How P2P Platforms Can Prevent Man-in-the-Middle Attacks with Advanced MFA

February 17, 2022

Alexander Pope wrote, “To err is human; to forgive, divine.” For cybersecurity professionals, forgiving (and compensating for) human error by incorporating additional backup measures is critical to preventing fraud.

The recent spate of man-in-the-middle attacks on customers of peer-to-peer (P2P) payment platforms is a case in point.

A man-in-the-middle attack occurs when “attackers interrupt an existing conversation or data transfer. After inserting themselves in the ‘middle’ of the transfer, the attackers pretend to be both legitimate participants. This enables an attacker to intercept information and data from either party while also sending malicious links or other information to both legitimate participants in a way that might not be detected until it is too late.” Man-in-the-middle attacks are especially disorienting because victims believe they are speaking to a legitimate business but are actually handing over the keys to their account to a fraudster. 

In the P2P payments context, the victim receives an SMS from an unknown number sent by a fraudster claiming to be from the fraud department of a well-known P2P company. The text message warns of a recent suspicious transaction. Worried and confused, the victim responds to the message and explains that they did not authorize the (fictitious) charge in question. The fraudster, taking advantage of the victim’s urgency, asks the victim to verify their username to “clear the charges.” Without thinking, the victim shares their username– after all, a username isn’t confidential. The fraudster then goes to the P2P website or app, enters the victim’s username, and requests a password reset. Moments later, the victim receives a one-time password (OTP) and dutifully sends it to the fraudster, ostensibly confirming their identity and clearing the charges. Unfortunately, it’s all a scam. In minutes, the fraudster gained access to the victim’s account with the victim’s username and OTP, reset the victim’s password, and stole their money.

For many cybersecurity professionals, it’s difficult to imagine how so many people can be fooled via social engineering to hand over a one-time password (OTP) to a stranger via SMS. The reality, however, is that many consumers are unfamiliar with and overwhelmed by the ever-increasing security measures placed on our digital lives, and, let’s face it, everybody makes mistakes. 

To protect customers from social engineering and man-in-the-middle fraud, companies need to move beyond the first generation of OTPs and fortify their multi-factor authentication (MFA) flow. 

Here are four steps you can take today to fortify your company’s multi-factor authentication flow:

  1. Next-Generation MFA: Use phone-centric identity technology such as MobileAuth™ to confirm that activity is coming from an expected device. This will prevent fraudsters from initiating high-risk transactions such as password resets from phone numbers not associated with the legitimate customer. 
  2. Secure Links: A happy medium between active (SMS delivery with user action required) and passive (checking against phone-centric identity signals) security methods, InstantLink™ authenticates identities in real time when users click the link, creating a more secure and frictionless alternative to the SMS OTP.‍ Customers just have to click a link rather than enter a string of digits in an OTP. 
  3. Behavioral Biometrics: Human error (e.g., using a common password, sharing passwords across multiple accounts, falling for social engineering schemes) is a leading cause of security breaches. With behavioral biometrics, however, the very traits that make a human unique (how we walk, hold our phone, type messages) are used to make security flows more secure. In essence, behavioral biometrics allows consumers to verify their identity online just by being themselves in the real world. 
  4. Trust Indicator: Our Trust Score™ uses behavioral and phone intelligence signals to measure a phone number’s fraud risk and identity confidence in real-time. Scaled from 0 to 1000 (with a score of less than 300 classified as low-trust, high-risk), the Trust Score model can be implemented to secure use cases across account enrollment, login, high-risk events, and customer communications.

Although it would be ideal if human error could be removed from the security equation, the truth is that consumers will continue to fall prey to social engineering, including man-in-the-middle schemes, if companies do not step up to provide additional layers of security. Fortunately, companies today have access to the technology they need to protect their business and their consumers. 

If you’re interested in preventing man-in-the-middle attacks and other forms of fraud while accelerating onboarding and boosting revenue, contact us using the form below.

Keep reading

See all blogs
Fraud in the Age of AI: Meet the Shapeshifter

The COVID-19 pandemic not only changed the way we work and live, it also unleashed a wave of fraud unlike anything we've seen before.

Mary Ann Miller
July 18, 2024
Company News
Introducing Prove Link™ – Unlocking the Power of Identity for Any Business

To continue achieving our mission of accelerating trusted interactions on the internet, we’re proud to announce the introduction of the Prove developer self-service platform and the Prove LinkTM SDK. With these tools, it’s now faster and easier for any company to integrate our industry-leading identity technology into its brand operations.

July 16, 2024
Company News
Combating Deepfakes: Leveraging Phone-Centric Identity℠ Verification to Overcome Media-Based Vulnerabilities

Identity verification systems that depend on image or audio samples for digital customer onboarding are increasingly vulnerable to deepfake attacks.

Tim Brown
July 5, 2024