Detect remote access tools and distinguish between genuine and malicious online behaviors.
Malware infections and Remote Access Tool (RAT) attacks are on the rise, enabling cyber criminals to take over accounts and automate fraud. Employing social engineering and technical subterfuge, fraudsters easily gain access to victim machines to steal credentials, trick users, intercept consumers online, or monitor and intercept consumer activity.
Circumventing traditional online fraud prevention solutions such as device recognition, proxy detection and IP geo-location, fraudsters are leveraging any opening to infect or attack. Acting with patience, sometimes triggering malware well after it has been installed, the fraudster’s work can go undetected for 170 days on average!
BioCatch’s behavioral biometrics platform offers a new level of detection and protection. Malware, behaves differently than a human being, meaning that each type has its own unique behavioral patterns that can be identified and saved as a signature. Analyzing hundreds of human and non-human behavioral parameters every second, BioCatch's invisible challenge system is able to detect an anomaly in a session.
- 230,000 new malware samples launched each day
- 59% people share access credentials
- 466,065 unique phishing sites observed in Q2 2016, an all-time high
- 68% of funds lost to cyber attack were declared unrecoverable
Comprehensive. Behavioral biometrics can identify RAT in the Browser, RAT in the Mobile, Social Engineering, Man in the Browser, and Man in the App attacks, as well as malware manipulating data and spoofing attacks.
Proactive. BioCatch uses machine learning to model behaviors and can detect a genuine user from a fake one in real-time. Quickly identifying anomalies and characteristics indicative of fraud, BioCatch sends actionable alerts.
Reliable. BioCatch identifies the sluggish responses common with network latency, overshoots and the delayed corrections characteristic of remote access. BioCatch’s ability to detect RATs was confirmed by MRG Eighties, a UK-based, independent IT security research organization.