring
  • 12. What’s on market? ● ID verification providers ● Politically exposed person list providers ● Anti Money Laundering regulators (AML) ● Sign up monitoring providers ● Log in monitoring providers ● Withdrawal and deposit monitoring providers ● Actual games and tables monitoring providers Image: http://www.007.com/characters/the-bonds/
  • 13. No site/tool/person is bullet proof, and game security & fraud issues will always occur where there is money involved, same as the real world